System and method to detect and prevent Phishing attacks

    公开(公告)号:US20210234837A1

    公开(公告)日:2021-07-29

    申请号:US17227324

    申请日:2021-04-11

    IPC分类号: H04L29/06 H04W12/02

    摘要: Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.

    Push based encryption
    75.
    发明授权

    公开(公告)号:US10554629B2

    公开(公告)日:2020-02-04

    申请号:US15197783

    申请日:2016-06-30

    摘要: A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.

    Method and system for creating and receiving neutralized data items

    公开(公告)号:US10382493B2

    公开(公告)日:2019-08-13

    申请号:US15177352

    申请日:2016-06-09

    IPC分类号: H04L29/06 G06F16/18

    摘要: Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the second entity. A security protocol that applies rules and policies is applied to the first data item to create a second data item that is a neutralized version of the first data item. The first data item and the second data item are converted into comparable forms. The second data item is analyzed against the first data item by comparing the comparable forms to form at least one comparison measure. The second data item is received on the endpoint if the at least one comparison measure satisfies a threshold criterion. The security protocol is modified to adjust the applied rules and policies if the at least one comparison measure does not satisfy the threshold criterion.

    Key exchange and mutual authentication in low performance devices

    公开(公告)号:US10243741B2

    公开(公告)日:2019-03-26

    申请号:US15473656

    申请日:2017-03-30

    摘要: Securely exchanging keys to establish secure connections to low powered connected devices (LPCDs), such as smart devices and IoT (Internet Of Things) devices, and mutual authentication between these devices and third party controllers is accomplished via a higher performance machine configured with a dedicated remote service (DRS). A known symmetric pre-shared key (PSK) is used to establish a secure first connection between the LPCD and the DRS using another symmetric key. The DRS can then use asymmetric key exchange to securely send a new symmetric key to the 3P, and send the same new symmetric key to the LPCD using the secure first connection. This facilitates LPCDs to securely establish secure communications with other devices, in particular for control by third party (3P) devices. This also allows authentication of the LPCD with cloud services, and enables a DRS to vouch for associated devices to other DRSs.

    Method for synchronized BGP and VRRP failover of a network device in a network
    79.
    发明授权
    Method for synchronized BGP and VRRP failover of a network device in a network 有权
    网络中网络设备的同步BGP和VRRP故障转移方法

    公开(公告)号:US09537756B2

    公开(公告)日:2017-01-03

    申请号:US13913537

    申请日:2013-06-10

    CPC分类号: H04L45/22

    摘要: A network device which communicates with peers using Border Gateway Protocol (BGP) advertises to one or more peers a first Multi-Exit Discriminator (MED) when all sessions are in ‘established’ state, and a second MED when one or more sessions are in a non-‘established’ state. The second MED is higher than the first MED and higher than the MED advertised by the backup network device, causing peers to prefer the backup device. If the device is also configured for Virtual Router Redundancy Protocol (VRRP), when the device advertises the first MED, virtual routers are transitioned to ‘master’ state, and when the device advertises the second MED, virtual routers are transitioned to ‘backup’ state.

    摘要翻译: 当所有会话处于“建立”状态时,使用边界网关协议(BGP)与对等体通信的网络设备向一个或多个对等体通告第一多出口鉴别器(MED),当一个或多个会话处于 非“建立”状态。 第二个MED高于第一个MED,高于备份网络设备发布的MED,导致对等体更喜欢备份设备。 如果设备也配置了虚拟路由器冗余协议(VRRP),当设备发布第一个MED时,虚拟路由器转换为“主”状态,当设备发布第二个MED时,虚拟路由器转为“备份” 州。

    Syslog parser
    80.
    发明授权
    Syslog parser 有权
    Syslog解析器

    公开(公告)号:US09483583B2

    公开(公告)日:2016-11-01

    申请号:US11875955

    申请日:2007-10-22

    IPC分类号: G06F17/30

    摘要: A computerized method performed in a computer operatively connected to storage. Parsing rules are determined for parsing logs output as text and/or symbols from multiple devices in a computer network. The logs are stored in the storage. Multiple log samples are sampled from the logs. The log samples are input into an application running on the computer. The log samples are each sectioned into multiple sections which include variable information separated by static structural text. Each of the log samples is processed by: comparing the sections to a list of regular expressions. The list is maintained in the storage, and upon matching a matched section of the sections to a matched regular expression from the list of the regular expressions, the matched section is tagged with a tag associated with the matched regular expression. The tag associated to the matched regular expression is stored and combined with any unmatched sections and with the static structural text to create a log pattern. The log pattern is stored in a table only if the log pattern is distinct from all log patterns previously stored in the table.

    摘要翻译: 在可操作地连接到存储器的计算机中执行的计算机化方法。 确定解析规则以将计算机网络中的多个设备的日志输出解析为文本和/或符号。 日志存储在存储器中。 从日志中采样多个日志样本。 日志样本被输入到在计算机上运行的应用程序中。 日志样本分为多个部分,包括由静态结构文本分隔的变量信息。 每个日志样本都通过以下方式处理:将部分与正则表达式列表进行比较。 该列表被保存在存储器中,并且在将匹配的段的部分匹配到正则表达式的列表中的匹配的正则表达式之后,匹配的部分被标记有与匹配的正则表达式相关联的标签。 与匹配的正则表达式关联的标签与任何不匹配的部分和静态结构文本进行存储和组合,以创建日志模式。 仅当日志模式与先前存储在表中的所有日志模式不同时,日志模式才会存储在表中。