IDENTIFYING AND PROTECTING PERSONAL SENSITIVE DOCUMENTS

    公开(公告)号:US20190026488A1

    公开(公告)日:2019-01-24

    申请号:US16037997

    申请日:2018-07-17

    Abstract: Systems and methods obtain personal identity information, identify a user's personal documents containing sensitive information, and can optionally protect the sensitive documents. A user's personal identity information can be obtained from various sources such as operating system, email clients, web browsers, Active Directory or from user's documents. The user's documents on hard drives, cloud storage etc. can be searched. Sensitive documents with personal identities are identified and optionally protected against misuse and theft.

    MALWARE DETECTION IN APPLICATIONS BASED ON PRESENCE OF COMPUTER GENERATED STRINGS

    公开(公告)号:US20180285565A1

    公开(公告)日:2018-10-04

    申请号:US15942129

    申请日:2018-03-30

    Inventor: Denis Konopiský

    Abstract: An executable file can be determined to be malicious based, at least in part, on the presence of a computer generated text string as a function name, method name, or variable name. The attributes of the function names, method names, and variable names in an executable file can be determined. The attributes can include the ratio of consonants to vowels for at least one text string in the executable file. The attributes may also include the number of consonants in a sequence uninterrupted by a vowel for at least one text string in the executable file. If the attributes indicate that a function name, method name or variable name has been computer generated, the executable file can be labeled as potentially malicious.

    CONSTRUCTING AN INVERTED INDEX
    84.
    发明申请

    公开(公告)号:US20180285377A1

    公开(公告)日:2018-10-04

    申请号:US15940302

    申请日:2018-03-29

    Inventor: Antonín Kríz

    Abstract: Systems and methods create an inverted index for a set of documents utilizing a heap data structure. The documents can be divided into a series of n-grams. The n-grams can be hashed, producing hashed n-gram values. A first hashed n-gram value can be placed into the heap data structure. Operations performed using the heap data structure obtain document identifiers that are associated with documents that include a hashed n-gram value that matches the top n-gram value in the heap.

    ACCELERATED LOADING OF GUEST VIRTUAL MACHINE FROM LIVE SNAPSHOT

    公开(公告)号:US20180004442A1

    公开(公告)日:2018-01-04

    申请号:US15636108

    申请日:2017-06-28

    Abstract: Loading a guest virtual machine from a snapshot includes determining a plurality of executable modules loaded in a guest operating system. Hash values for pages of guest physical memory in the snapshot file are determined. Hash values for pages of the executable modules executing in the guest operating system are determined. Matches to the pages in the guest physical memory and the pages of the executable modules are searched for using the hash values. Context information associated with the matching pages in the guest physical memory and the pages of the executable modules is written to the snapshot. The snapshot is modified to link the guest physical memory to the pages of the executable modules.

    SYSTEMS AND METHODS OF CREATING A DISTRIBUTED RING OF TRUST

    公开(公告)号:US20170288866A1

    公开(公告)日:2017-10-05

    申请号:US15470693

    申请日:2017-03-27

    Abstract: A trust relationship can be established between two or more identities without the need of a certificate authority. Trust relationships between identities can be maintained in a distributed ring of trust between two or more identities. The distributed ring of trust can be on a signed identity list. A node desiring to add an identity to the ring of trust sends a request to a member of the ring of trust. The receiving member can determine whether or not to approve the request. In some aspects, approval can be based on a previously shared key or a two-party verification. Upon approval, the requested identity is added to a trusted identity list indicating identities associated with current members of the ring of trust. The updated trusted identity list can then be distributed to the members of the ring of trust.

Patent Agency Ranking