Rapid7, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 345 pour Rapid7, Inc. et 1 filiale Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 331
        Marque 14
Juridiction
        États-Unis 341
        International 4
Propriétaire / Filiale
[Owner] Rapid7, Inc. 344
NT OBJECTives, Inc. 1
Date
Nouveautés (dernières 4 semaines) 6
2026 mai (MACJ) 1
2026 avril 3
2026 mars 3
2026 février 4
Voir plus
Classe IPC
H04L 9/40 - Protocoles réseaux de sécurité 175
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 93
G06N 20/00 - Apprentissage automatique 46
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité 31
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet 18
Voir plus
Classe NICE
42 - Services scientifiques, technologiques et industriels, recherche et conception 14
09 - Appareils et instruments scientifiques et électriques 3
35 - Publicité; Affaires commerciales 3
Statut
En Instance 46
Enregistré / En vigueur 299
  1     2     3     4        Prochaine page

1.

TECHNIQUES FOR CHRONOLOGICAL VULNERABILITY EVENT RECOGNITION

      
Numéro d'application 18940572
Statut En instance
Date de dépôt 2024-11-07
Date de la première publication 2026-05-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Fewer, Stephen

Abrégé

Techniques for identifying vulnerabilities in a computing environment, including: using at least one computer hardware processor to perform: obtaining first vulnerability data for a first event from external data source(s); associating the first event with a particular vulnerability in a vulnerability dictionary using at least some of the first vulnerability data, the particular vulnerability being associated with one or more historical events; enriching the first vulnerability data with first metadata comprising one or more time-based feature values to obtain first enriched vulnerability data; generating a first set of feature values for the first event using both: the first enriched vulnerability data; and enriched vulnerability data for at least some of the one or more historical events; determining, using the first set of feature values, that a vulnerability mitigation action is to be triggered for the first event; and triggering performance of the vulnerability mitigation action for the first event.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

2.

SYSTEM FOR AUTOMATICALLY DISCOVERING, ENRICHING AND REMEDIATING ENTITIES INTERACTING IN A COMPUTER NETWORK

      
Numéro d'application 18824180
Statut En instance
Date de dépôt 2024-09-04
Date de la première publication 2026-04-30
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Rogers, Kenneth Allen
  • Hadden, Allen D.
  • Roberts, Craig
  • Pyle, Hugh F.

Abrégé

An entity tracking system and method for a computer network employs proactive data collection and enrichment driven by configurable rules and workflows responsive to the discovery of new entities, changes to existing entities, and specifics about the entities' attributes. The data collection is used in conjunction with graph technologies to map interactions and relationships between various entities interacting in the computer environment and deduce interactions and relationships between the entities. Machine learning techniques further identify, group or categorize entities and identify patterns which are indicative of anomalies that might be due to nefarious actions or compromised security.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/245 - Traitement des requêtes
  • G06F 16/248 - Présentation des résultats de requêtes
  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 20/00 - Apprentissage automatique

3.

MACHINE LEARNING TECHNIQUES FOR GENERATING COMMON VULNERABILITY SCORING SYSTEM VECTORS

      
Numéro d'application 18931600
Statut En instance
Date de dépôt 2024-10-30
Date de la première publication 2026-04-30
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Finnbogason, Gudlaugur
  • Millar, Stuart

Abrégé

Some embodiments provide techniques for generating common vulnerability scoring system (CVSS) vectors for vulnerabilities to use in scanning a computing environment for vulnerabilities. The techniques involve obtaining a textual description of a vulnerability; generating inputs for a plurality of ML models using the textual description of the vulnerability; providing the inputs to the plurality of ML models to obtain outputs indicating values of CVSS risk metrics; and storing the values of the CVSS risk metrics indicated by the outputs of the plurality of ML models in a vector to obtain the CVSS vector for the vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

4.

Honey repository

      
Numéro d'application 17964169
Numéro de brevet 12615294
Statut Délivré - en vigueur
Date de dépôt 2022-10-12
Date de la première publication 2026-04-28
Date d'octroi 2026-04-28
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Stewart, Owen
  • Anand, Ashwin

Abrégé

Embodiments disclose a honeyrepo implemented in a cybersecurity computing environment. A honey repository is configured for inclusion in a source control system by a detection and response server that is communicatively coupled to a continuous integration system that accesses a shared repository and has access to individual repositories of the source control system by generating a honey repository configuration package that includes decoy metadata to entice an attacker to initiate a request to access the honey repository. The honey repository configuration package that includes the decoy metadata is transmitted to the source control system to generate the honey repository and access to the source control system is monitored at the detection and response server. If an attacker initiates the request to access the honey repository, access is disabled for the attacker to the individual repositories of the source control system and the shared repository managed by the continuous integration system.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

5.

Organization vendor-based risk assessment using internet telemetry

      
Numéro d'application 17360316
Numéro de brevet 12614138
Statut Délivré - en vigueur
Date de dépôt 2021-06-28
Date de la première publication 2026-04-28
Date d'octroi 2026-04-28
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lin, Wah-Kwan
  • Rogers, Harley Ray

Abrégé

Various embodiments include systems and methods of assessing vendor risk. One or more sets of IP address(es) associated with one or more vendors is identified. Risk data related to the set(s) of IP address(es) is obtained using internet telemetry data. Based at least in part on the risk data, security risk level(s) are determined for the vendor(s). Some embodiments include systems and methods of implementing a vendor-based risk posture assessment of an organization. The vendor-based risk posture assessment may be based at least in part on one or more security risk levels determined for the vendor(s) of the organization.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • H04L 9/40 - Protocoles réseaux de sécurité

6.

Security service platform for rule matching

      
Numéro d'application 18203236
Numéro de brevet 12609947
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2026-04-21
Date d'octroi 2026-04-21
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Coughlan, Luke
  • Tedesco, Gianni
  • Nally, Morgan
  • Lakshminarayanan, Sai Krishna

Abrégé

Various embodiments include systems and methods pertaining to a security service platform that detects security threats based on a security service that operates on structurally deduplicated network data. The security service platform, based on using the structure, or data model, of data being deduplicated, generates structurally deduplicated event data that is more compact than traditionally compressed data or traditionally deduplicated data stored in a structured data format. The security service may perform a security analysis that includes rule matching to detect threats to a network, where the rule matching operates on the structurally deduplicated data.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

7.

CLOUD COMPUTING ENVIRONMENT ASSET MONITORING

      
Numéro d'application 19391862
Statut En instance
Date de dépôt 2025-11-17
Date de la première publication 2026-03-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Mckee, Trever Allen
  • Green, James Andrew

Abrégé

Techniques for monitoring assets in a cloud computing environment, comprising: collecting datasets for respective assets in the cloud computing environment, each of the datasets comprising at least some data stored by a respective one of the assets at one or multiple timepoints, the datasets including a first dataset for a first asset of the assets; determining priority scores for the assets using: feature values determined using data in the datasets, and feature values determined using data about the assets and stored in the cloud computing environment, wherein the determining comprises: determining, using data in the first dataset that was stored by the first asset at one or more timepoints, at least one first feature value for the first asset; determining, using data about the first asset and stored in the cloud computing environment, at least one second feature value for the first asset; and determining a priority score for the first asset using the at least one first feature value and the at least one second feature value; and collecting further data about at least some of the assets using the determined priority scores.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

8.

Vulnerability result integration scheme

      
Numéro d'application 17734684
Numéro de brevet 12568106
Statut Délivré - en vigueur
Date de dépôt 2022-05-02
Date de la première publication 2026-03-03
Date d'octroi 2026-03-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Horbatiuk, Ian
  • Miseiko, Paul

Abrégé

Various embodiments include systems and methods to implement a complementary scan engine scheme for avoiding redundant vulnerability check data collection when using a scan engine to scan a target asset and/or to implement a vulnerability result integration scheme for determining whether to integrate a respective vulnerability result into one or more databases. In various embodiments, at least one integration state may be determined. According to the vulnerability result integration scheme, the at least one integration state may define whether an integrator is to integrate the respective vulnerability result into the database(s).

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

9.

Generating configuration change event stream for event-driven assessment of resources

      
Numéro d'application 18809488
Numéro de brevet 12568121
Statut Délivré - en vigueur
Date de dépôt 2024-08-20
Date de la première publication 2026-03-03
Date d'octroi 2026-03-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Mclarnon, Barry

Abrégé

A configuration change assessment pipeline is disclosed, executable to assess a continuous stream of resource configuration changes in a cloud-based computer network for security policy violations. In embodiments, the system executes assessment nodes that are configurable to monitor the input stream for specific change events, identify a set of related resources that should be assessed as result of a change event, perform various assessments on the related resources, and write assessment findings to an output stream. Action nodes are configured to consume the output stream and perform responsive actions such as generating user notifications and initiating automated remediation steps. Advantageously, the disclosed system is able to perform ad hoc assessments of a small set of relevant resources in response to specific change events in the network, so that security policy violations can be identified much more quickly.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

10.

CYBERSECURITY VULNERABILITY RISK DETERMINATION

      
Numéro d'application 19366480
Statut En instance
Date de dépôt 2025-10-22
Date de la première publication 2026-02-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Beek, Christiaan

Abrégé

Techniques for analyzing cybersecurity vulnerabilities in a computing environment, including: using at least one computer hardware processor to perform: (A) identifying a first cybersecurity vulnerability associated with a resource in the computing environment; (B) obtaining data related to one or more factors related to risk posed by the first cybersecurity vulnerability, the one or more factors including at least one factor indicative of a degree of current exploitation of the first cybersecurity vulnerability; (C) determining, using the obtained data, one or more factor weights for the one or more factors related to the risk posed by the first cybersecurity vulnerability; (D) determining a first score for the first cybersecurity vulnerability using the determined one or more factor weights; and (E) performing one or more security actions based on the determined first score for the first cybersecurity vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

11.

NETWORK ATTACK PATH VISUALIZATION

      
Numéro d'application 19366476
Statut En instance
Date de dépôt 2025-10-22
Date de la première publication 2026-02-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Komarov, Val
  • Riley, Thomas

Abrégé

The techniques described herein relate to visualizing network attack paths. An example method includes using at least one computer hardware processor to perform: identifying one or more vulnerable network resources in a plurality of network resources, each of the one or more vulnerable network resources having at least one respective security vulnerability; accessing at least one portion of a relational representation of a set of network resources in the plurality of network resources, identifying, using the at least one portion of the relational representation, one or more network attack paths between the one or more vulnerable network resources and network resources in the set, generating, using the at least one portion of the relational representation, a graph, and generating a GUI comprising a visualization of the graph and information indicating that the one or more attack paths may be used to exploit one or more security vulnerabilities of the set.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

12.

Intelligent identification of correlations across security services

      
Numéro d'application 18795293
Numéro de brevet 12547737
Statut Délivré - en vigueur
Date de dépôt 2024-08-06
Date de la première publication 2026-02-10
Date d'octroi 2026-02-10
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Callahan, Julius

Abrégé

Various embodiments include systems and methods pertaining to a security service platform that includes a correlation engine for identifying correlations between different security services of the security service platform. In some embodiments, the correlation engine may be configured to parse, aggregate, and/or correlate data from an application security service and data from a vulnerability management service to assess coverage (or lack thereof) and/or to assist in remediation prioritization. The correlation engine may generate a report that can be presented to a user via a graphical user interface (GUI).

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

13.

Complementary scan engine scheme

      
Numéro d'application 17706828
Numéro de brevet 12541601
Statut Délivré - en vigueur
Date de dépôt 2022-03-29
Date de la première publication 2026-02-03
Date d'octroi 2026-02-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Horbatiuk, Ian
  • Miseiko, Paul

Abrégé

Various embodiments include systems and methods to implement a complementary scan engine scheme for avoiding redundant vulnerability check data collection when using a scan engine to scan a target asset. The implementation may include determining a set of potential vulnerability checks for scanning the target asset using the scan engine. Fingerprint data indicating which versions of software are installed on the target asset may be collected. Based at least in part on the fingerprint data, it may be determined that a particular version of a local scan agent is installed on the target asset. Responsive to a determination that the local scan agent is functioning, the scan engine may perform any vulnerability check, in the set of potential vulnerability checks, that is not covered by the local scan agent. Responsive to a determination that the local scan agent is not functioning, the scan engine may perform all vulnerability checks in the set of potential vulnerability checks.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

14.

TECHNIQUES FOR OPERATING A COMPUTER NETWORK SECURITY SYSTEM IN A CLOUD COMPUTING ENVIRONMENT

      
Numéro d'application 19331948
Statut En instance
Date de dépôt 2025-09-17
Date de la première publication 2026-01-08
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Shahrivar, Pojan
  • Millar, Stuart

Abrégé

Machine learning techniques for updating a configuration of a computer network security system operating in a cloud computing environment. The techniques include obtaining a plurality of datasets containing information about a respective plurality of events detected by the computer network security system in the cloud computing environment; generating, using at least one trained ML model, a plurality of signatures representing the plurality of events, the generating comprising processing the plurality of datasets using the at least one trained ML model to obtain the plurality of signatures; clustering the plurality of signatures to obtain signature clusters representing clusters of events in the plurality of events; identifying a particular event cluster from among the clusters of events; and updating the configuration of the computer network security system based on characteristics of events in the identified particular event cluster.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

15.

EVENT-DRIVEN MONITORING OF RESOURCES IN A CLOUD COMPUTING ENVIRONMENT

      
Numéro d'application 19320917
Statut En instance
Date de dépôt 2025-09-05
Date de la première publication 2026-01-01
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Martin, Dylan
  • Lee, Austin
  • Mckee, Trever Allen
  • Green, James Andrew
  • Deramus, Chris

Abrégé

Techniques for event driven harvesting and analysis of cloud computing resources in a cloud computing environment, comprising: obtaining, from a cloud computing environment, data related to an event that occurred in the cloud computing environment; in response to obtaining the data, requesting, from the cloud computing environment, supplemental data about the event that occurred in the cloud computing environment, the supplemental data including information about the event and/or information about impact of the event on a resource; determining whether a security action is to be taken at least in part by analyzing the data and/or the supplemental data; and when it is determined a security action is to be taken, performing the security action.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 47/70 - Contrôle d'admissionAllocation des ressources

16.

Vulnerability detection at points of exposure

      
Numéro d'application 17994589
Numéro de brevet 12500917
Statut Délivré - en vigueur
Date de dépôt 2022-11-28
Date de la première publication 2025-12-16
Date d'octroi 2025-12-16
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lin, Wah-Kwan
  • Deardorff, Paul

Abrégé

Methods and systems for identifying a vulnerability on a network are disclosed. The methods described herein may involve executing a first scanning function to obtain a first view of a network and then filtering the first view of the network for at least one point of exposure of a first entity that originates from a second entity. The methods described herein may further involve executing a secondary scanning function to identify any vulnerabilities of the first entity based on the point of exposure of the first entity that originates from the second entity and implementing a threat prevention procedure upon identifying a vulnerability of the first entity based on the point of exposure of the first entity that originates from the second entity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

17.

Systems and methods for determining current risk of cybersecurity vulnerabilities

      
Numéro d'application 18679631
Numéro de brevet 12488117
Statut Délivré - en vigueur
Date de dépôt 2024-05-31
Date de la première publication 2025-12-02
Date d'octroi 2025-12-02
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Beek, Christiaan

Abrégé

Techniques for analyzing cybersecurity vulnerabilities in a computing environment, including: using at least one computer hardware processor to perform: (A) identifying a first cybersecurity vulnerability associated with a resource in the computing environment; (B) obtaining data related to one or more factors related to risk posed by the first cybersecurity vulnerability, the one or more factors including at least one factor indicative of a degree of current exploitation of the first cybersecurity vulnerability; (C) determining, using the obtained data, one or more factor weights for the one or more factors related to the risk posed by the first cybersecurity vulnerability; (D) determining a first score for the first cybersecurity vulnerability using the determined one or more factor weights; and (E) performing one or more security actions based on the determined first score for the first cybersecurity vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

18.

PROACTIVE PROTECTION OF COMPUTER NETWORKS AGAINST UNEXPLOITED VULNERABILITIES

      
Numéro d'application 19277650
Statut En instance
Date de dépôt 2025-07-23
Date de la première publication 2025-11-13
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Lin, Wah-Kwan

Abrégé

A server determines vulnerabilities associated with components of a computing device. The server determines attributes associated with individual vulnerabilities. The server determines a subset of the vulnerabilities that includes unexploited vulnerabilities. The server executes a machine learning model to predict a probability of an exploit being created for a particular unexploited vulnerability in the subset. The server sends to a device: information identifying the particular unexploited vulnerability, particular attributes associated with the particular unexploited vulnerability, and the probability of an exploit being created for the particular unexploited vulnerability.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes

19.

TECHNIQUES FOR DETECTING MALICIOUS SOFTWARE IN A COMPUTING ASSET

      
Numéro d'application 19039321
Statut En instance
Date de dépôt 2025-01-28
Date de la première publication 2025-11-06
Propriétaire
  • RAPID7, INC. (USA)
  • RAPID7, INC. (USA)
Inventeur(s)
  • Zargarov, Natalie
  • Breiman, Erez
  • Kamanovsky, Denis
  • Bobritsky, Eduard

Abrégé

Some embodiments provide techniques for detecting presence of malicious software in a computing asset. The techniques identify, from among a plurality of memory locations allocated for use by a process managed by an operating system (OS) associated with the computing asset, memory location(s) to monitor in furtherance of detecting presence of malicious software in the computing asset, monitor threads initialized by the process using the identified memory location(s) to determine a number of threads so initialized, identify value(s) for visibility characteristic(s) of the process indicative of whether the process is attempting to evade detection of its execution on the computing asset, and determine whether the process is a malicious software process based on the number of threads and the value(s) for the visibility characteristic(s).

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions

20.

TECHNIQUES FOR DETECTING CYBERATTACKS ON AN AUTHENTICATION SYSTEM

      
Numéro d'application 19271704
Statut En instance
Date de dépôt 2025-07-16
Date de la première publication 2025-11-06
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Shivamoggi, Vasudha
  • Hodgman, Roy
  • Wilbur, Katherine

Abrégé

Some embodiments provide techniques for detecting cyberattacks against a software service authentication system that authorizes access to software services. The techniques access a user activity profile specifying values of parameters indicating the user's pattern of requesting access to unique software service(s). The techniques monitor the activity of the user over a time period to obtain software request data indicating request(s) by the user to access software services in the time period. The techniques determine, using the software service request data and the user activity profile, whether computing activity of the user during the time period is anomalous.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

21.

Application-level cybersecurity using multiple stages of classifiers

      
Numéro d'application 17939308
Numéro de brevet 12463987
Statut Délivré - en vigueur
Date de dépôt 2022-09-07
Date de la première publication 2025-11-04
Date d'octroi 2025-11-04
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Shahrivar, Pojan

Abrégé

Various embodiments include systems and methods to implement a security platform providing application-level cyberattack detection using multiple stages of classifiers. The security platform may use requests received by a web service to determine training data to train one or more machine learning models. The training data may be determined by instrumenting an application, such as a web service, with a first stage classifier to determine security events indicative of cyberattacks. The security platform may train machine learning models using aggregations of security events over various periods of time. The machine learning models may serve as second stage classifiers for the security platform.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

22.

Signed remote execution for assessment of network system assets

      
Numéro d'application 17808081
Numéro de brevet 12445492
Statut Délivré - en vigueur
Date de dépôt 2022-06-21
Date de la première publication 2025-10-14
Date d'octroi 2025-10-14
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Miseiko, Paul

Abrégé

A method for authenticated asset assessment is provided. The method involves executing a scan assistant on an asset to allow a remote scan engine to execute one or more scan operations on the asset for determining a state of the asset. The scan assistant may verify the identity of the scan engine by checking that a certificate received from the scan engine is signed with a private key associated with the scan engine. In some embodiments, the authentication may be performed as part of a TLS handshake process that establishes a TLS connection between the scan engine and the scan assistant. Once the scan engine is authenticated, the scan engine may communicate with the scan assistant according to a communication protocol to collect data about the asset. Advantageously, the disclosed technique reduces security risks associated with authenticated scans and improves the performance of authenticated scans.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

23.

File directory structure and naming convention for storing columnar tables

      
Numéro d'application 18795246
Numéro de brevet 12436936
Statut Délivré - en vigueur
Date de dépôt 2024-08-06
Date de la première publication 2025-10-07
Date d'octroi 2025-10-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lee, Austin
  • Jiandani, Vikram

Abrégé

A database system stores a table as a set of column files in a columnar format in a manner that improves the write performance of the table and avoids use of separate metadata repository. In embodiments, each column file groups values into entity chunks indexed by an entity index. Each chunk includes a live value index that determines which rows in chunk has live values. New values are written to the column file by appending an updated copy of the entity chunk. The entity index to refer to the newly written chunk as the latest version. This approach avoids expensive in-place updating of individual column values and allows the update to be performed much more quickly. In embodiments, the database system encodes metadata such as table schema information using file naming and placement conventions in the file store, so that a centralized metadata repository is not required.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

24.

EXPOSURE COMMAND

      
Numéro de série 99412532
Statut En instance
Date de dépôt 2025-09-25
Propriétaire Rapid7, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

25.

INCIDENT COMMAND

      
Numéro de série 99412576
Statut En instance
Date de dépôt 2025-09-25
Propriétaire Rapid7, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

26.

VECTOR COMMAND

      
Numéro de série 99412625
Statut En instance
Date de dépôt 2025-09-25
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

27.

COMMAND PLATFORM

      
Numéro de série 99412555
Statut En instance
Date de dépôt 2025-09-25
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

28.

SURFACE COMMAND

      
Numéro de série 99412648
Statut En instance
Date de dépôt 2025-09-25
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

29.

SYSTEM FOR COLLECTING COMPUTER NETWORK ENTITY INFORMATION EMPLOYING ABSTRACT MODELS

      
Numéro d'application 19197251
Statut En instance
Date de dépôt 2025-05-02
Date de la première publication 2025-08-28
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Hadden, Allen D.
  • Pyle, Hugh
  • Rogers, Kenneth Allen

Abrégé

An entity tracking system and method for a computer network employs proactive data collection and enrichment driven by configurable rules and workflows responsive to the discovery of new entities, changes to existing entities, and specifics about the entities' attributes. The data collection is used in conjunction with graph technologies to map interactions and relationships between various entities interacting in the computer environment and deduce interactions and relationships between the entities. The method and system provides for abstract entity types and collation nodes.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

30.

VISUAL EXPLORATION FOR EFFICIENT ACCESS ANALYSIS FOR CLOUD PROVIDER ENTITIES

      
Numéro d'application 19198572
Statut En instance
Date de dépôt 2025-05-05
Date de la première publication 2025-08-21
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Samek, Evan
  • Tobolski, Nicholas
  • Martin, James
  • Chalal, Mohamed
  • Abedinzadehavatankhah, Alireza
  • Rivera, Kris

Abrégé

An access policy analysis system may use visual exploration to efficiently perform access analysis. A request to display an effective access of an entity with respect to a resource hosted in a cloud provider may be received via a visual exploration user interface element. An analysis of a set of access policies applied by an access management system to determine an effective access of the entity with respect to the resource may be performed. One or more selectable access policy interface elements may be generated that correspond to one or more access policies of the set of access policies that are used to determine the effective access of the entity with respect to the resource. The one or more selectable access policy interface elements may be included in a display of the visual exploration user interface element along with the determined effective access of the entity with respect to the resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

31.

Providing obfuscated results to a network scanner

      
Numéro d'application 18203111
Numéro de brevet 12395516
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2025-08-19
Date d'octroi 2025-08-19
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Dalke, Landon
  • Miseiko, Paul

Abrégé

As an example, an asset receives a request from a scanner performing a reconnaissance of a network that includes the asset. The asset sends a response acknowledging receiving the request, indicating that the asset is alive. The asset receives port scan requests associated with ports of the asset. The asset creates fake fingerprints that include incorrect information about ports of the asset. The asset sends the fake fingerprints to the scanner in response to the port scan requests. The asset determines that a scan engine is requesting access to the asset via a particular port of the asset. The asset grants the scan engine access to the asset via the particular port to enable the scan engine to gather asset data associated with the asset for analysis.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

32.

Software testing system for detecting code injection vulnerabilities

      
Numéro d'application 18203129
Numéro de brevet 12386980
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Holub, Viliam
  • Curran, Gerald
  • Parsons, Trevor

Abrégé

Systems and methods are disclosed for detecting code injection vulnerabilities in software systems. In embodiments, an injection string is created to implement an exploit against a software system. The exploit includes an unauthorized executable code that will generate an easily detectable token if executed by the software system. The string is injected into the software system during execution to simulate a code injection attack on the software system. The software system's execution result is obtained and analyzed to determine whether the execution detection token was generated. If so, the software system is proven to be vulnerable to the attack, and the vulnerability may be indicated in an alert or a report. The vulnerability detection technique may be for both software under development as well as production software systems running in the wild to analyze and monitor these systems for code injection vulnerabilities.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 11/3604 - Analyse de logiciel pour vérifier les propriétés des programmes
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

33.

Predictive modeling to identify anomalous log data

      
Numéro d'application 17116435
Numéro de brevet 12387118
Statut Délivré - en vigueur
Date de dépôt 2020-12-09
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Wainer, Douglas George

Abrégé

Disclosed herein are methods, systems, and processes for interference-based detection and identification of anomalous log data using predictive modeling. A log data that includes a path with strings is accessed. Multiple anomalous log data prediction models are trained for the path by processing the strings at a character level and at a name level using disparate Markov prediction models that include n-gram and skip gram models after performing an A-replace operation. A trained dataset is generated based on the training that includes a simplified path for each of the various anomalous log data prediction models along with a transition probability for each string in the path. Other paths in the log or other logs are trained using the trained dataset and the several trained anomalous log data prediction models are deployed to observe, identify, and highlight anomalous strings in new log data.

Classes IPC  ?

  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
  • G06F 16/903 - Requêtes
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06F 18/2415 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques basées sur des modèles paramétriques ou probabilistes, p. ex. basées sur un rapport de vraisemblance ou un taux de faux positifs par rapport à un taux de faux négatifs
  • G06F 40/151 - Transformation

34.

Cyberattack detection using multiple stages of classifiers

      
Numéro d'application 17939304
Numéro de brevet 12388843
Statut Délivré - en vigueur
Date de dépôt 2022-09-07
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Shahrivar, Pojan

Abrégé

Various embodiments include systems and methods to implement a security platform providing cyberattack detection using multiple stages of classifiers. The security platform may use a first stage of classifiers to analyze multiple requests from a client device to a service. The first stage of classifiers may determine an initial indication of whether a request is indicative of a cyberattack and provide the initial indication to a second stage of classifiers. The second stage of classifiers may, based on initial indication of a cyberattack over a period of time, determine whether a cyberattack is underway.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

35.

Predicting a probability associated with an unexploited vulnerability

      
Numéro d'application 17748148
Numéro de brevet 12388858
Statut Délivré - en vigueur
Date de dépôt 2022-05-19
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Lin, Wah-Kwan

Abrégé

A server determines vulnerabilities associated with components of a computing device. The server determines attributes associated with individual vulnerabilities. The server determines a subset of the vulnerabilities that includes unexploited vulnerabilities. The server executes a machine learning model to predict a probability of an exploit being created for a particular unexploited vulnerability in the subset. The server sends to a device: information identifying the particular unexploited vulnerability, particular attributes associated with the particular unexploited vulnerability, and the probability of an exploit being created for the particular unexploited vulnerability.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes

36.

Security posture recommender system

      
Numéro d'application 17742465
Numéro de brevet 12388871
Statut Délivré - en vigueur
Date de dépôt 2022-05-12
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Mcteggart, Ralph
  • Hutchings, Martin
  • Mccarrison, Matthew

Abrégé

Various embodiments include systems and methods to implement a security posture recommender system. The security posture recommender system may improve the security posture of a deployment of assets by generating recommendation data indicating how to modify the deployment of assets. A deployment may be described by deployment data. The recommendation data may be based on similarities and/or differences between deployment data for a particular user and deployment data associated with users that are within a cluster of users similar to the particular user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/31 - Authentification de l’utilisateur

37.

Security rule matching over structurally deduplicated network data

      
Numéro d'application 18203244
Numéro de brevet 12381892
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2025-08-05
Date d'octroi 2025-08-05
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Tedesco, Gianni
  • Coughlan, Luke
  • Nally, Morgan
  • Lakshminarayanan, Sai Krishna

Abrégé

Various embodiments include systems and methods pertaining to a security service platform that detects security threats based on a security service that operates on structurally deduplicated network data. The security service performs a security analysis that includes rule matching to detect threats to a network, where the rule matching operates on the structurally deduplicated data. The security service may compile one or more rulesets into an executable binary that efficiently operates over the format of the structurally deduplicated data.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

38.

USED CACHED SUMMARIES FOR EFFICIENT ACCESS ANALYSIS FOR CLOUD PROVIDER ENTITIES

      
Numéro d'application 19093915
Statut En instance
Date de dépôt 2025-03-28
Date de la première publication 2025-07-10
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Gladney, Matthew
  • Prescott, Elizabeth
  • Bamunuarachchige, Niluka
  • Colmenares, Leonardo
  • Martin, James
  • Snelgrove, Peter
  • Mounzih, Nadia

Abrégé

An access policy analysis system may use stored policy summaries to efficiently perform access analysis. A request that causes an access analysis of an entity in a cloud service provider with respect to a resource hosted in the cloud service provider may be received. An access policy summary generated for the entity based on a set of access policies applied by an access management system of the cloud service provider may be obtained. An access policy summary generated for the resource based on the set of access policies may be obtained. A tree structure that describes a hierarchy of entities in the cloud service provider may be traversed to identify a parent node of the entity in the hierarchy of entities. The access analysis may then be generated based on the access policy summaries for the identified node in the tree structure, for the entity and for the resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/31 - IndexationStructures de données à cet effetStructures de stockage

39.

Cloud integrated network security

      
Numéro d'application 18203256
Numéro de brevet 12348536
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2025-07-01
Date d'octroi 2025-07-01
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lakshminarayanan, Sai Krishna
  • Tedesco, Gianni
  • Nally, Morgan
  • Coughlan, Luke

Abrégé

Various embodiments include systems and methods pertaining to a security service platform that detects security threats based on a security service that operates on structurally deduplicated network data. The security service may operate within a cloud environment and perform the security analysis that includes compiling a ruleset to generate an executable, where the executable is run over the structurally deduplicated event data. If the executable identifies a rule match for a given portion of structurally deduplicated event data, then the security service platform may reconstruct the structurally deduplicated event data to access all portions of a network event associated with the structurally deduplicated event data that triggered the rule match. The security service platform may use the reconstructed event data to generate and provide an alert that indicates a detected cyberattack.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 9/40 - Protocoles réseaux de sécurité

40.

Visual exploration for efficient access analysis for cloud provider entities

      
Numéro d'application 17669146
Numéro de brevet 12335267
Statut Délivré - en vigueur
Date de dépôt 2022-02-10
Date de la première publication 2025-06-17
Date d'octroi 2025-06-17
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Samek, Evan
  • Tobolski, Nicholas
  • Martin, James
  • Chalal, Mohamed
  • Abedinzadehvatankhah, Alireza
  • Rivera, Kris

Abrégé

An access policy analysis system may use visual exploration to efficiently perform access analysis. A request to display an effective access of an entity with respect to a resource hosted in a cloud provider may be received via a visual exploration user interface element. An analysis of a set of access policies applied by an access management system to determine an effective access of the entity with respect to the resource may be performed. One or more selectable access policy interface elements may be generated that correspond to one or more access policies of the set of access policies that are used to determine the effective access of the entity with respect to the resource. The one or more selectable access policy interface elements may be included in a display of the visual exploration user interface element along with the determined effective access of the entity with respect to the resource.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

41.

Command line parsing for classification of process start alerts

      
Numéro d'application 17708893
Numéro de brevet 12321454
Statut Délivré - en vigueur
Date de dépôt 2022-03-30
Date de la première publication 2025-06-03
Date d'octroi 2025-06-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Berninger, Matthew
  • Hodgman, Roy
  • Wilbur, Katherine
  • Shivamoggi, Vasudha
  • Johnson, Lauren
  • Daniel, Jacqueline
  • Ludington, Luke

Abrégé

A method includes obtaining a command captured at a computing device to start a process on the computing device submitted via a command line interface. The command is of a plurality of commands captured at respective computing devices that triggered respective alerts to review the plurality of commands. The method includes parsing the command to generate a plurality of tokens that represent the command according to dictionary of features of commands submitted via the command line interface, generating a feature vector based, at least in part, on the plurality of tokens, applying a classification model, trained on other commands submitted via the command line interface to predict benign commands, to the feature vector to determine a score indicative of a probability that the command is benign, and, responsive to a determination that the score is above a confidence threshold, removing the command from the plurality of commands to be reviewed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

42.

Policy exceptions for assessment of network system assets

      
Numéro d'application 17808079
Numéro de brevet 12323466
Statut Délivré - en vigueur
Date de dépôt 2022-06-21
Date de la première publication 2025-06-03
Date d'octroi 2025-06-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Varela, Leonardo

Abrégé

A method for authenticated asset assessment is provided. The method involves executing a scan assistant on an asset to allow a remote scan engine to execute one or more scan operations on the asset for determining a state of the asset. The scan assistant may verify the identity of the scan engine by checking that a certificate received from the scan engine is signed with a private key associated with the scan engine. In some embodiments, the authentication may be performed as part of a TLS handshake process that establishes a TLS connection between the scan engine and the scan assistant. Once the scan engine is authenticated, the scan engine may communicate with the scan assistant according to a communication protocol to collect data about the asset. Advantageously, the disclosed technique reduces security risks associated with authenticated scans and improves the performance of authenticated scans.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

43.

Predictive scan engine runtime durations

      
Numéro d'application 17851450
Numéro de brevet 12314401
Statut Délivré - en vigueur
Date de dépôt 2022-06-28
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Matear, Luke
  • Mcguinness, Thomas

Abrégé

Various embodiments include systems and methods to implement predictive scan engine runtime durations by a security platform to predict runtime durations associated with computing resources. Predictive scan engine runtime durations may be determined by training a prediction model using a multiple linear regression analysis. For example, the security platform may determine a prediction model using training data that associates runtime durations with configuration inputs associated with a security service that operates with respect to a computing resource. Based on the prediction model, the security platform may determine a runtime estimate for a security service run that is configured similarly to a previous security service run used to train the prediction model.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

44.

Automated generation of anomaly scenarios for testing machine learned anomaly detection models

      
Numéro d'application 17139809
Numéro de brevet 12314385
Statut Délivré - en vigueur
Date de dépôt 2020-12-31
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Beauchesne, Jocelyn
  • Oh, John Lim
  • Shivamoggi, Vasudha
  • Hodgman, Roy Donald

Abrégé

An anomaly detection system is disclosed capable of reporting anomalous processes or hosts in a computer network using machine learning models trained using unsupervised training techniques. In embodiments, the system assigns observed processes to a set of process categories based on the file system path of the program executed by the process. The system extracts a feature vector for each process or host from the observation records and applies the machine learning models to the feature vectors to determine an outlier metric each process or host. The processes or hosts with the highest outlier metrics are reported as detected anomalies to be further examined by security analysts. In embodiments, the machine learnings models may be periodically retrained based on new observation records using unsupervised machine learning techniques. Accordingly, the system allows the models to learn from newly observed data without requiring the new data to be manually labeled by humans.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • G06F 11/30 - Surveillance du fonctionnement
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique

45.

Data value classifier

      
Numéro d'application 16519789
Numéro de brevet 12316648
Statut Délivré - en vigueur
Date de dépôt 2019-07-23
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Kienow, Matthew
  • Cook, Brent

Abrégé

Methods and systems for identifying targets on a network. The disclosed methods involve classifying data as valuable or non-valuable, and then classifying an asset associated with the retrieved data as a target or a non-target based in part on the classification of the data.

Classes IPC  ?

46.

Mirroring traffic in a service mesh to detect and block offending microservices

      
Numéro d'application 18107107
Numéro de brevet 12301603
Statut Délivré - en vigueur
Date de dépôt 2023-02-08
Date de la première publication 2025-05-13
Date d'octroi 2025-05-13
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Eastman, Carl

Abrégé

In some examples, a server identifies a first and second microservice. The server creates a first mirror to mirror first traffic sent to the first microservice and a second mirror to mirror second traffic sent to the second microservice. The server configures the first and second mirror service to create mirrored traffic out-of-band of a critical request path of the first and second microservice. The server configures the first and second mirror service to modify a header of a mirrored request to indicate: the mirrored request is a mirrored copy of a request, an original source of the request, and an original destination of the request. The server configures the first and second mirror service to send the mirrored traffic to a traffic analyzer that uses artificial intelligence, automated vulnerability scans, or both to identify an anomalous behavior of an offending microservice in the cluster.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

47.

Storing scan requests for fast preparatory scans of an asset

      
Numéro d'application 17978372
Numéro de brevet 12301611
Statut Délivré - en vigueur
Date de dépôt 2022-11-01
Date de la première publication 2025-05-13
Date d'octroi 2025-05-13
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Miseiko, Paul

Abrégé

A method for authenticated asset assessment is provided. The method includes authenticating, by a scan assistant, a scan engine with the scan assistant for executing one or more scan operations on the asset to determine a state of the asset. The asset includes at least one computing resource. The method also includes receiving, by the scan assistant, a plurality of scan requests associated with the one or more scan operations from the scan engine. The method further includes responding, by the scan assistant, to at least one scan request of the plurality of scan requests by transmitting one or more scan responses to the scan engine after receiving the plurality of scan requests. The scan assistant and the scan engine implement an asynchronous communication protocol that permits the scan engine to send the scan requests without waiting for scan responses for previous scan requests.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 41/085 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau

48.

Recognizing and mitigating successful cyberattacks

      
Numéro d'application 17363817
Numéro de brevet 12289323
Statut Délivré - en vigueur
Date de dépôt 2021-06-30
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Holub, Viliam
  • Parsons, Trevor
  • Shanley, Eoin

Abrégé

Embodiments of a cyberattack monitoring system are disclosed to identify successful attacks on a service based on benign activities of the attacker performed after the initial attack attempt. In embodiments, the system identifies the initial attack by matching client actions to known attack patterns. Clients observed with attempted attacks are remembered as suspected attackers. The system will then monitor subsequent actions of suspected attackers for signs that the initial attack attempt was successful. In embodiments, a successful attack is recognized when the system observes one or more subsequent benign actions by the suspected attacker. In embodiments, the presence of follow-on benign actions is used as a filter to filter out unsuccessful attacks and false positives detected by the system. The filtering enables the system to better focus system resources and human attention on a small set of client activities that are likely successful attacks.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 20/00 - Apprentissage automatique

49.

Techniques for detecting cyberattacks on an authentication system

      
Numéro d'application 18478302
Numéro de brevet 12413606
Statut Délivré - en vigueur
Date de dépôt 2023-09-29
Date de la première publication 2025-04-03
Date d'octroi 2025-09-09
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Shivamoggi, Vasudha
  • Hodgman, Roy
  • Wilbur, Katherine

Abrégé

Some embodiments provide techniques for detecting cyberattacks against a software service authentication system that authorizes access to software services. The techniques access a user activity profile specifying values of parameters indicating the user's pattern of requesting access to unique software service(s). The techniques monitor the activity of the user over a time period to obtain software request data indicating request(s) by the user to access software services in the time period. The techniques determine, using the software service request data and the user activity profile, whether computing activity of the user during the time period is anomalous.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

50.

Techniques for identifying network attack paths

      
Numéro d'application 18478960
Numéro de brevet 12438901
Statut Délivré - en vigueur
Date de dépôt 2023-09-29
Date de la première publication 2025-04-03
Date d'octroi 2025-10-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lee, Austin
  • Komarov, Val
  • Ledezma, Miguel

Abrégé

The techniques described herein relate to identifying network attack paths. An example method includes using at least one computer hardware processor to perform obtaining metadata indicating a set of network resources in a plurality of network resources and network connections among network resources in the set of network resources, generating, using the metadata, a relational representation of the set of network resources, generating, using the relational representation, a plurality of network paths between network resources in the set of network resources, and identifying, from among the plurality of network paths and using the relational representation and information indicating one or more of the plurality of network resources that have at least one respective security vulnerability, one or more network attack paths that may be used to exploit one or more security vulnerabilities of network resources in the set of network resources.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

51.

Techniques for visualizing network attack paths

      
Numéro d'application 18478973
Numéro de brevet 12476996
Statut Délivré - en vigueur
Date de dépôt 2023-09-29
Date de la première publication 2025-04-03
Date d'octroi 2025-11-18
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Komarov, Val
  • Riley, Thomas

Abrégé

An example method includes using at least one computer hardware processor to perform: identifying one or more vulnerable network resources in a plurality of network resources, each of the one or more vulnerable network resources having at least one respective security vulnerability; accessing at least one portion of a relational representation of a set of network resources in the plurality of network resources, identifying, using the at least one portion of the relational representation, one or more network attack paths between the one or more vulnerable network resources and network resources in the set, generating, using the at least one portion of the relational representation, a graph, and generating a GUI comprising a visualization of the graph and information indicating that the one or more attack paths may be used to exploit one or more security vulnerabilities of the set.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

52.

UPDATING REMOTE SCAN ENGINES WITH CUSTOM VULNERABILITY CHECKS

      
Numéro d'application 18973140
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-03-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Steers, Jack

Abrégé

Various embodiments include systems and methods of implementing vulnerability check synchronization. Vulnerability check synchronization may occur between computing resources at multiple different locations including a first location and a second location. Custom vulnerability check information associated with a particular security vulnerability may be received via a security console user interface that is located at the first location. A selection may be received, via the security console user interface, of a particular distributed engine to be utilized to perform a scan of one or more assets based at least in part on the custom vulnerability check information. Responsive to a determination to initiate the scan of the one or more assets, transfer of the custom vulnerability check information to the particular distributed engine via one or more networks may be automatically initiated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

53.

SINGLE ROUND TRIP COLLECTION OF USER AND GROUP DATA FOR SECURITY POSTURE ASSESSMENT

      
Numéro d'application 18973154
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-03-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Kelly, Emmett
  • Miseiko, Paul

Abrégé

A software agent executing on a computing device receives a high-level command from a client and converts the high-level command into multiple low-level commands. The software agent executes individual low-level command on the computing device and sends a result of executing the individual low-level command to the client until each low-level command has been executed.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

54.

DIMENSIONALITY REDUCTION TECHNIQUE FOR TRAINING DATASET WITH BIT STRING FEATURES

      
Numéro d'application 18973144
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-03-27
Propriétaire Rapid7,, Inc. (USA)
Inventeur(s)
  • Beauchesne, Jocelyn
  • Oh, John Lim
  • Shivamoggi, Vasudha
  • Hodgman, Roy Donald

Abrégé

An anomaly detection system is disclosed capable of reporting anomalous processes or hosts in a computer network using machine learning models trained using unsupervised training techniques. In embodiments, the system assigns observed processes to a set of process categories based on the file system path of the program executed by the process. The system extracts a feature vector for each process or host from the observation records and applies the machine learning models to the feature vectors to determine an outlier metric each process or host. The processes or hosts with the highest outlier metrics are reported as detected anomalies to be further examined by security analysts. In embodiments, the machine learnings models may be periodically retrained based on new observation records using unsupervised machine learning techniques. Accordingly, the system allows the models to learn from newly observed data without requiring the new data to be manually labeled by humans.

Classes IPC  ?

55.

TRANSACTION CONFLICT RESOLUTION IN A FILE-SYSTEM-BACKED DATABASE SYSTEM

      
Numéro d'application 18973146
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-03-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Lee, Austin

Abrégé

Embodiments of a transactional database system are described to implement transaction processing over database objects stored in a strongly consistent object storage system. When a transaction is initiated, the system makes a private copy of data objects that are used by the transaction. Reads and writes of the transaction will be performed on the private copy. When the transaction is to be committed, the system verifies that the committed state of the data objects has not changed outside the transaction, and updates metadata object(s) in the data storage system to point to the private copy as the currently committed state of the data objects. If the committed state of any data objects has changed during the transaction, the private copy is abandoned and the transaction is rolled back and/or retried.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

56.

PREDICTING SECURITY VULNERABILITY EXPLOITABILITY BASED ON NATURAL LANGUAGE PROCESSING AND SOURCE CODE ANALYSIS

      
Numéro d'application 18973150
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-03-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Galinkin, Erick

Abrégé

Various embodiments include systems and methods to implement a process for determining expected exploitability of security vulnerabilities. Vulnerability information corresponding to a security vulnerability is input into a multi-headed neural network. A first feature vector is output via a probability of exploitation head of the multi-headed neural network. The first feature vector is extracted from the vulnerability information and comprises a first set of features. A second feature vector is extracted from code snippets and an abstract syntax tree analyzer, with the second feature vector including a second set of features related to the security vulnerability. The two feature vectors are concatenated to produce a third feature vector, and a regression model is used to determine a probability of exploitation for the security vulnerability based at least in part on the third feature vector.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

57.

ASSET SCAN EMPLOYING TWO-WAY AUTHENTICATION PROTOCOL

      
Numéro d'application 18967709
Statut En instance
Date de dépôt 2024-12-04
Date de la première publication 2025-03-20
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Green, James

Abrégé

A method for authenticated asset assessment is provided. The method involves executing a scan assistant on an asset to allow a remote scan engine to execute one or more scan operations on the asset for determining a state of the asset. The scan assistant may verify the identity of the scan engine by checking that a certificate received from the scan engine is signed with a private key associated with the scan engine. In some embodiments, the authentication may be performed as part of a TLS handshake process that establishes a TLS connection between the scan engine and the scan assistant. Once the scan engine is authenticated, the scan engine may communicate with the scan assistant according to a communication protocol to collect data about the asset. Advantageously, the disclosed technique reduces security risks associated with authenticated scans and improves the performance of authenticated scans.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

58.

Automated assessment scheduling

      
Numéro d'application 17512795
Numéro de brevet 12255912
Statut Délivré - en vigueur
Date de dépôt 2021-10-28
Date de la première publication 2025-03-18
Date d'octroi 2025-03-18
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Cancilla, James

Abrégé

Various embodiments include systems and methods of implementing automated assessment scheduling. A set of scheduling parameters may be received, including at least a frequency corresponding to how often assessments are to be completed via a particular automated assessment and a type of assessment to perform in the particular automated assessment. Based at least in part on the set of scheduling parameters, an assessment configuration may be generated. The assessment configuration includes a set of attributes defining how the particular automated assessment is to be performed. At least one scan engine resource of a set of scan engine resources may be identified for utilization in the particular automated assessment. Based at least in part on the assessment configuration and using the at least one scan engine resource, the particular automated assessment may be automatically initiated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

59.

Columnar storage format for fast table updates

      
Numéro d'application 17668440
Numéro de brevet 12242448
Statut Délivré - en vigueur
Date de dépôt 2022-02-10
Date de la première publication 2025-03-04
Date d'octroi 2025-03-04
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lee, Austin
  • Jiandani, Vikram

Abrégé

A database system stores a table as a set of column files in a columnar format in a manner that improves the write performance of the table and avoids use of separate metadata repository. In embodiments, each column file groups values into entity chunks indexed by an entity index. Each chunk includes a live value index that determines which rows in chunk has live values. New values are written to the column file by appending an updated copy of the entity chunk. The entity index to refer to the newly written chunk as the latest version. This approach avoids expensive in-place updating of individual column values and allows the update to be performed much more quickly. In embodiments, the database system encodes metadata such as table schema information using file naming and placement conventions in the file store, so that a centralized metadata repository is not required.

Classes IPC  ?

  • G06F 16/21 - Conception, administration ou maintenance des bases de données
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet

60.

Transactional database system implemented using strongly consistent object storage

      
Numéro d'application 18085745
Numéro de brevet 12242463
Statut Délivré - en vigueur
Date de dépôt 2022-12-21
Date de la première publication 2025-03-04
Date d'octroi 2025-03-04
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Lee, Austin

Abrégé

Embodiments of a transactional database system are described to implement transaction processing over database objects stored in a strongly consistent object storage system. When a transaction is initiated, the system makes a private copy of data objects that are used by the transaction. Reads and writes of the transaction will be performed on the private copy. When the transaction is to be committed, the system verifies that the committed state of the data objects has not changed outside the transaction, and updates metadata object(s) in the data storage system to point to the private copy as the currently committed state of the data objects. If the committed state of any data objects has changed during the transaction, the private copy is abandoned and the transaction is rolled back and/or retried.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

61.

Anomalous data transfer detection

      
Numéro d'application 17577449
Numéro de brevet 12238127
Statut Délivré - en vigueur
Date de dépôt 2022-01-18
Date de la première publication 2025-02-25
Date d'octroi 2025-02-25
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Shivamoggi, Vasudha
  • Hodgman, Roy

Abrégé

Various embodiments include systems and methods of anomalous data transfer detection. Hotspots for an asset of an organization may be determined, corresponding to period(s) of time in which outbound data from the asset satisfies a hotspot threshold determined to be indicative of high outbound data traffic activity. Based on the outbound data, a first set of days are identified as “quiet” day(s); a second set of days are identified as “active” day(s); and “quiet” hour(s) of the day, associated with “active” day(s), are identified. The “quiet” day(s) and the “quiet” hour(s) are identified as a warmspot dataset, which may be utilized to detect anomalous data transfer activity associated with the asset. Detecting the anomalous data transfer activity includes computing one or more statistics on the warmspot dataset. Responsive to detecting the anomalous data transfer activity, an alert associated with the asset may be generated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 7/08 - Tri, c.-à-d. rangement des supports d'enregistrement dans un ordre de succession numérique ou autre, selon la classification d'au moins certaines informations portées sur les supports

62.

Predictive scan engine autoscaling

      
Numéro d'application 17845418
Numéro de brevet 12238133
Statut Délivré - en vigueur
Date de dépôt 2022-06-21
Date de la première publication 2025-02-25
Date d'octroi 2025-02-25
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Matear, Luke
  • Hegarty, Stephen

Abrégé

Various embodiments include systems and methods to implement predictive scan autoscaling by a security platform to predict scanning loads associated with computing resources. Predictive scan autoscaling may improve the security posture of computing resources by improving the speed by which a security platform may scan for threats of a cyberattack. The security platform may predict scanning loads based on data indicative of previous scanning loads over one or more periods of time. The security platform may combine predicted scanning loads with requests for scans received from various client networks.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

63.

Password similarity checking using homomorphic encryption operations

      
Numéro d'application 18588077
Numéro de brevet 12289404
Statut Délivré - en vigueur
Date de dépôt 2024-02-27
Date de la première publication 2025-02-20
Date d'octroi 2025-04-29
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Hodgman, Roy
  • Shivamoggi, Vasudha

Abrégé

Various embodiments include systems and methods to implement a password requirement conformity check. During a password reset process, a proposed password is received. A homomorphic encryption operation may be performed on the proposed password to generate a first character string. The first character string may be compared to a previous character string associated with a previous password to determine a password similarity metric. The password similarity metric may or may not satisfy at least a distance threshold. Responsive to determining that the password similarity metric does not satisfy the distance threshold, there may be a rejection of the proposed password and a prompt to receive an alternative proposed password during the password reset process.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 21/45 - Structures ou outils d’administration de l’authentification
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

64.

COMMAND YOUR ATTACK SURFACE

      
Numéro d'application 1838886
Statut Enregistrée
Date de dépôt 2024-09-24
Date d'enregistrement 2024-09-24
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; software as a service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems.

65.

Using discovered uniform resource identifier information to perform exploitation testing

      
Numéro d'application 18233339
Numéro de brevet 12554783
Statut Délivré - en vigueur
Date de dépôt 2023-08-14
Date de la première publication 2025-02-13
Date d'octroi 2026-02-17
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Smith, Adam
  • Kirk, Ross
  • Pincombe, Jack

Abrégé

A Uniform Resource Identifier (URI) discovery system is implemented that evaluates web configuration servers obtained from web servers to determine the existence and configuration of URIs hosted by the web servers. To discover URIs, the URI discovery system may obtain web server configuration files, and other metadata, from collection agents executing on web servers. The web server configuration files may then be parsed to evaluate the combinations of hosts, paths, and ports for the web server that may correspond to respective URIs. A URI discovery result may then be generated that describes the discovered URIs and includes configurations of the different URIs. The URI discovery result may be stored in an entry for the web server.

Classes IPC  ?

  • G06F 7/02 - Comparaison de valeurs numériques
  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • G06F 16/9538 - Présentation des résultats des requêtes
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]

66.

COMMAND THE ATTACK SURFACE

      
Numéro d'application 1838887
Statut Enregistrée
Date de dépôt 2024-09-24
Date d'enregistrement 2024-09-24
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; software as a service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems.

67.

TAKE COMMAND

      
Numéro d'application 1838890
Statut Enregistrée
Date de dépôt 2024-09-24
Date d'enregistrement 2024-09-24
Propriétaire Rapid7, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; software as a service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems.

68.

HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS

      
Numéro d'application 18907362
Statut En instance
Date de dépôt 2024-10-04
Date de la première publication 2025-01-23
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Millar, Stuart
  • Mcteggart, Ralph

Abrégé

Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06N 3/0455 - Réseaux auto-encodeursRéseaux encodeurs-décodeurs
  • G06N 3/08 - Méthodes d'apprentissage
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/06 - Gestion des fautes, des événements, des alarmes ou des notifications
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

69.

Vendor risk assessment using internet telemetry

      
Numéro d'application 17360277
Numéro de brevet 12205059
Statut Délivré - en vigueur
Date de dépôt 2021-06-28
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Lin, Wah-Kwan
  • Rogers, Harley Ray

Abrégé

Various embodiments include systems and methods of assessing vendor risk. One or more sets of IP address(es) associated with one or more vendors is identified. Risk data related to the set(s) of IP address(es) is obtained using internet telemetry data. Based at least in part on the risk data, security risk level(s) are determined for the vendor(s). Some embodiments include systems and methods of implementing a vendor-based risk posture assessment of an organization. The vendor-based risk posture assessment may be based at least in part on one or more security risk levels determined for the vendor(s) of the organization.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • H04L 9/40 - Protocoles réseaux de sécurité

70.

Asynchronous protocol for assessment of network system assets

      
Numéro d'application 17978368
Numéro de brevet 12206700
Statut Délivré - en vigueur
Date de dépôt 2022-11-01
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Miseiko, Paul

Abrégé

A method for authenticated asset assessment is provided. The method includes authenticating, by a scan assistant, a scan engine with the scan assistant for executing one or more scan operations on the asset to determine a state of the asset. The asset includes at least one computing resource. The method also includes receiving, by the scan assistant, a plurality of scan requests associated with the one or more scan operations from the scan engine. The method further includes responding, by the scan assistant, to at least one scan request of the plurality of scan requests by transmitting one or more scan responses to the scan engine after receiving the plurality of scan requests. The scan assistant and the scan engine implement an asynchronous communication protocol that permits the scan engine to send the scan requests without waiting for scan responses for previous scan requests.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

71.

Using a software agent to provide a higher-level remote procdure call (RPC) mechanism

      
Numéro d'application 17682179
Numéro de brevet 12204959
Statut Délivré - en vigueur
Date de dépôt 2022-02-28
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Kelly, Emmett
  • Miseiko, Paul

Abrégé

A software agent executing on a computing device receives a high-level command from a client and converts the high-level command into multiple low-level commands. The software agent executes individual low-level command on the computing device and sends a result of executing the individual low-level command to the client until each low-level command has been executed.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

72.

Identifying high-influence features for model-detected anomalies

      
Numéro d'application 18536482
Numéro de brevet 12206699
Statut Délivré - en vigueur
Date de dépôt 2023-12-12
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Beauchesne, Jocelyn
  • Oh, John Lim
  • Shivamoggi, Vasudha
  • Hodgman, Roy Donald

Abrégé

An anomaly detection system is disclosed capable of reporting anomalous processes or hosts in a computer network using machine learning models trained using unsupervised training techniques. In embodiments, the system assigns observed processes to a set of process categories based on the file system path of the program executed by the process. The system extracts a feature vector for each process or host from the observation records and applies the machine learning models to the feature vectors to determine an outlier metric each process or host. The processes or hosts with the highest outlier metrics are reported as detected anomalies to be further examined by security analysts. In embodiments, the machine learnings models may be periodically retrained based on new observation records using unsupervised machine learning techniques. Accordingly, the system allows the models to learn from newly observed data without requiring the new data to be manually labeled by humans.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

73.

Event-driven assessment of network system assets

      
Numéro d'application 17878168
Numéro de brevet 12206800
Statut Délivré - en vigueur
Date de dépôt 2022-08-01
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Varela, Leonardo

Abrégé

A method for asset assessment is provided. The method includes receiving, by a scan engine, an event message from a scan assistant associated with an asset of a network system. The asset includes at least one computing resource. The event message includes an indication of one or more events associated with the asset. The method also includes responsive to receiving the event message, transmitting, by the scan engine, a request to the scan assistant for executing one or more scan operations on the asset and to determine a state of the asset based on at least one of an amount of available network resources or a schedule associated with the asset. The method further includes executing, by the scan engine, the one or more scan operations on the asset after transmitting the request.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés

74.

Determining expected exploitability of security vulnerabilities

      
Numéro d'application 17667621
Numéro de brevet 12192223
Statut Délivré - en vigueur
Date de dépôt 2022-02-09
Date de la première publication 2025-01-07
Date d'octroi 2025-01-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Galinkin, Erick

Abrégé

Various embodiments include systems and methods to implement a process for determining expected exploitability of security vulnerabilities. Vulnerability information corresponding to a security vulnerability is input into a multi-headed neural network. A first feature vector is output via a probability of exploitation head of the multi-headed neural network. The first feature vector is extracted from the vulnerability information and comprises a first set of features. A second feature vector is extracted from code snippets and an abstract syntax tree analyzer, with the second feature vector including a second set of features related to the security vulnerability. The two feature vectors are concatenated to produce a third feature vector, and a regression model is used to determine a probability of exploitation for the security vulnerability based at least in part on the third feature vector.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

75.

MODEL-BASED CONFIDENCE RANKING OF WEB APPLICATION VULNERABILITIES

      
Numéro d'application 18883033
Statut En instance
Date de dépôt 2024-09-12
Date de la première publication 2025-01-02
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Millar, Stuart
  • Podgurskii, Denis

Abrégé

Various embodiments include systems and methods of implementing a machine learning model for calculating confidence scores associated with potential security vulnerabilities. The machine learning model is trained using vulnerability data associated with a set of previously identified vulnerabilities, where the vulnerability data indicates whether a previously identified vulnerability is a true positive or a false positive. In some embodiments, scan traffic data may be obtained. The scan traffic data may be associated with potential security vulnerabilities detected via scan engine(s) that implement application security testing. The machine learning model may be used to determine respective confidence scores for each potential security vulnerability. According to some embodiments, responsive to a request for scan findings associated with a particular application, the respective confidence scores may be displayed via a vulnerability analysis graphical user interface.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique

76.

USING CACHED NETWORK DATA ON A DEVICE TO DISCOVER UNSCANNABLE DEVICES

      
Numéro d'application 18883288
Statut En instance
Date de dépôt 2024-09-12
Date de la première publication 2025-01-02
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Kelly, Emmett
  • Kirk, Ross

Abrégé

A software agent executing on a computing device receives a request from a client to provide data associated with neighboring devices to the computing device. The client includes a scan engine to perform a network scan of a network that includes the computing device. The software agent accesses device data in a cache of an operating system command, determines, based on the device data, an identifier associated with each device that is neighboring the computing device, converts the device data into a standardized format to create neighboring device data, and sends the neighboring device data to the client.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/54 - Communication interprogramme
  • H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité

77.

DETECTION OF ANOMALOUS DATA EXFILTRATION USING INTELLIGENT DETECTION THRESHOLDS

      
Numéro d'application 18882986
Statut En instance
Date de dépôt 2024-09-12
Date de la première publication 2025-01-02
Propriétaire RAPID7, INC. (USA)
Inventeur(s)
  • Shivamoggi, Vasudha
  • Hodgman, Roy

Abrégé

Various embodiments include systems and methods of anomalous data transfer detection, including determining hotspots for an asset of an organization. The hotspots correspond to one or more periods of time in which outbound data from the asset satisfies a hotspot threshold determined to be indicative of high outbound data traffic activity. A subset of data that does not correspond to the hotspots is filtered out from the outbound data. The remaining data corresponds to a hotspot dataset associated with the hotspots. The hotspot dataset may be utilized to detect anomalous data transfer activity associated with the asset. Detecting the anomalous data transfer activity includes computing one or more statistics on the hotspot dataset. Responsive to detecting the anomalous data transfer activity, an alert associated with the asset may be generated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

78.

Automated dimensionality reduction for machine learning anomaly detection pipeline

      
Numéro d'application 17139816
Numéro de brevet 12182670
Statut Délivré - en vigueur
Date de dépôt 2020-12-31
Date de la première publication 2024-12-31
Date d'octroi 2024-12-31
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Beauchesne, Jocelyn
  • Oh, John Lim
  • Shivamoggi, Vasudha
  • Hodgman, Roy Donald

Abrégé

An anomaly detection system is disclosed capable of reporting anomalous processes or hosts in a computer network using machine learning models trained using unsupervised training techniques. In embodiments, the system assigns observed processes to a set of process categories based on the file system path of the program executed by the process. The system extracts a feature vector for each process or host from the observation records and applies the machine learning models to the feature vectors to determine an outlier metric each process or host. The processes or hosts with the highest outlier metrics are reported as detected anomalies to be further examined by security analysts. In embodiments, the machine learnings models may be periodically retrained based on new observation records using unsupervised machine learning techniques. Accordingly, the system allows the models to learn from newly observed data without requiring the new data to be manually labeled by humans.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • G06N 20/00 - Apprentissage automatique
  • H04L 9/40 - Protocoles réseaux de sécurité

79.

SCAN ENGINE AUTOSCALING USING CLUSTER-BASED PREDICTION MODELS

      
Numéro d'application 18823725
Statut En instance
Date de dépôt 2024-09-04
Date de la première publication 2024-12-26
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Matear, Luke
  • Hegarty, Stephen

Abrégé

Various embodiments include systems and methods to implement predictive scan autoscaling using cluster-based prediction models by a security platform to predict scanning loads associated with computing resources. Predictive scan autoscaling using cluster-based prediction models may improve the security posture of computing resources by improving the speed by which a security platform may scan for threats of a cyberattack. The security platform may predict scanning loads based on data indicative of previous scanning loads over one or more periods of time for clusters of similar client networks, where similarity may be based on a comparison of deployment assets. The security platform may combine predicted scanning loads with requests for scans received from various client networks.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

80.

AUTOMATED LOGIN FRAMEWORK FOR APPLICATION SECURITY TESTING

      
Numéro d'application 18823759
Statut En instance
Date de dépôt 2024-09-04
Date de la première publication 2024-12-26
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • John, Jijo
  • Kuykendall, Dan

Abrégé

An automated login framework for dynamic application security testing is disclosed. A web application executing on a computing device is accessed and an automated login framework (ALF) is injected into an onload event of a web browser associated with the web application. The ALF is then accessed with a credential associated with the web application. A login page associated with application is identified by matching links or buttons with a user-defined regular expression and a user-defined wordlist. Then, a login form in the login page is detected by executing a signature technique, a dictionary technique, and a multistep signature technique. The login form is populated using the credential and submitted for authentication, and a status with a confidence score is received indicating whether the authentication was successful or failed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

81.

GRAPH ANALYSIS-BASED ASSESSMENT TO DETERMINE RELATIVE NODE SIGNIFICANCE

      
Numéro d'application 18823756
Statut En instance
Date de dépôt 2024-09-04
Date de la première publication 2024-12-26
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lin, Wah-Kwan
  • Deardorff, Paul

Abrégé

Various embodiments include systems and methods to implement a graph analysis-based assessment to determine relative node significance. Network traffic data associated with a network may be obtained. A graph analysis-based assessment of the network may be performed to determine network traffic paths between a plurality of nodes in the network based at least in part on the network traffic data and to calculate, for each node and based at least in part on the network traffic paths, a respective centrality value. The respective centrality value may be indicative of a respective node being a potential source of disruption to the network relative to other nodes. At least one significant node in the network may be identified based at least in part on the centrality values, and a particular action to be performed with respect to the at least one significant node may be determined.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

82.

MACHINE LEARNING TECHNIQUES FOR IDENTIFYING ANOMALOUS VULNERABILITY DATA

      
Numéro d'application 18338259
Statut En instance
Date de dépôt 2023-06-20
Date de la première publication 2024-12-26
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Millar, Stuart
  • Finnbogason, Gudlaugur

Abrégé

Some embodiments provide a vulnerability data processing system that uses machine learning (ML) to identify anomalous vulnerability data among vulnerability data acquired for configuring vulnerability detection of a computer network security system configured to monitor a computing environment. The system obtains vulnerability data that comprises values of a vulnerability parameter. The system generates datapoints representing values of the vulnerability parameter included in the obtained vulnerability data. The system clusters the datapoints to obtain vulnerability parameter clusters. The system identifies anomalous vulnerability data using the vulnerability parameter clusters.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

83.

Synchronization of vulnerability checks between security console and distributed engines

      
Numéro d'application 17467484
Numéro de brevet 12177243
Statut Délivré - en vigueur
Date de dépôt 2021-09-07
Date de la première publication 2024-12-24
Date d'octroi 2024-12-24
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Steers, Jack

Abrégé

Various embodiments include systems and methods of implementing vulnerability check synchronization. Vulnerability check synchronization may occur between computing resources at multiple different locations including a first location and a second location. Custom vulnerability check information associated with a particular security vulnerability may be received via a security console user interface that is located at the first location. A selection may be received, via the security console user interface, of a particular distributed engine to be utilized to perform a scan of one or more assets based at least in part on the custom vulnerability check information. Responsive to a determination to initiate the scan of the one or more assets, transfer of the custom vulnerability check information to the particular distributed engine via one or more networks may be automatically initiated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

84.

Authenticated assessment of network system assets

      
Numéro d'application 17808078
Numéro de brevet 12170656
Statut Délivré - en vigueur
Date de dépôt 2022-06-21
Date de la première publication 2024-12-17
Date d'octroi 2024-12-17
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Green, James

Abrégé

A method for authenticated asset assessment is provided. The method involves executing a scan assistant on an asset to allow a remote scan engine to execute one or more scan operations on the asset for determining a state of the asset. The scan assistant may verify the identity of the scan engine by checking that a certificate received from the scan engine is signed with a private key associated with the scan engine. In some embodiments, the authentication may be performed as part of a TLS handshake process that establishes a TLS connection between the scan engine and the scan assistant. Once the scan engine is authenticated, the scan engine may communicate with the scan assistant according to a communication protocol to collect data about the asset. Advantageously, the disclosed technique reduces security risks associated with authenticated scans and improves the performance of authenticated scans.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

85.

MACHINE LEARNED MODEL FOR GENERATING OPINIONATED THREAT ASSESSMENTS OF SECURITY VULNERABILITIES

      
Numéro d'application 18809422
Statut En instance
Date de dépôt 2024-08-20
Date de la première publication 2024-12-12
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Lin, Wah-Kwan

Abrégé

Disclosed herein are methods, systems, processes, and machine learned models for performing opinionated threat assessments for cybersecurity vulnerabilities. An opinionated threat assessment system is implemented that obtains a training dataset that includes a codified opinionated threat assessment for security vulnerabilities. The codified opinionated threat assessment in the training dataset includes intrinsic attributes for the security vulnerabilities and subject attributes about the security vulnerabilities. The opinionated threat assessment system trains an opinionated threat assessment model using the training dataset and according to a machine learning technique where the training tunes the opinionated threat assessment model to generate a machined learned opinionated threat assessment for a new security vulnerability based on new intrinsic attributes associated with the new security vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

86.

Monitoring Hosts for Anomalous Processes Using Machine Learning Models

      
Numéro d'application 18795280
Statut En instance
Date de dépôt 2024-08-06
Date de la première publication 2024-11-28
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Beauchesne, Jocelyn
  • Oh, John Lim
  • Shivamoggi, Vasudha
  • Hodgman, Roy Donald

Abrégé

An anomaly detection system is disclosed capable of reporting anomalous processes or hosts in a computer network using machine learning models trained using unsupervised training techniques. In embodiments, the system assigns observed processes to a set of process categories based on the file system path of the program executed by the process. The system extracts a feature vector for each process or host from the observation records and applies the machine learning models to the feature vectors to determine an outlier metric each process or host. The processes or hosts with the highest outlier metrics are reported as detected anomalies to be further examined by security analysts. In embodiments, the machine learnings models may be periodically retrained based on new observation records using unsupervised machine learning techniques. Accordingly, the system allows the models to learn from newly observed data without requiring the new data to be manually labeled by humans.

Classes IPC  ?

87.

Machine learned alert classification system

      
Numéro d'application 18795239
Numéro de brevet 12615281
Statut Délivré - en vigueur
Date de dépôt 2024-08-06
Date de la première publication 2024-11-28
Date d'octroi 2026-04-28
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Sánchez, Carlos Manuel Pastor

Abrégé

Disclosed herein are systems, methods, and processes for a machine learned alert triaging classification (ATC) system that uses machine learning techniques to generate an alert triage classification model that can be trained and deployed in modern security operation centers to optimize alert triaging and cyber threat classification. A training dataset of classified records is obtained. Each classified record in the training dataset includes detection characteristics data of a set of machines and threat classification results produced by performing alert triage classification of detection messages associated with the set of machines. An ATC model is trained using the training dataset according to a machine learning technique. The training tunes the ATC model to classify, based on at least the detection characteristics data, a new detection message associated with a machine from the set of machines as a threat or as not a threat.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 20/00 - Apprentissage automatique

88.

Detecting security vulnerabilities associated with transient radio frequency devices

      
Numéro d'application 18795244
Numéro de brevet 12317084
Statut Délivré - en vigueur
Date de dépôt 2024-08-06
Date de la première publication 2024-11-28
Date d'octroi 2025-05-27
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Heiland, Deral
  • Kienow, Matthew
  • Bunn, Adam
  • Cecioni, Alberto

Abrégé

Various embodiments include systems and methods of implementing radio frequency (RF) capture analysis reporting. The implementing may include receiving RF data captured by RF capture component(s) positioned at location(s) within a physical environment. The captured RF data includes RF device metrics associated with RF device(s) identified by the RF capture component(s) as being located within the physical environment. One or more analysis operations may be performed with respect to the RF device(s) based at least in part on the RF device metrics. Based at least in part on a result of the analysis operation(s), a potential security vulnerability associated with a particular RF device may be identified. A report may be generated that identifies at least the potential security vulnerability associated with the particular RF device.

Classes IPC  ?

  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 8/00 - Gestion de données relatives au réseau
  • H04W 24/10 - Planification des comptes-rendus de mesures

89.

Network Data Interpretation Pipeline for Recognizing Machine Operations and Activities from Network Sensor Data

      
Numéro d'application 18773689
Statut En instance
Date de dépôt 2024-07-16
Date de la première publication 2024-11-14
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Dos Santos Lopes, Luis Ramos

Abrégé

Systems and methods are disclosed to implement a network data interpretation pipeline to recognize machine operations (MOs) and machine activities (MAs) from network traffic data observed in a monitored network. In embodiments, a MO recognition engine is implemented in the network to recognize MOs from network sensor events (NSEs) based on defined recognition patterns. The MOs and any unrecognized NSEs are uploaded to a network monitoring system, where they are further analyzed by a MA recognition engine to recognize higher-level machine activities performed by machines. The NSEs, MOs, and MAs are used by the network monitoring system to implement a variety of security threat detection processes. Advantageously, the pipeline may be used to add rich contextual information about the raw network data to facilitate security threat detection processes. Additionally, the MOs and MAs can be used to present the raw network data in a variety of intuitive user interfaces.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

90.

Automated Assessment Scheduling

      
Numéro d'application 18773637
Statut En instance
Date de dépôt 2024-07-16
Date de la première publication 2024-11-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Miseiko, Paul
  • Cancilla, James

Abrégé

Various embodiments include systems and methods of implementing automated assessment scheduling. A particular automated assessment may be automatically performed based at least in part on an assessment configuration and scan engine resource(s) of an organization. Based at least in part on performance of the particular automated assessment, a scan engine utilization assessment may be performed to determine a scan engine utilization value that represents utilization of the scan engine resource(s) with respect to resource requirements that are based at least in part on the set of attributes of the assessment configuration. Based at least in part on the scan engine utilization assessment, a particular resource utilization recommendation may be generated. The particular resource utilization recommendation may correspond to a first resource utilization recommendation to allocate additional scan engine resources or a second resource utilization recommendation to allocate fewer scan engine resources.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

91.

Automatic reconfiguration of network interface driver on network sensor host

      
Numéro d'application 18773734
Numéro de brevet 12474950
Statut Délivré - en vigueur
Date de dépôt 2024-07-16
Date de la première publication 2024-11-07
Date d'octroi 2025-11-18
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Coughlan, Luke
  • Tedesco, Gianni
  • Nally, Morgan

Abrégé

Various embodiments include systems and methods pertaining to a network sensor host configured to implement a receive side scaling (RSS) configuration component in a security environment. The RSS configuration component may be used to automatically generate an RSS configuration comprising one or more settings customized for the network sensor host based at least in part on hardware information of the network sensor host. In some embodiments, the RSS configuration may be applied to change settings of a network interface driver of the network sensor host, e.g., to implement RSS and multithreading for network sensor tasks.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/445 - Chargement ou démarrage de programme

92.

Network Scanner Timeouts

      
Numéro d'application 18775026
Statut En instance
Date de dépôt 2024-07-17
Date de la première publication 2024-11-07
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Kelly, Emmett
  • Miseiko, Paul

Abrégé

Various embodiments include systems and methods to implement network scanner timeouts based at least in part on historical network conditions. The implementing comprises initiating, using one or more network scanners and according to a first set of timeout parameters, a first security assessment of one or more scan targets in a network, wherein the first set of timeout parameters comprises a first initial round trip time (RTT)-timeout parameter value to which a dynamic RTT-timeout value is initially set. The implementing comprises determining a first set of RTT statistics for the first security assessment. The implementing comprises determining, based at least in part on the first set of RTT statistics, a second set of timeout parameters for a second security assessment of the one or more scan targets. The implementing comprises initiating, according to the second set of timeout parameters, the second security assessment of the one or more scan targets.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

93.

Segmentation of web documents based on detected security vulnerabilities

      
Numéro d'application 18752893
Numéro de brevet 12592956
Statut Délivré - en vigueur
Date de dépôt 2024-06-25
Date de la première publication 2024-10-17
Date d'octroi 2026-03-31
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Galinkin, Erick

Abrégé

Various embodiments include systems and methods to implement processing of web content for vulnerability assessments. A plurality of documents comprising web content may be obtained from multiple different web sources, and the documents may be parsed to determine a set of discrete document chunks. Parsing the documents includes determining whether a document satisfies a segmentation condition for segmenting the document into multiple discrete document chunks using a named-entity recognition system configured to segment the document based at least in part on a vulnerability identification. The discrete document chunks may be stored in a database, where vulnerability information is indexed such that each respective entry in the database corresponds to a respective vulnerability identification and a respective discrete document chunk.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion

94.

Interface agnostic validated unified platform queries

      
Numéro d'application 16939482
Numéro de brevet 12118048
Statut Délivré - en vigueur
Date de dépôt 2020-07-27
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Mcteggart, Ralph
  • Williams, Ryan
  • Hutchings, Martin
  • Skelton, Daniel
  • Addis, Sarah

Abrégé

Disclosed herein are methods, systems, and processes for accepting and servicing interface agnostic validated unified platform queries. A request for shared data associated with web applications received from a user interface that is rendered by a client based on a specification is intercepted. The request is forwarded to a unified application programming interface (API) instead of a disparate unique API associated with the web applications. The request from the client is authenticated externally using the unified API and the request for the shared data is authorized to be displayed in the user interface based on the unified API instead of the specification.

Classes IPC  ?

  • G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
  • G06F 16/242 - Formulation des requêtes
  • G06F 16/9538 - Présentation des résultats des requêtes
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

95.

Automated scan engine assignment

      
Numéro d'application 17588413
Numéro de brevet 12118082
Statut Délivré - en vigueur
Date de dépôt 2022-01-31
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Cancilla, James
  • Miseiko, Paul
  • Kelly, Emmett

Abrégé

Various embodiments include systems and methods of automated scan engine assignment. Responsive to determining to initiate a scan of a target asset, a scan engine assignment strategy may be determined for automatically assigning one or more scan engines to perform the scan. Determining the scan engine assignment strategy may include implementing a strategy selection scheme that defines a hierarchy of scan engine assignment strategies, which may include at least one of a passive discovery strategy, an active discovery strategy, or a scan engine subnet strategy. Using the scan engine assignment strategy, the one or more scan engines may be automatically assigned to perform the scan. The scan may be performed using the one or more scan engines.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

96.

Machine learning model for calculating confidence scores associated with potential security vulnerabilities

      
Numéro d'application 17389692
Numéro de brevet 12118095
Statut Délivré - en vigueur
Date de dépôt 2021-07-30
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Millar, Stuart
  • Podgurskii, Denis

Abrégé

Various embodiments include systems and methods of implementing a machine learning model for calculating confidence scores associated with potential security vulnerabilities. The machine learning model is trained using vulnerability data associated with a set of previously identified vulnerabilities, where the vulnerability data indicates whether a previously identified vulnerability is a true positive or a false positive. In some embodiments, scan traffic data may be obtained. The scan traffic data may be associated with potential security vulnerabilities detected via scan engine(s) that implement application security testing. The machine learning model may be used to determine respective confidence scores for each potential security vulnerability. According to some embodiments, responsive to a request for scan findings associated with a particular application, the respective confidence scores may be displayed via a vulnerability analysis graphical user interface.

Classes IPC  ?

  • H04L 29/04 - Commande de la communication; Traitement de la communication pour plusieurs lignes de communication
  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique

97.

Anomalous data transfer detection

      
Numéro d'application 17577444
Numéro de brevet 12120136
Statut Délivré - en vigueur
Date de dépôt 2022-01-18
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Shivamoggi, Vasudha
  • Hodgman, Roy

Abrégé

Various embodiments include systems and methods of anomalous data transfer detection, including determining hotspots for an asset of an organization. The hotspots correspond to one or more periods of time in which outbound data from the asset satisfies a hotspot threshold determined to be indicative of high outbound data traffic activity. A subset of data that does not correspond to the hotspots is filtered out from the outbound data. The remaining data corresponds to a hotspot dataset associated with the hotspots. The hotspot dataset may be utilized to detect anomalous data transfer activity associated with the asset. Detecting the anomalous data transfer activity includes computing one or more statistics on the hotspot dataset. Responsive to detecting the anomalous data transfer activity, an alert associated with the asset may be generated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

98.

Using a remote procedure call (RPC) service to provide data on neighboring devices

      
Numéro d'application 17682262
Numéro de brevet 12120138
Statut Délivré - en vigueur
Date de dépôt 2022-02-28
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Kelly, Emmett
  • Kirk, Ross

Abrégé

A software agent executing on a computing device receives a request from a client to provide data associated with neighboring devices to the computing device. The client includes a scan engine to perform a network scan of a network that includes the computing device. The software agent accesses device data in a cache of an operating system command, determines, based on the device data, an identifier associated with each device that is neighboring the computing device, converts the device data into a standardized format to create neighboring device data, and sends the neighboring device data to the client.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 9/54 - Communication interprogramme
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité

99.

Graph analysis-based assessment to determine relative node significance

      
Numéro d'application 17512753
Numéro de brevet 12113822
Statut Délivré - en vigueur
Date de dépôt 2021-10-28
Date de la première publication 2024-10-08
Date d'octroi 2024-10-08
Propriétaire Rapid7, Inc. (USA)
Inventeur(s)
  • Lin, Wah-Kwan
  • Deardorff, Paul

Abrégé

Various embodiments include systems and methods to implement a graph analysis-based assessment to determine relative node significance. Network traffic data associated with a network may be obtained. A graph analysis-based assessment of the network may be performed to determine network traffic paths between a plurality of nodes in the network based at least in part on the network traffic data and to calculate, for each node and based at least in part on the network traffic paths, a respective centrality value. The respective centrality value may be indicative of a respective node being a potential source of disruption to the network relative to other nodes. At least one significant node in the network may be identified based at least in part on the centrality values, and a particular action to be performed with respect to the at least one significant node may be determined.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

100.

PRE-FLOW GROUPING OF PACKETS FOR OPTIMZED DEEP PACKET INSPECTION

      
Numéro d'application 18738137
Statut En instance
Date de dépôt 2024-06-10
Date de la première publication 2024-10-03
Propriétaire Rapid7, Inc. (USA)
Inventeur(s) Tedesco, Gianpaolo

Abrégé

Disclosed herein are methods, systems, and processes for performing optimized batched packet processing in deep packet inspection (DPI) computing systems. A batch of network packets is received. A stateless processing operation is performed for the batch that includes updating a current time for the batch, decoding the network packets in the batch, creating a flow-hash lookup key for each decoded network packet, and generating a first output that includes the current time and corresponding flow-hash lookup keys for the decoded network packets. Next, a stateful processing operation is performed for the batch that includes accessing the first output of the stateless processing operation, dividing the batch into multiple sub-batches, performing a parallel flow-hash table lookup operation on the network packets that are part of the sub-batches, and generating a second output that includes the sub-batches with associated packet flows. Finally, a batch-optimized DPI processing operation is performed that includes accessing the second output of the stateful processing operation and performing the DPI processing operation on a per-packet basis or on a per-flow basis.

Classes IPC  ?

  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 69/16 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP]
  1     2     3     4        Prochaine page