-
公开(公告)号:US12099638B2
公开(公告)日:2024-09-24
申请号:US17403075
申请日:2021-08-16
Applicant: Infineon Technologies AG
Inventor: Avni Bildhaiya , Viola Rieger , Frank Hellwig , Alexander Zeh
CPC classification number: G06F21/74 , G06F21/50 , G06F21/554 , G06F21/62 , G07C5/0808
Abstract: A security hardware device is configured to secure a control apparatus. The security hardware device includes a data security domain; a functional safety domain; a data security processor provided in the data security domain and is configured to secure data from unauthorized access or manipulation; a functional safety processor provided in the functional safety domain and is configured to detect functional errors and generate respective safety alerts in response to detecting the functional errors; and a monitoring processor configured to analyze the respective safety alerts provided by the functional safety processor for at least one pattern of safety alerts indicative of a security attack and generate a response signal in response to the respective safety alerts having at least one of the at least one pattern of safety alerts.
-
2.
公开(公告)号:US12056231B2
公开(公告)日:2024-08-06
申请号:US17661429
申请日:2022-04-29
Applicant: Truist Bank
Inventor: David Wright , David Pham , Adam Thomas Lewis , Kenneth William Cluff
CPC classification number: G06F21/50 , G06N3/047 , G06F2221/2117
Abstract: A system and method for training an artificial intelligence engine for real-time monitoring to eliminate false positives is disclosed. The system includes at least one processor, a communication interface coupled to the processor, and a memory device storing executable code. Executing the executable code causes the processor to receive data from an AI security model, receive data from a false positive database, and correlate both sets of data. The correlated data is used to generate a training dataset and a test dataset used to train a false positive identification model. After evaluating the false positive identification model, an AI engine is applied to user registration. The AI engine includes an AI security model and the false positive identification model. Additionally, a system for evaluating the security of user registration utilizing the false positive identification model is disclosed.
-
公开(公告)号:USRE50068E1
公开(公告)日:2024-07-30
申请号:US16990987
申请日:2020-08-11
Applicant: ThreatSTOP, Inc.
Inventor: Tomas L. Byrnes
CPC classification number: H04L63/20 , H04L63/0227 , H04L63/0236 , H04L63/0263 , G06F21/50 , G06F21/60
Abstract: A method for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment. Information, for example, network address, is then acquired from one or more sources regarding a specific location in a network, for example, a network node. A list of the network addresses is then generated and ranked based on one or more parameters that merit making traffic handling decisions. The network addresses are then associated with a host name on at least one directory server and then propagated to the one or more clients.
-
公开(公告)号:US12045335B2
公开(公告)日:2024-07-23
申请号:US17706714
申请日:2022-03-29
Applicant: International Business Machines Corporation
Inventor: Grzegorz Piotr Szczepanik , Piotr Kalandyk , Łukasz Józef Matyasik , Piotr Jan Kotara
CPC classification number: G06F21/51 , G06F9/44526 , G06F16/144 , G06F16/152 , G06F21/50 , G06F21/53
Abstract: A computer-implemented method for software detection is disclosed. The computer-implemented method includes scanning a list of file systems present on a computer system and described by a respective mount point for a signature from a set of predetermined signatures. The computer-implemented method further includes responsive to detecting the signature from the set of predetermined signatures, selecting a particular plugin from a predetermined list of plugins based, at least in part, on the detected signature. The computer-implemented method further includes querying, using the plug-in, an operating environment of the filesystem for data indicative of software running in the operating environment. The computer-implemented method further includes determining software running in the operating environment based, at least in part, on the data returned from querying the operating environment of the filesystem.
-
公开(公告)号:US20240232326A9
公开(公告)日:2024-07-11
申请号:US18137859
申请日:2023-04-21
Applicant: MARK KRIETZMAN , DAMON L. CUSATO
Inventor: MARK KRIETZMAN , DAMON L. CUSATO
CPC classification number: G06F21/50 , G06F9/44505 , G06F21/554 , G06F21/6245 , H04W12/02
Abstract: A Sentinel System For an Online Device (“SOD”) is disclosed that is capable of protecting computing device s including desktop, laptop, smart phones tablets and the like from mining and tracking in an online environment.
-
公开(公告)号:US12008099B2
公开(公告)日:2024-06-11
申请号:US18136471
申请日:2023-04-19
Applicant: Fort Robotics, Inc.
Inventor: Nathan Bivans
CPC classification number: G06F21/50 , G06F21/316 , G06F21/335 , G06F21/44 , G06F21/629 , G06F2221/2141
Abstract: A method includes, at a security agent executing on a computing platform including a set of resources and a first application: authenticating the security agent with a security device; accessing a configuration profile, from the security device, defining identity information associated with the first application and a first security policy defining a subset of resources, in the set of resources, to which the first application is permitted access; authenticating the first application based on the identity information; monitoring the set of resources responsive to execution of the first application on the computing platform; and issuing a command to cause the computing platform to enter a safe state in response to detecting an access by the first application to a first resource in the set of resources, the first resource excluded from the subset of resources.
-
公开(公告)号:US11997098B2
公开(公告)日:2024-05-28
申请号:US17975316
申请日:2022-10-27
Applicant: Stripe, Inc.
Inventor: Pranav Dandekar , Peter Lofgren , Ashish Goel
CPC classification number: H04L63/102 , G06F21/50 , G06F15/16 , H04L63/0263
Abstract: Described herein are systems and methods for predicting a metric value for an entity associated with a query node in a graph that represents a network. In embodiments, using a user's profile as the query node, a metric about that user may be estimated based, at least in part, as a function of how well connected the query node is to a whitelist of “good” users/nodes in the network, a blacklist of “bad” users/nodes in the network, or both. In embodiments, one or more nodes or edges may be weighted when determining a final score for the query node. In embodiments, the final score regarding the metric may be used to take one or more actions relative to the query node, including accepting it into a network, allowing or rejecting a transaction, assigning a classification to the node, using the final score to compute another estimate for a node, etc.
-
公开(公告)号:US11989310B2
公开(公告)日:2024-05-21
申请号:US17550783
申请日:2021-12-14
Applicant: Royal Bank of Canada
Inventor: Nariman Mammadli , Dhanya Jothimani , Ramanpreet Singh , Cathal Smyth , Felix Kurmish , Amit Kumar Tiwari
IPC: G06F21/60 , G06F21/50 , H04L51/046 , H04L51/08
CPC classification number: G06F21/60 , G06F21/50 , H04L51/046 , H04L51/08
Abstract: Methods, systems, and techniques for facilitating identification of electronic data exfiltration. A message transmission log and screenshot metadata are obtained. A screenshot corresponding to the screenshot metadata is matched to a sent electronic message, such as an email, having a file attachment represented in the message transmission log to generate an event. The screenshot metadata indicates that the screenshot was captured prior to when the message transmission log indicates the electronic message was sent. An anomaly score is determined for the sent electronic message is determined by applying unsupervised machine learning, such as by applying an isolation forest, to score the sent electronic message relative to a baseline. The anomaly score meeting or exceeding an anomaly threshold is treated as potentially being indicative of electronic data exfiltration.
-
公开(公告)号:US20240134960A1
公开(公告)日:2024-04-25
申请号:US18137859
申请日:2023-04-20
Applicant: MARK KRIETZMAN , DAMON L. CUSATO
Inventor: MARK KRIETZMAN , DAMON L. CUSATO
CPC classification number: G06F21/50 , G06F9/44505 , G06F21/554 , G06F21/6245 , H04W12/02
Abstract: A Sentinel System For an Online Device (“SOD”) is disclosed that is capable of protecting computing device s including desktop, laptop, smart phones tablets and the like from mining and tracking in an online environment.
-
公开(公告)号:US11954333B2
公开(公告)日:2024-04-09
申请号:US17356206
申请日:2021-06-23
Applicant: Western Digital Technologies, Inc.
Inventor: Aarshiya Khandelwal , Vinay Kumar , Nagarajan Ragupathy , Rinkal Patel
CPC classification number: G06F3/0619 , G06F3/0656 , G06F3/0659 , G06F8/65 , G06F21/554 , G06F3/123 , G06F21/50 , G06F21/572
Abstract: A data storage device and method for detecting malware on a data storage device. The device includes a non-volatile storage medium configured to store at least one file system control block and user data block(s) to store user data. The file system control block comprises at least one reference data structure. The data storage device further comprises a buffer to temporarily store user data. The data storage device further comprises a controller to scan each write command in the user data to be transferred for protocol commands or malicious data. The controller also stops the data transfer of user data from the buffer to the non-volatile storage medium if at least one of protocol commands or malicious data is detected in at least one write command.
-
-
-
-
-
-
-
-
-