RESTRICTED WEB BROWSER MODE FOR SUSPICIOUS WEBSITES

    公开(公告)号:US20210084055A1

    公开(公告)日:2021-03-18

    申请号:US16569390

    申请日:2019-09-12

    Inventor: Doron Avraham

    Abstract: A method of restricting presentation of known or suspected malicious content in a web browser comprises receiving a request for web content, and determining whether the web content contains known or suspected malicious content. If the requested web content contains known or suspected malicious web content, the requested web content is displayed in a restricted browsing mode that restricts or blocks presentation of one or more elements of the known or suspected malicious content in the requested content.

    Automatic language selection in messaging application

    公开(公告)号:US10915183B2

    公开(公告)日:2021-02-09

    申请号:US15942360

    申请日:2018-03-30

    Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.

    LOCATION-BASED ADAPTIVE DEVICE SECURITY SYSTEM AND METHOD

    公开(公告)号:US20200288306A1

    公开(公告)日:2020-09-10

    申请号:US16293152

    申请日:2019-03-05

    Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.

    System and method using function length statistics to determine file similarity

    公开(公告)号:US10607010B2

    公开(公告)日:2020-03-31

    申请号:US15720321

    申请日:2017-09-29

    Inventor: Michal Krejdl

    Abstract: A file similarity vector for an executable file or executable object can be determined using function lengths of functions in the executable file or data object. The executable file or data object can be scanned, and lengths of functions can be determined. Various statistics such as number of functions, maximum function length, minimum function length, and average function length can be used to create a file similarity vector. The file similarity vector can be used to compare files.

    Detecting malicious scripts
    66.
    发明授权

    公开(公告)号:US10445501B2

    公开(公告)日:2019-10-15

    申请号:US15719401

    申请日:2017-09-28

    Inventor: Jiri Sejtko

    Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.

    Distance and method of indexing sandbox logs for mapping program behavior

    公开(公告)号:US10437986B2

    公开(公告)日:2019-10-08

    申请号:US15374670

    申请日:2016-12-09

    Inventor: Martin Vejmelka

    Abstract: Systems and methods index and search log files created after execution of binaries. A plurality of log files each have one or more sequences. An index tree is created for the log files. A first log file is placed into a bucket of the index tree according to the lengths of the one or more sequences of the first log file. Remaining logs files are placed the index tree according to their respective sequence lengths. Each log becomes a representative in the bucket or associated with a representative in the bucket. The index tree can be searched, where an incurred distance and a remaining distance is maintained during the search. Nodes are pruned based, at least in part, on the incurred distance and the remaining distance.

    Privacy preference based device controls

    公开(公告)号:US12289312B2

    公开(公告)日:2025-04-29

    申请号:US17687235

    申请日:2022-03-04

    Inventor: Rajarshi Gupta

    Abstract: A data control method includes receiving from a user an indication of data for sharing, receiving from the user an indication of one or more recipients with which to share the data, and receiving from the user one or more allowed actions for the data. A multidimensional zone is determined based on the indication of the data for sharing, the indication of the one or more recipients, and the one or more allowed actions for the data. A plurality of application program interfaces (APIs) for a plurality of applications are accessed. Data sharing permissions are set for the user for each of the plurality of applications based on the multidimensional zone via the plurality of APIs.

    SYSTEMS AND METHODS FOR CREDENTIAL-BASED TRANSACTIONS OVER A NETWORK

    公开(公告)号:US20240205017A1

    公开(公告)日:2024-06-20

    申请号:US18066213

    申请日:2022-12-14

    Inventor: Allan Thomson

    CPC classification number: H04L9/3247

    Abstract: Systems and methods for transacting over a network enable transacting on behalf of a first entity at a plurality of first network locations based on one or more first cryptographically verifiable credentials for a plurality of first network-enabled services. One or more assessments of the first entity are determined based on the transacting on behalf of the first entity at the plurality of first network locations based on the one or more first cryptographically verifiable credentials. One or more second cryptographically verifiable credentials are generated as one or more digitally signed credentials based on the one or more assessments of the first entity. The systems and methods further enable transacting on behalf of the first entity at one or more second network locations based on the one or more second cryptographically verifiable credentials for a second network-enabled service.

Patent Agency Ranking