METHOD AND SYTEM FOR PROTECTING PRIVACY OF USERS IN SESSION RECORDINGS

    公开(公告)号:US20210243233A1

    公开(公告)日:2021-08-05

    申请号:US16780445

    申请日:2020-02-03

    Abstract: A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.

    SYSTEM FOR PREVENTING ACCESS TO SENSITIVE INFORMATION AND RELATED TECHNIQUES

    公开(公告)号:US20210182440A1

    公开(公告)日:2021-06-17

    申请号:US16716761

    申请日:2019-12-17

    Abstract: Techniques are disclosed for context-aware sensitive content leak prevention. An example methodology implementing the techniques includes, responsive to a determination that sensitive content is being displayed on a first device, determining whether a second device is proximate the first device, the second device having at least one recording means. The method also includes, responsive to a determination that the second device is proximate the first device, causing disabling of the at least one recording means on the second device to thereby prevent the sensitive content from being recorded using the at least one recording means of the second device. The at least one recording means may include one of a camera, an audio recorder, or an image capture device. In some cases, the second device may be a mobile device.

    ERROR REMEDIATION SYSTEMS AND METHODS
    113.
    发明申请

    公开(公告)号:US20200327008A1

    公开(公告)日:2020-10-15

    申请号:US16381389

    申请日:2019-04-11

    Abstract: A computer system is provided. The computer system includes a memory, a network interface, and at least one processor configured to monitor a user interface comprising a plurality of user interface elements; detect at least one changed element within the plurality of user interface elements; classify, in response to detecting the at least one changed element, the at least one changed element as either indicating or not indicating an error; generate, in response to classifying the at least one changed element as indicating an error, an error signature that identifies the at least one changed element; identify, using the error signature, a remediation for the error; and provide the remediation in association with the at least one changed element.

    Image steganography detection
    114.
    发明授权

    公开(公告)号:US12292972B2

    公开(公告)日:2025-05-06

    申请号:US17658340

    申请日:2022-04-07

    Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.

    Systems and methods for phishing attack protection based on identity provider verification

    公开(公告)号:US12192233B2

    公开(公告)日:2025-01-07

    申请号:US17231618

    申请日:2021-04-15

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to provide phishing attack protection based on identity provider verification. The at least one processor is further configured to capture an image of a browser web page to which the user has navigated and identify the domain name associated with the browser web page. The at least one processor is further configured to determine that the captured image matches an image of a known identity provider web page. The at least one processor is further configured to detect a phishing attempt in response to the determination that the images match and that the domain name associated with the browser web page differs from the domain name associated with the identity provider web page.

    Systems and methods for protection against theft of user credentials by email phishing attacks

    公开(公告)号:US11962618B2

    公开(公告)日:2024-04-16

    申请号:US17135456

    申请日:2020-12-28

    CPC classification number: H04L63/1483 G06F16/953 G06Q10/107

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to provide protection against theft of user credentials by email phishing attacks. The at least one processor is further configured to identify a company name included in a received email; identify a link in the received email; extract a domain name from the identified link; search a linkmap for an existing record associated with the identified company name, wherein the linkmap comprises a collection of records, the records relating names of companies to trusted domain names; determine if the extracted domain name matches a trusted domain name of the existing record; and identify the received email as genuine in response to the determination of the match.

    User Interface Activation in a Secure Network System

    公开(公告)号:US20240015162A1

    公开(公告)日:2024-01-11

    申请号:US17860637

    申请日:2022-07-08

    CPC classification number: H04L63/104 H04L63/107 H04L41/22 H04L67/06

    Abstract: A process and system for improving a user experience when using remote browser applications is provided. While a remote browser application is being activated, including establishing an appropriate communication channel and launching the application, pre-cached content may be provided to the client device and user for immediate display and user interaction. User interaction with the pre-cached content may be recorded and stored and transferred to the remote browser application and live content upon completion of the remote browser application and session activation. In some examples, pre-caching the content may include retrieving the content from the content source and removing and/or adding code and data to one or more content files. The cached content may be updated based on various criteria.

    Electronic resource access
    119.
    发明授权

    公开(公告)号:US11824862B1

    公开(公告)日:2023-11-21

    申请号:US17346437

    申请日:2021-06-14

    CPC classification number: H04L63/101

    Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, receiving input via an application of the computing device, the input to initiate navigation to an electronic resource, and determining that navigation to the electronic resource via the application is insecure. The method also includes, by the computing device, responsive to the determination that the navigation is insecure, modifying the navigation to the electronic resource so as to prevent navigation to the electronic resource via the application.

    ANTI-PHISHING BASED ON WRONG FLOW DETECTION
    120.
    发明公开

    公开(公告)号:US20230362193A1

    公开(公告)日:2023-11-09

    申请号:US17736664

    申请日:2022-05-04

    CPC classification number: H04L63/1483 H04L63/0838 G06F21/53

    Abstract: A computer system configured to determine safety of a suspected website is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive a request to visit the suspected website; send an incorrect password to the suspected website; receive a reply from the suspected website; and determine, based on the reply to the incorrect password, whether to execute a precautionary operation. The system may proceed with the request responsive to the reply including an error notification, as identified based on one or more of: a Document Object Model (DOM) tag; a re-appearance of a sign-in control; or an Application Programming Interface (API) call. Alternatively, the system may abandon the request responsive to the reply being affirmative, for example including a prompt or input field for a one-time password.

Patent Agency Ranking