Systems and methods for protecting users

    公开(公告)号:US11423175B1

    公开(公告)日:2022-08-23

    申请号:US16526514

    申请日:2019-07-30

    Abstract: The disclosed computer-implemented method for protecting users may include (i) detecting, by a privacy-protecting security application, an attempt by a user to upload an item of media content, (ii) determining, by the privacy-protecting security application, that the item of media content matches a true identity signature for the user that the privacy-protecting security application generated based on other items of media content relating to the user, and (iii) prompting, by the privacy-protecting security application in response to determining that the item of media content matches the true identity signature, the user to perform a privacy-protecting security action to prevent exposing a true identity for the user. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for protecting users

    公开(公告)号:US11316901B1

    公开(公告)日:2022-04-26

    申请号:US16538788

    申请日:2019-08-12

    Abstract: The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for generating user profiles

    公开(公告)号:US11176268B1

    公开(公告)日:2021-11-16

    申请号:US16202866

    申请日:2018-11-28

    Abstract: The disclosed computer-implemented method for generating user profiles may include (i) analyzing a data set of user profiles for services, (ii) detecting a measurement of obfuscation that was applied to a specific attribute across multiple user profiles for a specific service, (iii) applying the measurement of obfuscation to true data for a new user by fuzzing the true data to create a fuzzed value, and (iv) generating automatically a new user profile for the specific service by populating the specific attribute within the new user profile with the fuzzed value. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for fingerprinting devices

    公开(公告)号:US11122040B1

    公开(公告)日:2021-09-14

    申请号:US16233366

    申请日:2018-12-27

    Abstract: The disclosed computer-implemented method for fingerprinting devices may include (i) detecting that a new device has attempted to connect to a network gateway, (ii) attempting to fingerprint the new device as an instance of a known candidate device type by (a) transmitting to the new device, from a security application, a set of network messages that mimic network messages that a second application is configured to transmit to instances of the known candidate device type and (b) confirming, by the security application based on a response from the new device to the set of network messages, that the new device is the instance of the known candidate device type, and (iii) performing a security action to protect a network corresponding to the network gateway based on confirming that the new device is the instance of the known candidate device type. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for identifying malware locations based on analyses of backup files

    公开(公告)号:US11120169B1

    公开(公告)日:2021-09-14

    申请号:US16721164

    申请日:2019-12-19

    Abstract: The disclosed computer-implemented method for identifying malware locations based on analyses of backup files may include (i) identifying a presence of a backup file set and (ii) performing a security action that may include (a) detecting, based on a scan of the backup file set, malware in the backup file set, (b) determining, based on a location of the malware in a system file structure of the backup file set, a subgraph of the system file structure of the backup file set that includes the malware, (c) identifying a string prefix for the subgraph of the system file structure of the backup file set, (d) using an index to cross-reference the string prefix to a pointer identifying a subgraph of an original file set, and (e) scanning a file in the subgraph of the original file set for the malware. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for protecting passwords

    公开(公告)号:US11095636B1

    公开(公告)日:2021-08-17

    申请号:US16139490

    申请日:2018-09-24

    Abstract: The disclosed computer-implemented method for protecting passwords may include (i) intercepting network traffic indicating an attempted login procedure at a workload device to login to a protected resource, (ii) prompting a user, in response to intercepting the network traffic, and at an authentication device that has been registered to the user, to indicate whether to approve the attempted login procedure, (iii) collecting, at the authentication device, a credential for the attempted login procedure that was stored in a protected vault of the authentication device, (iv) providing, by the authentication device to the workload device, an authentication decision based on the collected credential, and (v) injecting, at the workload device, the authentication decision into a browser session to enable the user to complete the attempted login procedure to login to the protected resource. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for detecting misuse of online service access tokens

    公开(公告)号:US11048809B1

    公开(公告)日:2021-06-29

    申请号:US16130254

    申请日:2018-09-13

    Abstract: The disclosed computer-implemented method for detecting misuse of online service access tokens may include (1) receiving a user permission token to access an online service that manages one or more user resources, (2) monitoring, based on utilization of the user permission token, usage data associated with an access token issued to a relying party for accessing the user resources managed by the online service, (3) identifying, based on the usage data, activity associated with the access token being misused by the relying party, and (4) performing, a security action that protects the user resources against the activity associated with the access token being misused by the relying party. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for preparing honeypot computer files

    公开(公告)号:US11032319B1

    公开(公告)日:2021-06-08

    申请号:US16119168

    申请日:2018-08-31

    Abstract: The disclosed computer-implemented method for preparing honeypot computer files may include (1) identifying, at a computing device, a search term used by a cyber attacker in an electronic search request, (2) identifying, without regard to a search access restriction, a sensitive computer document in search results stemming from the electronic search request, (3) creating, as a security action in response to the electronic search request, a honeypot computer file based on the sensitive computer document and including the identified search term, and (4) placing the honeypot computer file in the search results. Various other methods, systems, and computer-readable media are also disclosed.

Patent Agency Ranking