Protecting sensitive web transactions using a communication channel associated with a user
    61.
    发明授权
    Protecting sensitive web transactions using a communication channel associated with a user 有权
    使用与用户相关联的通信通道来保护敏感的Web事务

    公开(公告)号:US09112834B1

    公开(公告)日:2015-08-18

    申请号:US14146456

    申请日:2014-01-02

    IPC分类号: H04L29/06

    摘要: A security device may receive, from a client device, a request associated with a server device. The security device may determine a communication channel and contact information for validating the request. The security device may provide validation information via the communication channel using the contact information. The security device may receive a validation response from the client device, and may determine whether the validation response is valid. The security device may selectively perform a first action or a second action based on determining whether the validation response is valid. The first action may be performed based on determining that the validation response is valid, and may include providing a validation indicator, with the request, to the server device. The second action may be performed based on determining that the validation response is not valid, and may include providing an invalidation indicator, with the request, to the server device.

    摘要翻译: 安全设备可以从客户端设备接收与服务器设备相关联的请求。 安全设备可以确定用于验证请求的通信信道和联系信息。 安全设备可以使用联系人信息通过通信信道来提供验证信息。 安全设备可以从客户端设备接收验证响应,并且可以确定验证响应是否有效。 安全设备可以基于确定验证响应是否有效来选择性地执行第一动作或第二动作。 可以基于确定验证响应是有效的来执行第一动作,并且可以包括向服务器设备提供与请求有关的确认指示符。 可以基于确定验证响应无效来执行第二动作,并且可以包括向服务器设备提供带有请求的无效指示符。

    Classification of software based on user interface elements

    公开(公告)号:US10467260B2

    公开(公告)日:2019-11-05

    申请号:US15396056

    申请日:2016-12-30

    摘要: A device may receive an instruction to classify software. The device may identify a group of one or more user interfaces associated with the software based on receiving the instruction to classify the software. The device may determine a group of one or more user interface signatures associated with the group of one or more user interfaces. A user interface signature may include information, associated with a user interface in the group of one or more user interfaces, that may be used to classify the software. The device may generate information that identifies a classification of the software based on the group of one or more user interface signatures and based on known signature information. The known signature information may include information that corresponds to a correct software classification. The device may output the information that identifies the classification of the software.

    Detecting a malicious file infection via sandboxing

    公开(公告)号:US10389740B2

    公开(公告)日:2019-08-20

    申请号:US15620388

    申请日:2017-06-12

    摘要: A device may receive a trigger to determine whether a malicious file is operating on a client device. The device may determine a network activity profile associated with the malicious file based on receiving the trigger to determine whether the malicious file is operating on the client device. The network activity profile may include information regarding network activity associated with the malicious file when the malicious file is executed in a testing environment. The device may monitor network activity associated with the client device. The device may determine that the network activity associated with the client device matches the network activity profile associated with the malicious file based on monitoring the network activity associated with the client device. The device may provide information indicating that the network activity associated with the client device matches the network activity profile associated with the malicious file.

    Malware detection using internal and/or external malware detection operations

    公开(公告)号:US10382479B2

    公开(公告)日:2019-08-13

    申请号:US15707325

    申请日:2017-09-18

    IPC分类号: H04L29/06

    摘要: A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The system may perform the internal operation by modifying an environment, executing on a particular device, to form a modified environment. The system may perform the external operation by performing a communication from the particular device. The system may monitor the modified environment for a first behavior indicative of the malware infection, and may monitor a result of performing the communication for a second behavior indicative of the malware infection. The system may detect that the first or second behavior has occurred. The system may provide a notification that the client device is infected with malware based on detecting that the first or second behavior has occurred. The notification may cause one or more network devices to block network traffic to or from the client device.

    Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs

    公开(公告)号:US10091222B1

    公开(公告)日:2018-10-02

    申请号:US14674251

    申请日:2015-03-31

    摘要: A device may identify exfiltration information to be used to detect data exfiltration. The exfiltration information may be associated with a file being tested to determine whether the file exfiltrates data. The exfiltration information may include a resource identifier that identifies a resource to be used to detect the data exfiltration. The device may determine that the resource, to be used to detect the data exfiltration, has been accessed. The device may identify, based on determining that the resource has been accessed, the file associated with the exfiltration information. The device may perform an action, associated with the file, to counteract the data exfiltration based on determining that the resource has been accessed and based on identifying the file.