Systems and methods for protecting users

    公开(公告)号:US10936712B1

    公开(公告)日:2021-03-02

    申请号:US16538760

    申请日:2019-08-12

    摘要: The disclosed computer-implemented method for protecting users may include (i) intercepting an attempt to login to a user account of an application using a login credential, (ii) preventing a user corresponding to the user account from revealing personally identifiable information by populating a field for the login credential with a value for an identity-masking persona as a substitute for the personally identifiable information, and (iii) enabling a completion of the attempt to login to the user account of the application using the value for the identity-masking persona, rather than the personally identifiable information, to provide the user with access to an online resource through the application. Various other methods, systems, and computer-readable media are also disclosed.

    Action detection and network security policy enforcement based on wireless-transmission interference patterns

    公开(公告)号:US10924513B1

    公开(公告)日:2021-02-16

    申请号:US15941319

    申请日:2018-03-30

    摘要: Systems of the present disclosure can detect user activities on endpoint devices based on the interference patterns those actions produce in wireless transmissions between those endpoint devices and another device (e.g., an edge device operating as a web security gateway). A web security gateway sends time-series data describing interference on wireless transmissions sent from, or received by, an agentless endpoint device to a network security service. In response, the network security service uses a machine-learning model to infer a type of an action that occurred on the agentless endpoint device concurrently with the wireless transmissions. The network security service sends an indication of the action type to the web security gateway. The web security gateway applies a network security policy to the action or a network communication associated therewith.

    Security for IoT home voice assistants

    公开(公告)号:US10887351B2

    公开(公告)日:2021-01-05

    申请号:US15969193

    申请日:2018-05-02

    IPC分类号: H04L29/06

    摘要: A method for implementing security of Internet of Things (IoT) home voice assistants is described. In one embodiment, a computer-implemented method for implementing a security policy with a voice assistant includes obtaining, by one or more computing devices, encrypted traffic from a voice assistant; identifying, by the one or more computing devices, a user voice command in the encrypted traffic based at least in part on one or more identifiable attributes of the encrypted traffic; determining, by the one or more computing devices, the user voice command triggers at least one security policy; and upon determining the user voice command triggers the at least one security policy, performing, by the one or more computing devices, a security action that implements the at least one security policy. In some cases, the method may include obtaining an audio recording of the user voice command with a microphone built into the router.

    Systems and methods for protecting against outgoing calls to malicious phone numbers

    公开(公告)号:US10819847B1

    公开(公告)日:2020-10-27

    申请号:US16135331

    申请日:2018-09-19

    IPC分类号: H04M3/42 H04M1/725

    摘要: The disclosed computer-implemented method for protecting against outgoing calls to malicious phone numbers may include (1) intercepting, at a computing device, an attempt to initiate an outgoing phone call, (2) disabling, at the computing device and at least temporarily, the attempt, (3) querying a reputation server for a reputation of an outgoing phone number associated with the attempt, (4) receiving, at the computing device, reputation results from the reputation server, and (5) performing a security action comprising displaying, on a user display of the computing device and prior to enabling the attempt, at least a portion of the reputation results. Various other methods, systems, and computer-readable media are also disclosed.

    System and method of dynamic backup policy generation

    公开(公告)号:US10810088B1

    公开(公告)日:2020-10-20

    申请号:US15154373

    申请日:2016-05-13

    发明人: Lei Gu Ilya Sokolov

    摘要: A system and method of dynamic backup policy generation based upon a user's behavior is provided. The method may include detecting a user's usage pattern of files within a computing system based upon the user's backup or restore activities. In some embodiments, the backup system may identify the files that have been modified and calculate the percentage of modification away from a predetermined baseline or another previously stored version. The system may generate a list of the identified files along with these percentages to form the user's usage pattern. The method may further include generating a user's profile including files having high access rates in accordance with this usage pattern and adjusting a backup policy based upon the user's profile such that these files are backed-up more frequently. The backup policy may also be adjusted based upon a detected level of risk associated with the user.

    Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)

    公开(公告)号:US10795999B1

    公开(公告)日:2020-10-06

    申请号:US16146217

    申请日:2018-09-28

    摘要: Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP). In one embodiment, a method may include accessing an actual data value, generating a perturbed data value by adding noise to the actual data value, aggregating the perturbed data values to at least partially cancel out aggregate noise of the aggregated perturbed data values at a population level, analyzing, using CLDP, the aggregated perturbed data values to identify a computer security threat, and in response, protecting against the computer security threat by performing a remedial action. The amount of noise added to each actual data value may be probabilistically computed such that a probability of noise being added decreases as an amount of added noise increases. The perturbed data values may preserve privacy of the actual data values.

    Systems and methods for controlling access

    公开(公告)号:US10783728B1

    公开(公告)日:2020-09-22

    申请号:US16227535

    申请日:2018-12-20

    摘要: The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card. Various other methods, systems, and computer-readable media are also disclosed.

    Detecting and preventing execution of a malicious computer application using utility driven graph summarization

    公开(公告)号:US10742670B1

    公开(公告)日:2020-08-11

    申请号:US15956608

    申请日:2018-04-18

    摘要: Utility driven graph summarization for use in detecting and preventing malicious computer application. In one embodiment, a method may include receiving a graph comprising a plurality of nodes and a plurality of edges, prioritizing each of the plurality of nodes by way of assigning a relative importance value to each node of the plurality of nodes, combining at least two nodes of the plurality of nodes into a supernode based at least on the relative importance value of each node, calculating a utility penalty value for creating a superedge between the supernode and a node neighboring the supernode, creating the superedge between the supernode and the node neighboring the supernode if the utility penalty value satisfies a pre-determined penalty threshold, calculating a utility level based at least in part on creating the supernode and the superedge, and repeating the method until the calculated utility level satisfies a pre-determined threshold.

    Content-based automatic backup of images

    公开(公告)号:US10725870B1

    公开(公告)日:2020-07-28

    申请号:US15860548

    申请日:2018-01-02

    发明人: Lei Gu Ilya Sokolov

    IPC分类号: G06F11/14 G06F16/51

    摘要: The content of each specific image file on an endpoint is analyzed. Each analyzed image file is categorized based on the results of analyzing its content. The analysis can be in the form identifying one or more objects graphically represented in given image files, and the categorization of image files can be based on these identified graphically represented object(s). A backup policy is configured to automatically backup specific image files on the endpoint, based on their content as per the categorization. Information concerning the content-based categorization of the image files on the endpoint can be output to a user. In response, directives for backing-up image files according to their content-based categorization can be received from the user. Specific images files are backed-up automatically, regardless of their location on the endpoint, according to the configured backup policy.

    Systems and methods for enforcing privacy in cloud security

    公开(公告)号:US10706167B1

    公开(公告)日:2020-07-07

    申请号:US15646522

    申请日:2017-07-11

    摘要: A computer-implemented method for enforcing privacy in cloud security may include (i) identifying, by a computing device, a set of files in a backup process for a cloud service, (ii) determining, by the computing device, that at least one file in the set of files is a private file, (iii) modifying, by the computing device encrypting the private file, the set of files in the backup process, (iv) completing the backup process for the cloud service with the modified set of files, and (v) enforcing a security policy of the cloud service based on a scan of file hashes. Various other methods, systems, and computer-readable media are also disclosed.