Methods and systems for identifying malware through differences in cloud vs. client behavior

    公开(公告)号:US09787695B2

    公开(公告)日:2017-10-10

    申请号:US14667461

    申请日:2015-03-24

    Abstract: A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign or non-benign. This may be accomplished via the server performing static and/or dynamic analysis operations, generating a behavior information structure that describes or characterizes the range of correct or expected behaviors of the software application, and sending the behavior information structure to a computing device. The computing device may compare the received behavior information structure to a locally generated behavior information structure to determining whether the observed behavior of the software application differs or deviates from the expected behavior of the software application or whether the observed behavior is within the range of expected behaviors. The computing device may increase its level of security/scrutiny when the behavior information structure does not match the local behavior information structure.

    SECURE SOFTWARE AUTHENTICATION AND VERIFICATION
    12.
    发明申请
    SECURE SOFTWARE AUTHENTICATION AND VERIFICATION 有权
    安全软件认证和验证

    公开(公告)号:US20160306976A1

    公开(公告)日:2016-10-20

    申请号:US14687783

    申请日:2015-04-15

    Abstract: A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve a cryptographic operation over the software and a digital signature of the software. A verification tag may be generated for the software if authentication of the software is successful, the verification tag based on the software and at least a device-specific secret data. The verification tag may be stored within the device. Each subsequent time the software is loaded for execution it may be verified (not authenticated) by using the verification tag to confirm that the software being loaded is the same as the one used to generate the verification tag while avoiding authentication of the software.

    Abstract translation: 第一个软件被加载以由设备执行,存储在非安全存储器中的软件被认证。 验证软件可能涉及对软件的加密操作和软件的数字签名。 如果软件的认证成功,则可以为软件生成验证标签,基于软件的验证标签和至少特定于设备的秘密数据。 验证标签可以存储在设备内。 在随后的软件加载执行之后,可以通过使用验证标签来确认正在加载的软件与用于生成验证标签的软件相同,同时避免软件的认证来验证(未认证)。

    Method and System of Detecting Malicious Video Advertising Impressions
    13.
    发明申请
    Method and System of Detecting Malicious Video Advertising Impressions 审中-公开
    检测恶意视频广告印象的方法和系统

    公开(公告)号:US20160267529A1

    公开(公告)日:2016-09-15

    申请号:US14642414

    申请日:2015-03-09

    CPC classification number: G06Q30/0248 G06Q30/0241 G06Q30/0277

    Abstract: The embodiments include methods and systems for detecting advertising fraud in a computing device by monitoring information received in a receiver component of the computing device, monitoring information received in a render component of the computing device, comparing the information received in the receiver component to the information received in the render component to generate comparison results, using the comparison results to determine whether there are discrepancies between the received information and the rendered information, and performing fraud prevention operations in response to determine that there are discrepancies between the received information and the rendered information. The fraud prevention operations may include dropping a connection to cease receiving the information in the receiver component, sending negative or position feedback to the service provider or a security server, and performing other similar operations.

    Abstract translation: 实施例包括通过监视在计算设备的接收器组件中接收的信息来监视计算设备中的广告欺诈的方法和系统,监视在计算设备的呈现组件中接收的信息,将接收器组件中接收的信息与信息进行比较 在所述渲染组件中接收以产生比较结果,使用所述比较结果来确定所接收的信息和所呈现的信息之间是否存在差异,并且响应于确定所接收的信息和所呈现的信息之间存在差异来执行防欺诈操作 。 欺诈预防操作可以包括丢弃连接以停止接收接收器组件中的信息,向服务提供商或安全服务器发送否定或位置反馈,以及执行其他类似的操作。

    Dynamic resource matching system
    14.
    发明授权
    Dynamic resource matching system 有权
    动态资源匹配系统

    公开(公告)号:US09443255B2

    公开(公告)日:2016-09-13

    申请号:US14170415

    申请日:2014-01-31

    Abstract: A method, apparatus, and system are provided for implementing resource and/or location-based matching services between a wireless terminal (e.g., mobile phone) user and one or more resources. A novel infrastructure supports resource and/or location based matching services over a wireless network. A back-end system includes a database, server, and match engine that are configured match a user with one or more resources based on the user's characteristics, preferences, and/or location. Such resources include (1) other users, (2) targeted advertising, (3) businesses/networking opportunities, and/or (4) locate a nearby service or store. A flexible database architecture supports application-specific resources which facilitate the deployment of various matching services. Application developers are thus able to implement different resource-matching applications for wireless devices through a common back-end infrastructure. Additionally, the match engine may include a feedback mechanism that permits the match engine to learn a user's preferences.

    Abstract translation: 提供了一种用于在无线终端(例如,移动电话)用户和一个或多个资源之间实现资源和/或基于位置的匹配服务的方法,装置和系统。 新颖的基础设施通过无线网络支持资源和/或基于位置的匹配服务。 后端系统包括数据库,服务器和匹配引擎,其被配置为基于用户的特征,偏好和/或位置与一个或多个资源匹配用户。 这些资源包括(1)其他用户,(2)有针对性的广告,(3)企业/网络机会,和/或(4)找到附近的服务或商店。 灵活的数据库架构支持应用程序特定的资源,便于各种匹配服务的部署。 因此,应用程序开发人员可以通过常见的后端基础架构实现针对无线设备的不同资源匹配应用程序。 另外,匹配引擎可以包括允许匹配引擎学习用户偏好的反馈机制。

    Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device
    16.
    发明授权
    Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device 有权
    用于检测针对移动设备的行为安全机制的恶意软件和攻击的方法和系统

    公开(公告)号:US09357397B2

    公开(公告)日:2016-05-31

    申请号:US14338838

    申请日:2014-07-23

    Abstract: A behavior-based security system of a computing device may be protected from non-benign behavior, malware, and cyber attacks by configuring the device to work in conjunction with another component (e.g., a server) to monitor the accuracy and performance of the security system, and determine whether the system is working correctly, efficiently, or as expected. This may be accomplished via the server generating artificial attack software, sending the generated artificial attack software to the mobile device to simulate non-benign behavior in the mobile device, such as a cyber attack, and determining whether the behavior-based security system of the mobile device responded adequately to the simulated non-benign behavior. The sever may send a dead-man signal to the mobile device in response to determining that the behavior-based security system of the mobile device did not respond adequately to the simulated non-benign behavior.

    Abstract translation: 计算设备的基于行为的安全系统可以通过将该设备与另一个组件(例如,服务器)配合工作来监视安全性的准确性和性能,从而防止非良性行为,恶意软件和网络攻击 系统,并确定系统是否正常,有效或正常工作。 这可以通过产生人造攻击软件的服务器来实现,将生成的人造攻击软件发送到移动设备以模拟移动设备中的非良性行为,例如网络攻击,以及确定是否基于行为的安全系统 移动设备对模拟的非良性行为作出了充分的反应。 响应于确定移动设备的基于行为的安全系统对模拟的非良性行为没有充分响应,服务器可以向移动设备发送死人信号。

    SWITCHING A NETWORK CONNECTION FROM A FIRST NETWORK PROTOCOL TO A SECOND NETWORK PROTOCOL
    17.
    发明申请
    SWITCHING A NETWORK CONNECTION FROM A FIRST NETWORK PROTOCOL TO A SECOND NETWORK PROTOCOL 审中-公开
    从第一个网络协议切换到第二个网络协议的网络连接

    公开(公告)号:US20150312382A1

    公开(公告)日:2015-10-29

    申请号:US14795618

    申请日:2015-07-09

    Abstract: Systems and methods for switching between communicating according to a first network protocol and a second network protocol are provided. The provided systems and methods multiplex received communications according to the first and second network protocols and select one of the network protocols based on a quality or throughput of the network protocol without terminating any existing sessions established according to either of the first or second network protocols.

    Abstract translation: 提供了根据第一网络协议和第二网络协议进行通信之间切换的系统和方法。 所提供的系统和方法根据第一和第二网络协议来复用接收到的通信,并且基于网络协议的质量或吞吐量选择网络协议之一,而不终止根据第一或第二网络协议中的任一个建立的任何现有会话。

    PEER CONNECTIVITY USING RECIPROCAL WIRELESS CONNECTIONS
    18.
    发明申请
    PEER CONNECTIVITY USING RECIPROCAL WIRELESS CONNECTIONS 有权
    使用双向无线连接的对等连接

    公开(公告)号:US20140247711A1

    公开(公告)日:2014-09-04

    申请号:US13938792

    申请日:2013-07-10

    CPC classification number: H04W76/15 H04W48/20 H04W88/06 H04W88/08

    Abstract: Reciprocal wireless connections may be established between a pair of devices to support failover, load balancing, traffic distribution, or other peer-to-peer connectivity features. Each device of a pair of devices may implement both a local wireless access point and a local wireless station to communicate with the other device of the pair of devices. Establishment of a second wireless connection between the pair of devices may be coordinated using a protocol extension of a first wireless connection. A multiplexing (MUX) component may coordinate traffic among the reciprocal wireless connections.

    Abstract translation: 可以在一对设备之间建立交互无线连接,以支持故障转移,负载平衡,流量分配或其他对等连接功能。 一对设备的每个设备可以实现本地无线接入点和本地无线站两者以与一对设备中的另一设备进行通信。 可以使用第一无线连接的协议扩展来协调该对设备之间的第二无线连接的建立。 多路复用(MUX)组件可以协调相互无线连接之间的通信。

    Small public-key based digital signatures for authentication
    19.
    发明授权
    Small public-key based digital signatures for authentication 有权
    小型基于公钥的数字签名用于认证

    公开(公告)号:US08799664B2

    公开(公告)日:2014-08-05

    申请号:US13859646

    申请日:2013-04-09

    CPC classification number: H04L9/3247 H04L9/3013 H04L2209/20

    Abstract: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.

    Abstract translation: 所公开的实施例允许已经同意使用公共模数N的两个实体之间的认证。认证包括生成伪随机串值; 基于模数N和伪随机串值产生公钥值; 生成与所述公钥值对应的私钥值; 接收验证者的公钥价值; 基于模数N,私钥值和验证者的公钥值生成共享秘密值; 使用共享秘密值计算认证签名值; 并发送用于认证的认证签名值。 当接收到认证签名时,生成公钥值和共享值来计算认证签名值。 此后,认证签名值进行比较和认证。

    Methods of using a peripheral component interconnect express (PCIE) device in a virtual environment
    20.
    发明授权
    Methods of using a peripheral component interconnect express (PCIE) device in a virtual environment 有权
    在虚拟环境中使用外围组件互连快递(PCIE)设备的方法

    公开(公告)号:US09411765B2

    公开(公告)日:2016-08-09

    申请号:US14136180

    申请日:2013-12-20

    CPC classification number: G06F13/4022 G06F9/45545 G06F2213/0026

    Abstract: Methods of using a peripheral component interconnect express (PCIe) device in a virtual environment are disclosed. Two operating systems operate on a primary device. One operating system acts as a guest in a virtual environment within the primary device. A peripheral device is coupled to the primary device through a wireless connection. In an exemplary embodiment, the wireless connection is a PCIe bridge. The host operating system interfaces directly with the memory elements and hardware of the primary device. The guest operating system interoperates with the memory elements and hardware of the peripheral device. The use of the PCIe wireless link allows the guest operating system to interface with the elements of the peripheral device with relatively little latency.

    Abstract translation: 公开了在虚拟环境中使用外围组件互连快速(PCIe)设备的方法。 两个操作系统在主设备上运行。 一个操作系统作为主设备中的虚拟环境中的guest虚拟机。 外围设备通过无线连接耦合到主设备。 在示例性实施例中,无线连接是PCIe桥。 主机操作系统直接与主设备的存储器元件和硬件接口。 客户操作系统与外围设备的存储器元件和硬件互操作。 使用PCIe无线链路允许客户操作系统以相对较小的延迟与外围设备的元件进行接口。

Patent Agency Ranking