ONE-CLASS THREAT DETECTION USING FEDERATED LEARNING

    公开(公告)号:US20250097242A1

    公开(公告)日:2025-03-20

    申请号:US18468213

    申请日:2023-09-15

    Abstract: A machine learning model is trained to classify data as malicious or benign, including receiving the machine learning model in a user device and training the machine learning model on the user device user-generated data that has been classified as known benign. A result of the training is sent to a remote server. Training samples on the user device may be classified automatically, such as classifying sent emails, instant messages, or other content generated by the user as benign.

    SYSTEMS AND METHODS FOR DETECTING AND MITIGATING THREATS IN ELECTRONIC MESSAGES

    公开(公告)号:US20250097263A1

    公开(公告)日:2025-03-20

    申请号:US18469117

    申请日:2023-09-18

    Abstract: Systems and methods enable a notification based on determining a particular electronic message is associated with a particular cluster of electronic messages. A plurality of electronic messages from a first plurality of accounts directed to a second plurality of accounts over a network are received. The plurality of electronic messages are compared to determine a plurality of clusters of electronic messages. A particular electronic message is received from a first particular account directed to a second particular account. The particular electronic message is compared to the plurality of clusters of electronic messages to determine that the particular electronic message is associated with a particular cluster of the plurality of clusters of electronic messages. A notification is provided based on the determining that the particular electronic message is associated with the particular cluster of the plurality of clusters of electronic messages.

    SYSTEMS AND METHODS FOR VERIFYING DIGITAL DOCUMENTS

    公开(公告)号:US20250028863A1

    公开(公告)日:2025-01-23

    申请号:US18356439

    申请日:2023-07-21

    Abstract: A system and method are provided by which an electronic address associated with a user is monitored. Based on the monitoring, an electronic message is detected including a digital document. A cryptographic function is applied to the digital document to generate a hash which is rendered accessible at a network location. An identification of the network location of the hash is transmitted to a first computing system associated with the user.

Patent Agency Ranking