-
公开(公告)号:US20240357021A1
公开(公告)日:2024-10-24
申请号:US18758759
申请日:2024-06-28
CPC分类号: H04L67/535 , G06F21/602 , H04L67/02
摘要: Disclosed embodiments relate to systems and methods for securing sensitive data during web sessions. Techniques include initiating, by a browser component executing on an endpoint device, a browser session associated with a user; monitoring, by the browser component, browser session data associated with the browser session, the browser session data being derived from one or more actions taken by the user; detecting at least one sensitive data element within the browser session data; determining whether the at least one sensitive data element triggers a control action; and based on a determination that the at least one sensitive data element triggers the control action, causing the control action to be performed.
-
公开(公告)号:US20240281506A1
公开(公告)日:2024-08-22
申请号:US18375127
申请日:2023-09-29
CPC分类号: G06F21/31 , G06F21/629
摘要: Disclosed embodiments relate to systems and methods for controlling web sessions. Techniques include identifying, by a browser component executing on an endpoint device, navigation by a user to a web application, the web application including at least one interface element; accessing, based on an identifier of the at least one interface element, at least one rule associated with the at least one interface element; identifying an interaction with the at least one interface element by the user; determining whether the interaction with the at least one interface element triggers the at least one rule; and based on a determination that the interaction with the at least one interface element triggers the at least one rule, causing a control action to be performed.
-
公开(公告)号:US20240134954A1
公开(公告)日:2024-04-25
申请号:US18400591
申请日:2023-12-29
发明人: Dima Barboi
IPC分类号: G06F21/33 , G06F21/32 , G06F21/60 , H04L9/40 , H04L67/141
CPC分类号: G06F21/335 , G06F21/32 , G06F21/604 , H04L63/0227 , H04L63/107 , H04L67/141 , G06F2221/2105
摘要: Disclosed embodiments relate to passwordless authentication. Techniques include identifying a request by a user to access an access-restricted target resource, the user operating on a client computing device and the request being associated with a network address for the access-restricted target resource; intercepting the request; generating a unique session identifier for the user; making available the unique session identifier to the user of the client computing device; performing dual-mode, passwordless authentication of the user; confirming, based on the dual-mode, passwordless authentication of the user, the identity of the user and the user's current use of the client computing device; and permitting, based on the confirmation, the user to access the access-restricted target resource.
-
公开(公告)号:US11954217B2
公开(公告)日:2024-04-09
申请号:US16950006
申请日:2020-11-17
发明人: Nimrod Stoler , Lavi Lazarovitz
CPC分类号: G06F21/6218 , G06F9/45558 , G06F11/0772 , G06F11/301 , G06F21/31 , G06F2009/45562 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595
摘要: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource: performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
-
公开(公告)号:US20230195882A1
公开(公告)日:2023-06-22
申请号:US17645434
申请日:2021-12-21
发明人: Mark CHERP , Nir CHAKO , Asaf HECHT
IPC分类号: G06F21/53
CPC分类号: G06F21/53 , G06F2221/2149
摘要: Described herein are methods, systems, and computer-readable storage media for dynamically configuring and deploying customizable secure wrappers. Techniques include identifying a code element and provisioning a first wrapper to execute the code element. Techniques further include allowing execution of the code element with the first wrapper, identifying a second wrapper for use in execution of the code element. The second wrapper is either customized for the code element or selected for the code element or both. Further, the code execution management system transitions from the first wrapper to the second wrapper, and allows execution of the code element with the second wrapper.
-
6.
公开(公告)号:US20230101198A1
公开(公告)日:2023-03-30
申请号:US17490711
申请日:2021-09-30
发明人: Asaf HECHT
摘要: A computer-implemented system is provided that includes instructions that, when executed by at least one processor, cause the at least one processor to perform operations for utilizing unique sequencing profiles that uniquely identify applications, the operations comprising: identifying an application having a plurality of application programming interface (API) calls associated with the application; retrieving, based on the identification of the application, a reference sequencing profile based on a plurality of code elements of the application; comparing the reference sequencing profile to a unique sequencing profile of the application, the unique sequencing profile being based on the plurality of API calls; determining, based on the comparison, a security score for the application; and performing a security action based on the security score.
-
公开(公告)号:US20230098812A1
公开(公告)日:2023-03-30
申请号:US17487319
申请日:2021-09-28
发明人: OFER RIVLIN
IPC分类号: H04L29/06
摘要: Disclosed embodiments relate to improving network security through real-time analysis of character similarities. Techniques include identifying a reference name, identifying a domain name, and performing a real-time analysis of the domain name. The real-time analysis may include applying a language processing protocol to the domain name, generating a score indicating a similarity between the domain name and the reference name, accessing a similarity threshold, and comparing the generated score with the similarity threshold. Further techniques include determining that the score exceeds the threshold and performing a security action.
-
公开(公告)号:US20220365777A1
公开(公告)日:2022-11-17
申请号:US17320769
申请日:2021-05-14
发明人: Gil MAKMEL
摘要: Disclosed embodiments relate to systems and methods for discovering and remediating hidden secrets in code files. Techniques include accessing an element of source code for analysis, performing a static analysis of the element of source code, and generating a control flow representation that identifies a plurality of functions and a sequence of functions associated with the element of the source code. The techniques may further include determining a probability of a hidden secret being included in the element of source code and performing a security action of at least one of: generating an alert, displaying a visual indication of the probability, generating a report associated with the hidden secret, sending data associated with the probability to a machine learning system for training the machine learning system, or a remediating action associated with the hidden secret.
-
公开(公告)号:US20220286446A1
公开(公告)日:2022-09-08
申请号:US17751088
申请日:2022-05-23
发明人: Asaf Hecht
IPC分类号: H04L9/40
摘要: Techniques include securely accessing data associated with authorization of an identity, the identity being capable of accessing an access-controlled network resource based on assertion of an authentication credential to an entity associated with the access-controlled network resource; generating a secret data element based on the data associated with authorization of the identity and based on application of a first secret logic algorithm; and making the secret data element available to be embedded in the authentication credential. The entity associated with the access-controlled network resource is configured to: validate the identity based on the secret data element being included in the authentication credential; and access the data associated with authorization of the identity based on application of a second secret logic algorithm to the secret data element.
-
公开(公告)号:US20220159029A1
公开(公告)日:2022-05-19
申请号:US17368136
申请日:2021-07-06
发明人: Arthur BENDERSKY , Tal ZIGMAN , Nir POPIK , Boris SPIVAK
摘要: Disclosed embodiments relate to systems and methods for detecting and addressing security risks in remote native access sessions. Techniques include identifying a remote native access session between a client and a target resource. The techniques may further include identifying connection data associated with the remote native access session obtained by a connection agent, wherein the connection data originates from the client and from a mobile device associated with a user, and comprises data indicative of at least one of: hardware of the client or mobile device, configuration settings of the client or mobile device, and network connection attributes of the client or mobile device. Techniques may further include comparing a first portion of the connection data associated with the client with a second portion of the connection data associated with the mobile device; and determining, based on the comparing, a security risk associated with the remote native access session.
-
-
-
-
-
-
-
-
-