-
1.
公开(公告)号:US20230267201A1
公开(公告)日:2023-08-24
申请号:US18308388
申请日:2023-04-27
发明人: Robert Pike , Gary Zelanko , Bryan Greene
IPC分类号: G06F21/55 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L9/40
CPC分类号: G06F21/554 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L63/1433 , H04L63/1491 , G06F2221/034
摘要: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
-
2.
公开(公告)号:US20220309158A1
公开(公告)日:2022-09-29
申请号:US17841918
申请日:2022-06-16
发明人: Robert Pike , Gary Zelanko , Bryan Greene
IPC分类号: G06F21/55 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L9/40
摘要: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
-
公开(公告)号:US10341349B2
公开(公告)日:2019-07-02
申请号:US15438192
申请日:2017-02-21
发明人: Robert Pike
摘要: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits that divide security for the first application into security tiers. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
-
4.
公开(公告)号:US20230351014A1
公开(公告)日:2023-11-02
申请号:US18350587
申请日:2023-07-11
发明人: Robert Pike , Gary Zelanko , Bryan Greene
IPC分类号: G06F21/55 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L9/40
CPC分类号: G06F21/554 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L63/1433 , H04L63/1491 , G06F2221/034
摘要: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
-
公开(公告)号:US11575704B2
公开(公告)日:2023-02-07
申请号:US15993426
申请日:2018-05-30
发明人: Stewart P. MacLeod , Robert Pike
摘要: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
-
公开(公告)号:US11228593B2
公开(公告)日:2022-01-18
申请号:US16416946
申请日:2019-05-20
发明人: Robert Pike
摘要: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
-
公开(公告)号:US20180351968A1
公开(公告)日:2018-12-06
申请号:US15993423
申请日:2018-05-30
发明人: Stewart P. MacLeod , Robert Pike
IPC分类号: H04L29/06
摘要: A method for real-time detection of malware in a Kernel mode includes detecting a file operation request initiated by a process running in user mode. Malware detection analytics is performed on a file buffer associated with the detected file operation request to detect behavior indicating presence of malware. Responsive to detecting the behavior indicating the presence of the malware, the process responsible for initiating the detected file operation request is identified. A search for the identified process is performed on one or more of a blacklist of programs and a whitelist of programs to determine whether the identified process is a trusted process. Responsive to determining that the identified process is not a trusted process, a malware remediation action is executed against the identified process. Information describing the malware is transmitted to a client device.
-
8.
公开(公告)号:US11599632B2
公开(公告)日:2023-03-07
申请号:US16907305
申请日:2020-06-21
发明人: Robert Pike , Gary Zelanko , Bryan Greene
IPC分类号: G06F21/00 , G06F21/55 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L9/40
摘要: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
-
9.
公开(公告)号:US11537711B2
公开(公告)日:2022-12-27
申请号:US16907305
申请日:2020-06-21
发明人: Robert Pike , Gary Zelanko , Bryan Greene
IPC分类号: G06F21/00 , G06F21/55 , G06F21/54 , H04L41/5019 , H04L43/065 , H04L43/16 , H04L9/40
摘要: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
-
公开(公告)号:US20220103558A1
公开(公告)日:2022-03-31
申请号:US17547544
申请日:2021-12-10
发明人: Robert Pike
摘要: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
-
-
-
-
-
-
-
-
-