SYSTEMS AND METHODS FOR MONITORING A PLURALITY OF VEHICLES

    公开(公告)号:US20240078309A1

    公开(公告)日:2024-03-07

    申请号:US18485819

    申请日:2023-10-12

    Applicant: VEHIQILLA INC.

    Inventor: Ali Jamshed KHAN

    CPC classification number: G06F21/552 G06F21/577

    Abstract: Systems and methods for monitoring a plurality of vehicles are provided. The method involves operating at least one processor to: determine, based on cyber risk data corresponding to a plurality of ECU models, a cyber risk score for each ECU model; receive, from each of the vehicles, one or more security logs; map, for each security log, i.) the ECU model of the ECU that recorded the security log, and ii.) the cyber risk score of the ECU model corresponding to the security log; detect a cybersecurity threat in at least some of the vehicles based on i.) at least one event in at least one security log, and ii.) at least one cyber risk score corresponding to the at least one security log; and in response to detecting the cybersecurity threat, transmit an alert indicating at least one vehicle corresponding to the at least one security log.

    Malchain detection
    53.
    发明授权

    公开(公告)号:US11924231B2

    公开(公告)日:2024-03-05

    申请号:US17275947

    申请日:2019-09-11

    CPC classification number: H04L63/1425 G06F21/552 G06F21/566 H04L63/145

    Abstract: A method and apparatus are disclosed for malware detection in service function chains. In one embodiment, a method includes receiving data associated with a service function chain, the service function chain comprising a plurality of virtual components organized into a plurality of hierarchical levels and the data indicating interactions between the virtual components when processing at least one packet through the service function chain; filtering the received data based at least in part on a time-between order relation of the interactions between the virtual components and the hierarchical level of the virtual component; and generating a harmony feature vector for the service function chain by applying a featurization function on the filtered data, the harmony feature vector including metrics, the metrics calculated according to the featurization function for each hierarchical level being based at least in part on metrics calculated for at least one lower hierarchical level.

    SYSTEMS AND METHODS FOR A VIRUS SCANNING ROUTER

    公开(公告)号:US20240061935A1

    公开(公告)日:2024-02-22

    申请号:US18501824

    申请日:2023-11-03

    CPC classification number: G06F21/562 G06F21/552

    Abstract: A virus scanning router may manages a local network, including routing network traffic between devices on the network and routing network traffic being sent to and from such devices via an external communication system. The virus scanning router remotely scans for viruses the files stored on one or more such devices on the network. The virus scanning router may be a device trusted by the other devices on local network to facilitate the virus scanning router reading and scanning one or more files stored on such devices for viruses. The virus scanning router also takes corrective actions such as isolating the infected device or isolating an affected network zone to which the remote device belongs.

    MONITORING LIVE MEDIA STREAMS FOR SENSITIVE DATA LEAKS

    公开(公告)号:US20240061929A1

    公开(公告)日:2024-02-22

    申请号:US17891647

    申请日:2022-08-19

    CPC classification number: G06F21/552 G06F21/6245 G06F2221/034

    Abstract: An embodiment includes capturing media data by sampling a media stream received from a web conferencing application during a web conference session between computing devices over a network, wherein the web conference session comprises content communicated as the media stream from a first computing device to a second computing device during the web conference session. The embodiment also includes generating a series of character codes representative of content of the media data by segmenting the media data and identifying character codes that most closely match respective segments. The embodiment also includes identifying sensitive information included in the series of character codes. The embodiment also includes generating, responsive to identifying the sensitive information, a notification regarding a potential leak of sensitive information, where the notification comprises an indication of the sensitive information identified in the series of character codes.

    SYSTEMS AND METHODS FOR ASSESSING CYBERSECURITY EFFICACY OF ENTITIES AGAINST COMMON CONTROL AND MATURITY FRAMEWORKS USING EXTERNALLY-OBSERVED DATASETS

    公开(公告)号:US20240045950A1

    公开(公告)日:2024-02-08

    申请号:US18359183

    申请日:2023-07-26

    CPC classification number: G06F21/552 G06F2221/034

    Abstract: Systems and methods are disclosed for determining control insights corresponding to an entity based on configurable rules. Event datasets corresponding to a plurality of cybersecurity events associated with an entity during a first time period are received. The event datasets are enriched with a plurality of indicators mapped to the plurality of cybersecurity based on a respective event type corresponding to each of the plurality of cybersecurity events. Control insights corresponding to the entity are determined based on a comparison of the one or more enriched event datasets and a plurality of rules. At least one rule is defined by (i) a rule type and (ii) a first subset of the plurality of indicators that is provided as an input to the at least one rule. The control insights each provide an indication of a state of a respective cybersecurity control mechanism corresponding to the entity.

Patent Agency Ranking