DATA SHARING AND STORAGE CONTROL SYSTEM AND METHOD

    公开(公告)号:US20230274012A1

    公开(公告)日:2023-08-31

    申请号:US18314034

    申请日:2023-05-08

    Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.

    Endpoint security domain name server agent

    公开(公告)号:US11652792B2

    公开(公告)日:2023-05-16

    申请号:US16668861

    申请日:2019-10-30

    Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example processing the received DNS request comprises identifying the client device, end user, and the DNS request to a cloud-based DNS server, and processing a response received from the cloud-based DNS server received in response to the DNS request. The endpoint DNS agent is further operable to distinguish between DNS requests for local domains and remote domains, and to redirect DNS requests for local domains to a local network DNS server.

    Data sharing and storage control system and method

    公开(公告)号:US11645403B2

    公开(公告)日:2023-05-09

    申请号:US17028182

    申请日:2020-09-22

    Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.

    PRIVACY PRESERVING MALICIOUS NETWORK ACTIVITY DETECTION AND MITIGATION

    公开(公告)号:US20230131988A1

    公开(公告)日:2023-04-27

    申请号:US17508414

    申请日:2021-10-22

    Inventor: Allan Thomson

    Abstract: A method includes accessing a first intelligence feed including a plurality of cybersecurity incidents. A second intelligence feed is generated including a plurality of technical indicators defined on one or more virtual private network internet point of presence (“VPN internet PoP”) that connects a plurality of VPN tunnels to an internet. The first and second intelligence feeds are compared, a particular incident is determined, and a time frame of the particular incident is determined. Use of a particular VPN internet PoP by a plurality of sources including a plurality of clients is monitored to determine a plurality of time-based behaviors. The plurality of time-based behaviors are compared to the particular incident and to the time frame to determine a match. A particular source is blocked at the particular VPN internet PoP based on the determination of the match.

    APPLICATION USER JOURNEY MANAGEMENT

    公开(公告)号:US20230049219A1

    公开(公告)日:2023-02-16

    申请号:US17399884

    申请日:2021-08-11

    Abstract: An application activation method includes enabling an activation of one or more applications, including an activation of a first application, on a computing device. A first plurality of interactions of a user with the one or more applications on the computing device are detected. A first offer to renew the activation of the first application is generated based on the first plurality of interactions of the user. The first offer is provided to the user via the computing device. An acceptance of the first offer is received from the user, and the activation of the first application is renewed responsive to receiving the acceptance of the first offer.

    DATA EXFILTRATION DETECTION
    58.
    发明申请

    公开(公告)号:US20230015269A1

    公开(公告)日:2023-01-19

    申请号:US17377298

    申请日:2021-07-15

    Inventor: Martin Mesrsmid

    Abstract: A computer-implemented method includes creating an account including an account value on an online service. The account value is modified periodically to activate a plurality of account values respectively associated with a plurality of times at which the plurality of account values were respectively activated on the account. A network-accessible data repository is scanned to detect a first value of the plurality of account values, the first value associated with a first time of the plurality of times at which the first value was activated. Responsive to detecting the first value a notification is provided indicating a data leak from the online service including an indication of when the data leak occurred based on the first time at which the first value was activated on the account and a second time at which a second value was activated on the account to replace the first value.

    ONLINE CONTENT EVALUATION SYSTEM AND METHODS

    公开(公告)号:US20220391445A1

    公开(公告)日:2022-12-08

    申请号:US17342463

    申请日:2021-06-08

    Abstract: A method including detecting a webpage accessed by a user on a computing device via a browser. Content on the webpage is determined, and a model is applied to the content to determine a plurality of keyword sets. A network search is performed based on each of the plurality of keyword sets to generate a plurality of search results. The plurality of search results are compared to the content, and the plurality of search results are compared to each other. A factualness of the content is determined based on the comparing of the plurality of search results to the content and based on the comparing of the plurality of the search results to each other, and the user is notified via the browser of the factualness of the content.

    Providing payment options without requiring online shop integration

    公开(公告)号:US11461750B2

    公开(公告)日:2022-10-04

    申请号:US15926877

    申请日:2018-03-20

    Inventor: Nir Galili

    Abstract: Initiation of a purchase at an online shop or other retailer can be detected. In addition to, or instead of a payment method integrated with the online shop, one or more alternative payment services that are not integrated with the online shop or retailer can be considered for selection. A non-integrated payment service can be selected based on terms offered by the non-integrated payment service. The selected goods or services can be paid for by the non-integrated payment service using a virtual credit card. The user can reimburse the non-integrated payment service under the terms offered by the non-integrated payment service.

Patent Agency Ranking