RESTRICTED WEB BROWSER MODE FOR SUSPICIOUS WEBSITES

    公开(公告)号:US20210084055A1

    公开(公告)日:2021-03-18

    申请号:US16569390

    申请日:2019-09-12

    Inventor: Doron Avraham

    Abstract: A method of restricting presentation of known or suspected malicious content in a web browser comprises receiving a request for web content, and determining whether the web content contains known or suspected malicious content. If the requested web content contains known or suspected malicious web content, the requested web content is displayed in a restricted browsing mode that restricts or blocks presentation of one or more elements of the known or suspected malicious content in the requested content.

    Automatic language selection in messaging application

    公开(公告)号:US10915183B2

    公开(公告)日:2021-02-09

    申请号:US15942360

    申请日:2018-03-30

    Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.

    LOCATION-BASED ADAPTIVE DEVICE SECURITY SYSTEM AND METHOD

    公开(公告)号:US20200288306A1

    公开(公告)日:2020-09-10

    申请号:US16293152

    申请日:2019-03-05

    Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.

    System and method using function length statistics to determine file similarity

    公开(公告)号:US10607010B2

    公开(公告)日:2020-03-31

    申请号:US15720321

    申请日:2017-09-29

    Inventor: Michal Krejdl

    Abstract: A file similarity vector for an executable file or executable object can be determined using function lengths of functions in the executable file or data object. The executable file or data object can be scanned, and lengths of functions can be determined. Various statistics such as number of functions, maximum function length, minimum function length, and average function length can be used to create a file similarity vector. The file similarity vector can be used to compare files.

    Detecting malicious scripts
    76.
    发明授权

    公开(公告)号:US10445501B2

    公开(公告)日:2019-10-15

    申请号:US15719401

    申请日:2017-09-28

    Inventor: Jiri Sejtko

    Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.

    Distance and method of indexing sandbox logs for mapping program behavior

    公开(公告)号:US10437986B2

    公开(公告)日:2019-10-08

    申请号:US15374670

    申请日:2016-12-09

    Inventor: Martin Vejmelka

    Abstract: Systems and methods index and search log files created after execution of binaries. A plurality of log files each have one or more sequences. An index tree is created for the log files. A first log file is placed into a bucket of the index tree according to the lengths of the one or more sequences of the first log file. Remaining logs files are placed the index tree according to their respective sequence lengths. Each log becomes a representative in the bucket or associated with a representative in the bucket. The index tree can be searched, where an incurred distance and a remaining distance is maintained during the search. Nodes are pruned based, at least in part, on the incurred distance and the remaining distance.

    COMPUTER NETWORK SECURITY ASSESSMENT ENGINE
    78.
    发明申请

    公开(公告)号:US20190238582A1

    公开(公告)日:2019-08-01

    申请号:US16256418

    申请日:2019-01-24

    CPC classification number: H04L63/1433 H04L41/046 H04L41/22 H04L43/50 H04L63/20

    Abstract: A network security assessment engine can assess security on a remote computer network. Agent programs on computing devices on the remote network can execute security tests. The network security assessment engine receives security test results produced by the security tests. The network security assessment engine can determine security test scores based, at least in part, on the security test results. The network security assessment engine can determine an overall network security score based, at least in part, on the security test scores and present the overall network security score. As an example, a network services provider can utilize the network security assessment engine to provide an adaptive, expressive scoring mechanism, allowing the network services provided to more efficiently digest, assess, and report network anomalies within a multitenant context.

    OBSERVATION AND CLASSIFICATION OF DEVICE EVENTS

    公开(公告)号:US20190102543A1

    公开(公告)日:2019-04-04

    申请号:US16141268

    申请日:2018-09-25

    Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.

Patent Agency Ranking