SECURING SENSITIVE DATA DURING WEB SESSIONS
    1.
    发明公开

    公开(公告)号:US20240357021A1

    公开(公告)日:2024-10-24

    申请号:US18758759

    申请日:2024-06-28

    IPC分类号: H04L67/50 G06F21/60 H04L67/02

    摘要: Disclosed embodiments relate to systems and methods for securing sensitive data during web sessions. Techniques include initiating, by a browser component executing on an endpoint device, a browser session associated with a user; monitoring, by the browser component, browser session data associated with the browser session, the browser session data being derived from one or more actions taken by the user; detecting at least one sensitive data element within the browser session data; determining whether the at least one sensitive data element triggers a control action; and based on a determination that the at least one sensitive data element triggers the control action, causing the control action to be performed.

    CUSTOMIZED CONTROLS FOR SECURE WEB SESSION
    2.
    发明公开

    公开(公告)号:US20240281506A1

    公开(公告)日:2024-08-22

    申请号:US18375127

    申请日:2023-09-29

    IPC分类号: G06F21/31 G06F21/62

    CPC分类号: G06F21/31 G06F21/629

    摘要: Disclosed embodiments relate to systems and methods for controlling web sessions. Techniques include identifying, by a browser component executing on an endpoint device, navigation by a user to a web application, the web application including at least one interface element; accessing, based on an identifier of the at least one interface element, at least one rule associated with the at least one interface element; identifying an interaction with the at least one interface element by the user; determining whether the interaction with the at least one interface element triggers the at least one rule; and based on a determination that the interaction with the at least one interface element triggers the at least one rule, causing a control action to be performed.

    Secure Authentication
    3.
    发明公开

    公开(公告)号:US20240134954A1

    公开(公告)日:2024-04-25

    申请号:US18400591

    申请日:2023-12-29

    发明人: Dima Barboi

    摘要: Disclosed embodiments relate to passwordless authentication. Techniques include identifying a request by a user to access an access-restricted target resource, the user operating on a client computing device and the request being associated with a network address for the access-restricted target resource; intercepting the request; generating a unique session identifier for the user; making available the unique session identifier to the user of the client computing device; performing dual-mode, passwordless authentication of the user; confirming, based on the dual-mode, passwordless authentication of the user, the identity of the user and the user's current use of the client computing device; and permitting, based on the confirmation, the user to access the access-restricted target resource.

    ORCHESTRATION AND GENERATION OF MINIMAL SURFACE OPTIMIZED UNIKERNELS

    公开(公告)号:US20230195882A1

    公开(公告)日:2023-06-22

    申请号:US17645434

    申请日:2021-12-21

    IPC分类号: G06F21/53

    CPC分类号: G06F21/53 G06F2221/2149

    摘要: Described herein are methods, systems, and computer-readable storage media for dynamically configuring and deploying customizable secure wrappers. Techniques include identifying a code element and provisioning a first wrapper to execute the code element. Techniques further include allowing execution of the code element with the first wrapper, identifying a second wrapper for use in execution of the code element. The second wrapper is either customized for the code element or selected for the code element or both. Further, the code execution management system transitions from the first wrapper to the second wrapper, and allows execution of the code element with the second wrapper.

    COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION AND AUTHENTICATION

    公开(公告)号:US20230101198A1

    公开(公告)日:2023-03-30

    申请号:US17490711

    申请日:2021-09-30

    发明人: Asaf HECHT

    IPC分类号: G06F21/44 G06F9/54 G06F21/56

    摘要: A computer-implemented system is provided that includes instructions that, when executed by at least one processor, cause the at least one processor to perform operations for utilizing unique sequencing profiles that uniquely identify applications, the operations comprising: identifying an application having a plurality of application programming interface (API) calls associated with the application; retrieving, based on the identification of the application, a reference sequencing profile based on a plurality of code elements of the application; comparing the reference sequencing profile to a unique sequencing profile of the application, the unique sequencing profile being based on the plurality of API calls; determining, based on the comparison, a security score for the application; and performing a security action based on the security score.

    IMPROVING NETWORK SECURITY THROUGH REAL-TIME ANALYSIS OF CHARACTER SIMILARITIES

    公开(公告)号:US20230098812A1

    公开(公告)日:2023-03-30

    申请号:US17487319

    申请日:2021-09-28

    发明人: OFER RIVLIN

    IPC分类号: H04L29/06

    摘要: Disclosed embodiments relate to improving network security through real-time analysis of character similarities. Techniques include identifying a reference name, identifying a domain name, and performing a real-time analysis of the domain name. The real-time analysis may include applying a language processing protocol to the domain name, generating a score indicating a similarity between the domain name and the reference name, accessing a similarity threshold, and comparing the generated score with the similarity threshold. Further techniques include determining that the score exceeds the threshold and performing a security action.

    DISCOVERING AND REMEDIATING HIDDEN SECRETS IN CODE FILES

    公开(公告)号:US20220365777A1

    公开(公告)日:2022-11-17

    申请号:US17320769

    申请日:2021-05-14

    发明人: Gil MAKMEL

    摘要: Disclosed embodiments relate to systems and methods for discovering and remediating hidden secrets in code files. Techniques include accessing an element of source code for analysis, performing a static analysis of the element of source code, and generating a control flow representation that identifies a plurality of functions and a sequence of functions associated with the element of the source code. The techniques may further include determining a probability of a hidden secret being included in the element of source code and performing a security action of at least one of: generating an alert, displaying a visual indication of the probability, generating a report associated with the hidden secret, sending data associated with the probability to a machine learning system for training the machine learning system, or a remediating action associated with the hidden secret.

    AUTHENTICATION CREDENTIAL WITH EMBEDDED AUTHENTICATION INFORMATION

    公开(公告)号:US20220286446A1

    公开(公告)日:2022-09-08

    申请号:US17751088

    申请日:2022-05-23

    发明人: Asaf Hecht

    IPC分类号: H04L9/40

    摘要: Techniques include securely accessing data associated with authorization of an identity, the identity being capable of accessing an access-controlled network resource based on assertion of an authentication credential to an entity associated with the access-controlled network resource; generating a secret data element based on the data associated with authorization of the identity and based on application of a first secret logic algorithm; and making the secret data element available to be embedded in the authentication credential. The entity associated with the access-controlled network resource is configured to: validate the identity based on the secret data element being included in the authentication credential; and access the data associated with authorization of the identity based on application of a second secret logic algorithm to the secret data element.

    DETECTION OF SECURITY RISKS BASED ON SECRETLESS CONNECTION DATA

    公开(公告)号:US20220159029A1

    公开(公告)日:2022-05-19

    申请号:US17368136

    申请日:2021-07-06

    IPC分类号: H04L29/06 H04W12/63

    摘要: Disclosed embodiments relate to systems and methods for detecting and addressing security risks in remote native access sessions. Techniques include identifying a remote native access session between a client and a target resource. The techniques may further include identifying connection data associated with the remote native access session obtained by a connection agent, wherein the connection data originates from the client and from a mobile device associated with a user, and comprises data indicative of at least one of: hardware of the client or mobile device, configuration settings of the client or mobile device, and network connection attributes of the client or mobile device. Techniques may further include comparing a first portion of the connection data associated with the client with a second portion of the connection data associated with the mobile device; and determining, based on the comparing, a security risk associated with the remote native access session.