METHOD AND APPARATUS FOR DOCUMENT PREVIEW AND DELIVERY WITH PASSWORD PROTECTION

    公开(公告)号:US20180137300A1

    公开(公告)日:2018-05-17

    申请号:US15814250

    申请日:2017-11-15

    Abstract: A new approach is proposed that contemplates systems and methods to support safe preview and immediate delivery of a document from a document producer to an end user while protecting the user from accidentally opening the original document if it has been tampered with by an email attacker. First, the original document is submitted to a safe preview server cluster, where a passcode is generated for the document and the document is processed for policy assessments of possible security threats. The document is then encrypted with the generated passcode and provided to the user together with results of the policy assessments and a preview of content of the document for preview upon request. Based on the user's choice, the user can retrieve the passcode from the server and decrypt the document with the passcode wherein the original document is deleted from the safe preview server cluster once it is downloaded.

    SYSTEM FOR CONNECTING, SECURING AND MANAGING NETWORK DEVICES WITH A DEDICATED PRIVATE VIRTUAL NETWORK
    2.
    发明申请
    SYSTEM FOR CONNECTING, SECURING AND MANAGING NETWORK DEVICES WITH A DEDICATED PRIVATE VIRTUAL NETWORK 有权
    用专用虚拟虚拟网络连接,保护和管理网络设备的系统

    公开(公告)号:US20160309395A1

    公开(公告)日:2016-10-20

    申请号:US15130923

    申请日:2016-04-15

    CPC classification number: H04W76/10 H04L12/4641 H04W48/12 H04W76/11 H04W88/16

    Abstract: A device includes a database, a controller, and a PVN router. The database is configured to store network settings information and tracks devices connected to a network. The controller is configured to control access of devices to one another after establishing a connection to the network. The PVN router is configured to receive a provisioning request from a requesting to connect to the network. The PVN router is further configured to transmit a provisioning response to the requesting device based on instantiation of a PVN template received from the database. The PVN template is generated based on the network settings information and further based on the control access determined by the controller. The provisioning response establishes a connection between the requesting device and the network. The requesting device is inaccessible by a subset of devices already connected in the network after the connection is established and vice versa.

    Abstract translation: 设备包括数据库,控制器和PVN路由器。 数据库被配置为存储网络设置信息并跟踪连接到网络的设备。 控制器被配置为在建立到网络的连接之后控制设备彼此的访问。 PVN路由器被配置为从请求连接到网络接收供应请求。 PVN路由器还被配置为基于从数据库接收的PVN模板的实例来向请求设备发送供应响应。 基于网络设置信息生成PVN模板,并且还基于由控制器确定的控制访问。 供应响应建立请求设备和网络之间的连接。 在建立连接之后,已经连接在网络中的设备的子集不可访问请求设备,反之亦然。

    SYSTEM AND APPARATUS FOR INTERNET TRAFFIC INSPECTION VIA LOCALIZED DNS CACHING

    公开(公告)号:US20220103579A1

    公开(公告)日:2022-03-31

    申请号:US17247355

    申请日:2020-12-08

    Inventor: Fleming Shi

    Abstract: An approach is proposed to support Internet traffic inspection to detect and prevent access to blocked websites or resources. First, access requests initiated by users to websites hosted on servers over a network are intercepted by an inspection agent, which identifies and caches a pair of the domain/host name of each website and its corresponding IP address on the Internet to a localized DNS cache. When a newly intercepted access request identifies the website by its IP address only without specifying its domain/host name, the inspection agent looks up the domain name by its IP address from the DNS cache. If no domain name is found, the inspection agent redirects the access request to a proxy server instead of forwarding it to the server hosting the website for further inspection. The proxy server then inspects the IP address to determine if it is a legitimate website or not.

    Method and apparatus for neutralizing real cyber threats to training materials

    公开(公告)号:US11100811B2

    公开(公告)日:2021-08-24

    申请号:US16358537

    申请日:2019-03-19

    Inventor: Fleming Shi

    Abstract: An approach is proposed to support neutralizing real cyber threats to training materials by intercepting, modifying and redistributing active content(s) of an email arrived at a recipient's email account. Specifically, when the recipient triggers an active content such as an URL link embedded in and/or opens an attachment to the email, the triggered active content is synchronously intercepted and examined in real time for potential malicious intent of a phishing attack. If the active content is determined to be malicious, the malicious active content in the email is then disassembled and deactivated while the payload is reconstructed with links and markings for training purposes. The recipient is then provided with an anti-phishing training exercise, wherein content of the training exercise is specifically customized for the recipient based on the reconstructed payload of the received email and/or the recipient's security posture and awareness.

    SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT
    6.
    发明申请
    SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT 审中-公开
    系统和网络安全代理方法用于认证授权执行

    公开(公告)号:US20140101442A1

    公开(公告)日:2014-04-10

    申请号:US14103782

    申请日:2013-12-11

    Abstract: Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus protects an endpoint from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS.

    Abstract translation: 启用网络安全管理员可以使用可自定义的证书颁发机构信誉策略存储区撤销证书,当存在CA不推荐使用或产生欺诈性证书时,它将由独立的证书颁发机构信誉服务器通知。 自定义策略存储覆盖操作系统Web网络层或第三方浏览器可访问的受信任的根证书存储。 导入撤销列表或更新浏览器或操作系统是多余的。 当证书颁发机构已经失去对TLS中使用的证书的控制时,该设备保护端点免受中间人攻击。

    System and apparatus for internet traffic inspection via localized DNS caching

    公开(公告)号:US11811806B2

    公开(公告)日:2023-11-07

    申请号:US17247355

    申请日:2020-12-08

    Inventor: Fleming Shi

    Abstract: An approach is proposed to support Internet traffic inspection to detect and prevent access to blocked websites or resources. First, access requests initiated by users to websites hosted on servers over a network are intercepted by an inspection agent, which identifies and caches a pair of the domain/host name of each website and its corresponding IP address on the Internet to a localized DNS cache. When a newly intercepted access request identifies the website by its IP address only without specifying its domain/host name, the inspection agent looks up the domain name by its IP address from the DNS cache. If no domain name is found, the inspection agent redirects the access request to a proxy server instead of forwarding it to the server hosting the website for further inspection. The proxy server then inspects the IP address to determine if it is a legitimate website or not.

    Method and apparatus for neutralizing real cyber threats to training materials

    公开(公告)号:US11145221B2

    公开(公告)日:2021-10-12

    申请号:US16358537

    申请日:2019-03-19

    Inventor: Fleming Shi

    Abstract: An approach is proposed to support neutralizing real cyber threats to training materials by intercepting, modifying and redistributing active content(s) of an email arrived at a recipient's email account. Specifically, when the recipient triggers an active content such as an URL link embedded in and/or opens an attachment to the email, the triggered active content is synchronously intercepted and examined in real time for potential malicious intent of a phishing attack. If the active content is determined to be malicious, the malicious active content in the email is then disassembled and deactivated while the payload is reconstructed with links and markings for training purposes. The recipient is then provided with an anti-phishing training exercise, wherein content of the training exercise is specifically customized for the recipient based on the reconstructed payload of the received email and/or the recipient's security posture and awareness.

    Method and apparatus for human activity tracking and authenticity verification of human-originated digital assets

    公开(公告)号:US11068569B2

    公开(公告)日:2021-07-20

    申请号:US15993218

    申请日:2018-05-30

    Inventor: Fleming Shi

    Abstract: A new approach is proposed that contemplates systems and methods to support human activity tracking and authenticity verification of human-originated digital assets. First, activities performed by a producer while he/she is constructing a digital asset, e.g., an electronic message, are captured. Information/metadata of the captured activities are then packaged/encapsulated inside the constructed digital asset, wherein such metadata includes but is not limited to mouse and/or keyboard activities, software tools used, and other digital traces of the captured human activities. Once the digital asset is transmitted and received by a consumer, the metadata included in the digital asset is unpacked and analyzed to determine various levels of authenticity of the digital asset with respect to whether the digital asset is originated manually by a human being or automatically by a software program. The consumer may then take actions accordingly based on the level of authenticity of the received digital asset.

    SYSTEM AND METHOD FOR APPLICATION PLUG-IN DISTRIBUTION

    公开(公告)号:US20200348920A1

    公开(公告)日:2020-11-05

    申请号:US16947075

    申请日:2020-07-17

    Abstract: A new approach is proposed that contemplates systems and methods to support a sandboxed application plug-in distribution framework. An installation package containing a monitoring plug-in, a display plug-in, and/or third part components is received by a first application running on a first computing device. The first application installs the display plug-in and saves the monitoring plug-in to a centralized database. The first application sends an instruction to a second application running on a second computing device to retrieve the monitoring plug-in from the database and install the monitoring plug-in on the second computing device. Upon receiving a user request, the display plug-in of the first application sends a query to the monitor plug-in of the second application. In response to the query, the monitoring plug-in sends the requested monitored data collected by the second application to the display plug-in, which then formats and presents the monitored data to the user.

Patent Agency Ranking