UNIDIRECTIONAL GATEWAY MEDIATED MULTIPLEXING OF CONCURRENT DATA MESSAGE STREAMS

    公开(公告)号:US20230087954A1

    公开(公告)日:2023-03-23

    申请号:US18054110

    申请日:2022-11-09

    Applicant: OPSWAT Inc.

    Abstract: A method includes transmitting data by a first interface card in a trusted domain. A second interface card in an untrusted domain receives the data. The second interface card stores the data in a first memory location of a plurality of first memory locations in the untrusted domain and verifies integrity of the data. The second interface card writes a result of the verifying in a second memory location of a plurality of second memory locations in the untrusted domain. The first interface card retrieves the result of the verifying from the second memory location of the plurality of second memory locations in the untrusted domain. The first interface card creates a table configured to identify and track a state of the second memory location of the plurality of second memory locations in the untrusted domain corresponding to the data received from the first interface card in the trusted domain.

    UNIDIRECTIONAL GATEWAY MEDIATED DELIVERY OF DATA MESSAGES

    公开(公告)号:US20230085632A1

    公开(公告)日:2023-03-23

    申请号:US18054107

    申请日:2022-11-09

    Applicant: OPSWAT Inc.

    Abstract: A method includes transmitting, by a first interface card in a trusted domain, data. A second interface card in an untrusted domain receives the data. The second interface card stores the data to a first memory location in the untrusted domain, and verifies integrity of the data. The second interface card writes a result of the verifying in a second memory location in the untrusted domain. The first interface card in the trusted domain retrieves the result of the verifying from the second memory location in the untrusted domain. The first interface card in the trusted domain determines if the data in the transmitting was received by the second interface card based on the result.

    Computer security vulnerability assessment

    公开(公告)号:US10554681B2

    公开(公告)日:2020-02-04

    申请号:US16174139

    申请日:2018-10-29

    Applicant: OPSWAT, Inc.

    Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    ANALYZING FILES USING A KERNEL MODE OF A VIRTUAL MACHINE

    公开(公告)号:US20230394146A1

    公开(公告)日:2023-12-07

    申请号:US17805677

    申请日:2022-06-06

    Applicant: OPSWAT Inc.

    Inventor: Ran Dubin

    Abstract: A method includes receiving, by a computerized system, a file in network traffic to an enterprise system. The computerized system identifies data associated with the file. The computerized system receives a policy based on the data associated with the file for an event of the file. The computerized system executes the file in a user mode of a virtual machine. A driver in a kernel mode of the virtual machine analyzes the event of the file based on the policy during the executing of the file. When the event violates the policy, the computerized system denies an entry of the file to the enterprise system.

    Unidirectional gateway mediated multiplexing of concurrent data message streams

    公开(公告)号:US11811738B2

    公开(公告)日:2023-11-07

    申请号:US17651387

    申请日:2022-02-16

    Applicant: OPSWAT Inc.

    Abstract: A method includes a processor in a trusted domain receiving a first request having a plurality of messages for a device in an untrusted domain. The processor assigns a memory location having data segments and status segments. The memory location is accessible by an untrusted side interface card. The processor transmits a first message to a first data segment. The processor receives a first value associated with the first message from a first status segment. The processor determines whether the first value indicates that the first message has been received and stores a first representation of a successful data transmission. The processor transmits a second message to a second data segment. The processor retrieves a second value from the second status segment. The processor determines whether the second value indicates that the second message has been received and stores a second representation of the successful data transmission.

    Computer security vulnerability assessment

    公开(公告)号:US11165811B2

    公开(公告)日:2021-11-02

    申请号:US16780674

    申请日:2020-02-03

    Applicant: OPSWAT, Inc.

    Abstract: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    METHOD FOR CONTENT DISARM AND RECONSTRUCTION (CDR)

    公开(公告)号:US20190268352A1

    公开(公告)日:2019-08-29

    申请号:US15905441

    申请日:2018-02-26

    Applicant: OPSWAT, Inc.

    Abstract: A Content Disarm and Reconstruction (CDR) method is disclosed including a computer receiving an input file having a file format configured with a structured storage. The computer disassembles the structured storage into at least one subfile. Each subfile is a stream subfile. For each subfile, the computer identifies an item in the stream subfile. The computer analyzes the item in the stream subfile for an unwanted behavior by determining an acceptability of the unwanted behavior, distinguishing a visibility of the item, and recognizing a necessity of the item. The computer, based on a result of the analyzing step, processes the item in the stream subfile resulting in a processed subfile. The computer assembles the processed subfiles into an output file having the same file format as the file format as the input file.

Patent Agency Ranking