Trend Micro Incorporated

Japon

Retour au propriétaire

1-100 de 542 pour Trend Micro Incorporated Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 540
        Marque 2
Juridiction
        États-Unis 540
        International 2
Date
2026 janvier 1
2025 décembre 5
2026 (AACJ) 1
2025 16
2024 12
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 179
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 80
G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement 69
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée 67
G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire 47
Voir plus
Classe NICE
42 - Services scientifiques, technologiques et industriels, recherche et conception 2
09 - Appareils et instruments scientifiques et électriques 1
Statut
En Instance 1
Enregistré / En vigueur 541
  1     2     3     ...     6        Prochaine page

1.

Detection of suspicious uniform resource locators

      
Numéro d'application 18522891
Numéro de brevet 12526294
Statut Délivré - en vigueur
Date de dépôt 2023-11-29
Date de la première publication 2026-01-13
Date d'octroi 2026-01-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Kuo, Chih-Yu
  • Ho, Chia-Chin
  • Wu, Mong-Ting

Abrégé

A suspicious Uniform Resource Locator (URL) of a resource on the public Internet is detected by searching a part of the URL for a candidate substring, which is the longest possible substring that is in accordance with a Base64 encoding scheme. The candidate substring is converted to a candidate binary data in accordance with the Base64 encoding scheme. The candidate binary data is then converted to a candidate American Standard Code for Information Interchange (ASCII) string. The candidate ASCII string is evaluated to determine the information type of the candidate ASCII string. A determination as to whether the URL is suspicious is based at least on the information type of the candidate ASCII string.

Classes IPC  ?

  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
  • H03M 7/46 - Conversion en, ou à partir de codes à longueur de série, c.-à-d. par représentation du nombre de chiffres successifs ou groupes de chiffres de même type à l'aide d'un mot-code et d'un chiffre représentant ce type
  • H04L 9/40 - Protocoles réseaux de sécurité

2.

Detection of Bring Your Own Vulnerable Driver attacks in Windows-based systems

      
Numéro d'application 18537288
Numéro de brevet 12511391
Statut Délivré - en vigueur
Date de dépôt 2023-12-12
Date de la première publication 2025-12-30
Date d'octroi 2025-12-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hu, Wen-Tsung
  • Wang, Chieh-Teng
  • Huang, Yi-Da
  • Su, Chih-Jung

Abrégé

Bring Your Own Vulnerable Driver (BYOVD) attacks are detected in Windows-based desktop computers. An opening of a device handle to a device object by a process is detected in the desktop computer. An object path that is used in the opening of the device handle is obtained and parsed to identify a device name of the device object. The device name is compared to device names associated with drivers that have known vulnerabilities. The process that opened the device handle is detected as indicative of a BYOVD attack if the device name is associated with a driver that has a known vulnerability and the process is not a normal process.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 3/12 - Sortie numérique vers une unité d'impression
  • G06F 9/4401 - Amorçage
  • G06F 13/10 - Commande par programme pour dispositifs périphériques
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

3.

Chat detection and response for enterprise data security

      
Numéro d'application 18410316
Numéro de brevet 12511437
Statut Délivré - en vigueur
Date de dépôt 2024-01-11
Date de la première publication 2025-12-30
Date d'octroi 2025-12-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Tsao, Wen-Kwang
  • Girard, David
  • Wong, Mun Hou

Abrégé

A system for preventing submission of sensitive information of an enterprise to a generative artificial intelligence (AI) chatbot includes an endpoint computer and a backend system. A user of the enterprise employs the endpoint computer to chat with the generative AI chatbot. The chat is monitored on the endpoint computer, and a record of the chat is provided to the backend system over the public Internet. In the backend system, the record of the chat is parsed to identify the enterprise's sensitive information, enabling the facilitation of corresponding security management responses and actions.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/60 - Protection de données
  • G06F 40/205 - Analyse syntaxique

4.

Scanning of interactable objects of virtual worlds

      
Numéro d'application 18513127
Numéro de brevet 12511828
Statut Délivré - en vigueur
Date de dépôt 2023-11-17
Date de la première publication 2025-12-30
Date d'octroi 2025-12-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Huq, Numaan
  • Lin, Philippe
  • Reyes, Roel
  • Hagen, Josiah
  • Swimmer, Morton

Abrégé

Interactable objects of a virtual world are scanned to determine if they are malicious. A spatial resource identifier (SRI) of an interactable object is received in a virtual reality (VR) interface that is employed by a user to access the virtual world. The interactable object is scanned when it has been rendered and is in range of the user. The scanning includes querying a backend system, using the SRI, for a reputation of the interactable object when the VR interface is incapable of scanning the interactable object.

Classes IPC  ?

  • G06T 17/00 - Modélisation tridimensionnelle [3D] pour infographie

5.

SCANNING OF CODEBASES FOR VULNERABLE CLOUD RESOURCE DEPENDENCIES

      
Numéro d'application 18883275
Statut En instance
Date de dépôt 2024-09-12
Date de la première publication 2025-12-18
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Surana, Nitesh

Abrégé

Vulnerable cloud resource dependencies are identified in codebases. A codebase is scanned for references to one or more cloud resources. Untrusted cloud resources are identified by comparing the referenced cloud resources to an inventory of trusted cloud resources. An untrusted cloud resource is detected to be vulnerable to a cyberattack in response to determining that a subdomain of the untrusted cloud resource cannot be resolved to an Internet Protocol (IP) address by a Domain Name System (DNS) server and can be registered with a cloud service provider.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

6.

Scanning of security logs to detect data indicative of cyber threats

      
Numéro d'application 18487493
Numéro de brevet 12495056
Statut Délivré - en vigueur
Date de dépôt 2023-10-16
Date de la première publication 2025-12-09
Date d'octroi 2025-12-09
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yueh, Peng-Yuan
  • Fajilago, Josefino Iv
  • Tsai, Chi-Yang
  • Zhuang, Ming-Chin

Abrégé

Filters that include matching criteria for detecting data indicative of attack techniques of cyber threats are provided in a repository. Filters that meet filter conditions of a rule of a heuristic model are automatically included in the rule. Filters that have been automatically included in the rule by having met the filter conditions of the rule are automatically removed from the rule when the filters no longer meet the filter conditions of the rule. A security log is scanned for data that meet matching criteria of filters included in the rule. The heuristic model issues an alert at least in response to detecting that the security log includes data that meet matching criteria of filters included in the rule.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

7.

System and method for identifying anomalous network threat events that occur in a private computer network

      
Numéro d'application 18335639
Numéro de brevet 12432238
Statut Délivré - en vigueur
Date de dépôt 2023-06-15
Date de la première publication 2025-09-30
Date d'octroi 2025-09-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Beyene, Yordanos
  • Yang, Chin-En
  • Curtis, Catherine S.

Abrégé

Network threat events are declared in response to detecting network traffic data indicative of network threats in network traffic involving hosts of a private computer network. Common hosts of the private computer network are identified in network threat events that have occurred within a sampling period. For each identified common host, a baseline of network behavior of the common host in network threat events that have occurred within a sliding time window is generated. A new threat event that has occurred after the sliding time window is identified as anomalous by comparing a network behavior of a common host in the new network threat event against the baseline of network behavior of the common host. An alert is issued in response to detecting an anomalous network threat event that has a risk rating that exceeds a threshold risk level.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

8.

Detecting anomalous loading of dynamic-link libraries

      
Numéro d'application 18441784
Numéro de brevet 12430436
Statut Délivré - en vigueur
Date de dépôt 2024-02-14
Date de la première publication 2025-08-14
Date d'octroi 2025-09-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Lago, Iii, Serafin
  • Roan, John David
  • Gatbunton, Manuel

Abrégé

Anomalous loading of a dynamic-link library (DLL) is detected on a desktop computer. When the file of the DLL is not a known normal file, the locality sensitive (LSH) values of files of known versions of a known normal DLL that corresponds to the DLL are obtained from an LSH repository and compared to the LSH value of the file of the DLL. The smallest distance between the LSH value of the file of the DLL and each of the LSH values from the repository is selected for comparison to a risk threshold. The Loading of the DLL is detected to be an anomaly when the smallest distance is not less than the risk threshold.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/445 - Chargement ou démarrage de programme

9.

Detecting malicious shell scripts in compute instances of cloud computing platforms

      
Numéro d'application 18354886
Numéro de brevet 12367285
Statut Délivré - en vigueur
Date de dépôt 2023-07-19
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • De Oliveira, Alfredo
  • Fiser, David

Abrégé

A cloud computing platform provides compute instances of customer accounts. A shell script in a compute instance is evaluated by normalizing the shell script to output a set of tokens that are separated by a predetermined separator. The set of tokens is searched for presence of reference tokens. The counts of the reference tokens in the set of tokens are formed into an occurrence vector, which is evaluated by a machine learning model to determine if the shell script is malicious.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/10 - Apprentissage automatique utilisant des méthodes à noyaux, p. ex. séparateurs à vaste marge [SVM]

10.

Identifying software products that are installed on a computer

      
Numéro d'application 18310807
Numéro de brevet 12361138
Statut Délivré - en vigueur
Date de dépôt 2023-05-02
Date de la première publication 2025-07-15
Date d'octroi 2025-07-15
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Kung, Chichang

Abrégé

Software products that are installed on a computer are identified from application names of application programs on the computer. The application names are pre-filtered to discard those that do not meet initial product filtering criteria that were used to collect sample data from which training datasets for training encoder-only transformer models were selected. Application names that meet initial product filtering criteria are classified using the encoder-only transformer models. Application names that have been classified by the encoder-only transformer models as those of supported products are post-filtered to discard those that do not meet the initial product filtering criteria of corresponding supported products. Application names that have not been discarded by the post-filtering are deemed to be those of software products installed on the computer.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique

11.

Detection of unauthorized internet of things devices in a computer network

      
Numéro d'application 17134967
Numéro de brevet 12363136
Statut Délivré - en vigueur
Date de dépôt 2020-12-28
Date de la première publication 2025-07-15
Date d'octroi 2025-07-15
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cheng, Daniel
  • Liu, Zhonglin
  • Shi, Patrick
  • Jiang, Jeff

Abrégé

Disclosed are a system and method for detecting an unauthorized Internet of things (IoT) device in a private computer network. Packets of network traffic are collected in the private computer network. An IoT packet is identified from among the collected packets. IoT data is extracted from the IoT packet and encrypted. The encrypted IoT data is transmitted to an artificial neural network in the cloud over the public Internet. The artificial neural network infers, based on the encrypted IoT data, a device type of an IoT device that transmitted the IoT packet in the private computer network. The IoT device is detected to be unauthorized in response to detecting that the device type of the IoT device is not a recognized IoT device type in the private computer network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • G06N 3/045 - Combinaisons de réseaux

12.

Protection of personally identifiable information of users on a computer network

      
Numéro d'application 17877555
Numéro de brevet 12353592
Statut Délivré - en vigueur
Date de dépôt 2022-07-29
Date de la première publication 2025-07-08
Date d'octroi 2025-07-08
Propriétaire Trend Micro Incorproated (Japon)
Inventeur(s) Cheng, Charles Hung-Ching

Abrégé

A cybersecurity system protects personally identifiable information (PII) of users on a computer network. A webpage received in an endpoint computer of the cybersecurity system is parsed to detect one or more input fields that ask a user of the endpoint computer for a PII. Instead of entering the PII of the user into an input field, a substitute value for the PII of the user is entered into the input field based at least on a website that served the webpage to the endpoint computer.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

13.

Protection of public-facing computing assets of an organization

      
Numéro d'application 18178090
Numéro de brevet 12316622
Statut Délivré - en vigueur
Date de dépôt 2023-03-03
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Meyers, Russell
  • Habibi, Michael
  • Yang, Chin-En
  • Chen, Juifang

Abrégé

A system for protecting public-facing computing assets of an organization includes a correlation system and security appliances. Public-facing computing assets of the organization are discovered as being accessible from the Internet. The security appliances monitor network traffic between monitored computing assets of the organization and clients on the Internet. The correlation system correlates certificate information of digital certificates of the monitored computing assets with certificate information of digital certificates of the discovered public-facing computing assets to identify an unprotected computing asset.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

14.

Securing network traffic between a web client and a secure web gateway

      
Numéro d'application 18193290
Numéro de brevet 12316674
Statut Délivré - en vigueur
Date de dépôt 2023-03-30
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Jiang, Juliang
  • Shi, Bin
  • An, Shujun

Abrégé

A secure web gateway is deployed on the cloud between a web client and a web server. The secure web gateway sends the web client a redirect response status code with a replacement server location in response to a Hypertext Transfer Protocol (HTTP) request sent by the web client to access a target resource on the web server. The secure web gateway thereafter receives from the web client a Hypertext Transfer Protocol Secure (HTTPS) request to access the target resource, the HTTPS request includes the replacement server location. The secure web gateway sends the HTTPS request as an HTTP request to the web server. The secure web gateway receives an HTTP response from the web server, and forwards the HTTP response as an HTTPS response to the web client.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

15.

Identifying similar geographically proximate infrastructures from a known network address

      
Numéro d'application 18102026
Numéro de brevet 12267344
Statut Délivré - en vigueur
Date de dépôt 2023-01-26
Date de la première publication 2025-04-01
Date d'octroi 2025-04-01
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Huq, Numaan Mehryar
  • Reyes, Roel Sotto
  • Swimmer, Morton Gregory
  • Ciancaglini, Vincenzo

Abrégé

Similar geographically proximate infrastructures are identified from a received compromised Internet protocol (IP) address of a compromised infrastructure. The geographic location of the compromised infrastructure is determined from the compromised IP address. The geographic locations of other infrastructures are determined from their respective exposed IP addresses. Geographically proximate infrastructures are identified from among the other infrastructures, with the geographically proximate infrastructures having geographic locations that are within a predetermined distance of the geographic location of the compromised infrastructure. Similar geographically proximate infrastructures are identified from among the geographically proximate infrastructures, with the similar geographically proximate infrastructures having a same industrial purpose as the compromised infrastructure.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

16.

Malware families identification based upon hierarchical clustering

      
Numéro d'application 18535386
Numéro de brevet 12254089
Statut Délivré - en vigueur
Date de dépôt 2023-12-11
Date de la première publication 2025-03-18
Date d'octroi 2025-03-18
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chang, Yin-Ming
  • Chen, Hsing-Yun
  • Kung, Hsin-Wen
  • Sung, Li-Chun
  • Wang, Si-Wei

Abrégé

Behavior report generation monitors the behavior of unknown sample files executing in a sandbox. Behaviors are encoded and feature vectors created based upon a q-gram for each sample. Prototypes extraction includes extracting prototypes from the training set of feature vectors using a clustering algorithm. Once prototypes are identified in this training process, the prototypes with unknown labels are reviewed by domain experts who add a label to each prototype. A K-Nearest Neighbor Graph is used to merge prototypes into fewer prototypes without using a fixed distance threshold and then assigning a malware family name to each remaining prototype. An input unknown sample can be classified using the remaining prototypes and using a fixed distance. For the case that no such prototype is close enough, the behavior report of a sample is rejected and tagged as an unknown sample or that of an emerging malware family.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/54 - Communication interprogramme
  • G06F 18/23213 - Techniques non hiérarchiques en utilisant les statistiques ou l'optimisation des fonctions, p. ex. modélisation des fonctions de densité de probabilité avec un nombre fixe de partitions, p. ex. K-moyennes

17.

System and method for evaluating performance of a patching process of an enterprise network

      
Numéro d'application 18071977
Numéro de brevet 12206701
Statut Délivré - en vigueur
Date de dépôt 2022-11-30
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Kung, Chi-Chang

Abrégé

An enterprise network has endpoints, which are computers with a computer program that needs patches to remove vulnerabilities. A plot of a percentage of vulnerable endpoints over time is generated. Patching cycles and residual phases are identified in the plot. A Residual Vulnerable Percentage (RVP) is determined from the plot, the RVP being an average of percentage of vulnerable endpoints in a residual phase. A Time to Patch Managed (TTPM) is determined from the plot as a time period from a beginning of a patching cycle to a beginning of a residual phase in the patching cycle. A performance indicator that is based on the RVP or the TTPM is compared to a corresponding reference to determine if a corrective action needs to be performed to address deficiencies in the efficiency and/or effectiveness of the patching process.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité
  • H04L 41/0866 - Vérification de la configuration

18.

Scanning of files in a customer account of a cloud service for cybersecurity

      
Numéro d'application 17967647
Numéro de brevet 12130922
Statut Délivré - en vigueur
Date de dépôt 2022-10-17
Date de la première publication 2024-10-29
Date d'octroi 2024-10-29
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s) Johnson, Brendan M.

Abrégé

A cloud computing infrastructure hosts a web service with customer accounts. In a customer account, files of the customer account are listed in an index. Files indicated in the index are arranged in groups, with files in each group being scanned using scanning serverless functions in the customer account. The files in the customer account include a compressed tar archive of a software container. Member files of a compressed tar archive in a customer account are randomly-accessed by way of locators that indicate a tar offset, a logical offset, and a decompressor state for a corresponding member file. A member file is accessed by seeking to the tar offset in the compressed tar archive, restoring a decompressor to the decompressor state, decompressing the compressed tar archive using the decompressor, and moving to the logical offset in the decompressed data in memory.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

19.

Adaptive actions for responding to security risks in computer networks

      
Numéro d'application 17588557
Numéro de brevet 12074898
Statut Délivré - en vigueur
Date de dépôt 2022-01-31
Date de la première publication 2024-08-27
Date d'octroi 2024-08-27
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Diao, Lili
  • Li, Zhijie
  • Zhang, Zhengbao

Abrégé

System and method for taking actions to mitigate security risks in a computer network are disclosed. The costs of security events and taking actions to block permissions granted to users are defined. For each of the users, prediction models are created, one for each of the security events. Using prediction models of a selected user, predictions on whether the security events will occur and/or predictions of severity if the security events actually occur are generated. For the selected user, an action list that indicates whether or not to take actions to block particular permissions granted to the selected user is generated based at least on the predictions, costs of the events, and costs of the permissions.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 9/40 - Protocoles réseaux de sécurité

20.

Protecting computers from malicious distributed configuration profiles

      
Numéro d'application 17867019
Numéro de brevet 12063244
Statut Délivré - en vigueur
Date de dépôt 2022-07-18
Date de la première publication 2024-08-13
Date d'octroi 2024-08-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Ou, Yilu
  • Cao, Changxi
  • Zhang, Liangzhi

Abrégé

An endpoint computer is protected from malicious distributed configuration profiles. The endpoint computer receives a distributed configuration profile over a computer network. Before installation of the distributed configuration profile in the endpoint computer, features of the distributed configuration profile are used to traverse a supervised decision tree. A rating score is generated based on weights of nodes of the supervised decision tree that are traversed using the features of the distributed configuration profile. The distributed configuration profile is detected to be malicious based at least on the rating score.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 40/143 - Balisage, p. ex. utilisation du langage SGML ou de définitions de type de document
  • H04N 21/8543 - Création de contenu utilisant un langage de description, p. ex. Groupe expert en codage d'information multimedia et hypermedia [MHEG], langage de balisage extensible [XML]

21.

Detecting an operational state of antivirus software

      
Numéro d'application 17518955
Numéro de brevet 12032705
Statut Délivré - en vigueur
Date de dépôt 2021-11-04
Date de la première publication 2024-07-09
Date d'octroi 2024-07-09
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Manning, Todd Joseph Kalauhala
  • Ali, Muqeet
  • Andersson, Jonathan Edward
  • Hagen, Josiah Dede
  • Lawshae, Richard Andrew
  • Liu, Haoping

Abrégé

Proper functioning of an antivirus software running on an endpoint system is detected using a test data that is provided to the endpoint system. The test data is also provided to a backend system, which provides the endpoint system with an antivirus definition that includes information for detecting the test data. The antivirus software running on the endpoint system scans for the test data and reports detection of the test data to the backend system. The antivirus software is deemed to have failed the proper functioning test when the antivirus software fails to report detection of the test data. Proper functioning of the antivirus software is also detected by performing a challenge procedure, which involves sending a challenge message to the endpoint system. The endpoint system is expected to respond to the challenge message with a response that includes expected information.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

22.

Privacy protection for customer events logs of cybersecurity events

      
Numéro d'application 17530680
Numéro de brevet 12019782
Statut Délivré - en vigueur
Date de dépôt 2021-11-19
Date de la première publication 2024-06-25
Date d'octroi 2024-06-25
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Oliver, Jonathan James

Abrégé

System and methods of analyzing customer events logs for cybersecurity with privacy protection are disclosed. Events logs of cybersecurity events are received from customer computers. Customers in the events logs are represented with ring signatures. Candidate features that occur in a group of events are identified in the events logs. A candidate feature is analyzed, based on corresponding ring signatures, to determine if the candidate feature can be attributed to a customer or a limited number of customers. If so, the candidate feature is considered private and is discarded. Otherwise, the candidate feature is retained as public data suitable for use in cybersecurity operations.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité

23.

Detection and identification of malware using a hierarchical evolutionary tree

      
Numéro d'application 17388191
Numéro de brevet 12013937
Statut Délivré - en vigueur
Date de dépôt 2021-07-29
Date de la première publication 2024-06-18
Date d'octroi 2024-06-18
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Oliver, Jonathan James
  • Chang, Chia-Yen
  • Tsao, Wen-Kwang
  • Cepe, Joseph
  • Reyes, Maria Estella Manly
  • Pajares, Paul Christian D.
  • Pryde, Jayson
  • Chiang, Chiaming
  • Niemczyk, Brandon
  • Zsohar, Leslie

Abrégé

A computer system generates a hierarchical evolutionary tree of digests of sample files. The digests are generated using a locality sensitive hashing function. The digests are grouped into several clusters, and the clusters are grouped into several nodes. The nodes are connected in hierarchical order to generate the hierarchical evolutionary tree. A digest of a file being evaluated for malware is generated using the locality sensitive hashing function. The digest is put in a cluster of the hierarchical evolutionary tree having digests that are most similar to the digest relative to digests of other clusters of the hierarchical evolutionary tree. The digest is identified to be of the same malware family as the digests of the cluster.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/906 - GroupementClassement
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES

24.

Detecting network entities that pose a cybersecurity risk to a private computer network

      
Numéro d'application 17493494
Numéro de brevet 11973791
Statut Délivré - en vigueur
Date de dépôt 2021-10-04
Date de la première publication 2024-04-30
Date d'octroi 2024-04-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Li, Zhijie
  • Zhang, Zhengbao
  • Diao, Lili

Abrégé

A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into communities of related nodes. A response action is performed against a community to mitigate a cybersecurity risk posed by the community.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique

25.

Random access of a member file in a compressed tar archive

      
Numéro d'application 17967649
Numéro de brevet 11934346
Statut Délivré - en vigueur
Date de dépôt 2022-10-17
Date de la première publication 2024-03-19
Date d'octroi 2024-03-19
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Johnson, Brendan M.

Abrégé

A cloud computing infrastructure hosts a web service with customer accounts. In a customer account, files of the customer account are listed in an index. Files indicated in the index are arranged in groups, with files in each group being scanned using scanning serverless functions in the customer account. The files in the customer account include a compressed tar archive of a software container. Member files of a compressed tar archive in a customer account are randomly-accessed by way of locators that indicate a tar offset, a logical offset, and a decompressor state for a corresponding member file. A member file is accessed by seeking to the tar offset in the compressed tar archive, restoring a decompressor to the decompressor state, decompressing the compressed tar archive using the decompressor, and moving to the logical offset in the decompressed data.

Classes IPC  ?

  • G06F 7/02 - Comparaison de valeurs numériques
  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés

26.

Graph-based anomaly detection for cybersecurity

      
Numéro d'application 17534727
Numéro de brevet 11907368
Statut Délivré - en vigueur
Date de dépôt 2021-11-24
Date de la première publication 2024-02-20
Date d'octroi 2024-02-20
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Ye, Peng
  • Ke, Jingchen

Abrégé

Anomalous activities on a computer network are detected from audit or sign-in activity information of a target entity as recorded in an audit or sign-in log. A baseline graph of the target entity is generated using information on activities of the target entity during a collection period. A predict graph of the target entity is generated with information on activities of the target entity during another collection period, which follows and is shorter than the earlier collection period. A residual graph that indicates nodes or edges that are in the predict graph but not in the baseline graph is generated. The residual graph is scored and the score is compared to a threshold to determine whether the target entity has performed an anomalous activity.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

27.

Internet access control based on external third-party data

      
Numéro d'application 17384383
Numéro de brevet 11902280
Statut Délivré - en vigueur
Date de dépôt 2021-07-23
Date de la première publication 2024-02-13
Date d'octroi 2024-02-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cheng, Charles Hung-Ching
  • Hou, Cheng-Lin
  • Liao, Chinghsien
  • Huang, Hua-Lung Richard

Abrégé

Systems and methods for Internet access control are presented. A third-party application is hosted by a third-party server on the Internet. The third-party application has third-party data of a user. An Internet access control device detects an Internet access by the user to a target server on the Internet. The Internet access control device allows or blocks the Internet access depending on whether the Internet access is permitted or prohibited based on the third-party data.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes

28.

Malware families identification based upon hierarchical clustering

      
Numéro d'application 16811651
Numéro de brevet 11886586
Statut Délivré - en vigueur
Date de dépôt 2020-03-06
Date de la première publication 2024-01-30
Date d'octroi 2024-01-30
Propriétaire Trend Micro, Inc. (Japon)
Inventeur(s)
  • Chang, Yin-Ming
  • Chen, Hsing-Yun
  • Kung, Hsin-Wen
  • Sung, Li-Chun
  • Wang, Si-Wei

Abrégé

Behavior report generation monitors the behavior of unknown sample files executing in a sandbox. Behaviors are encoded and feature vectors created based upon a q-gram for each sample. Prototypes extraction includes extracting prototypes from the training set of feature vectors using a clustering algorithm. Once prototypes are identified in this training process, the prototypes with unknown labels are reviewed by domain experts who add a label to each prototype. A K-Nearest Neighbor Graph is used to merge prototypes into fewer prototypes without using a fixed distance threshold and then assigning a malware family name to each remaining prototype. An input unknown sample can be classified using the remaining prototypes and using a fixed distance. For the case that no such prototype is close enough, the behavior report of a sample is rejected and tagged as an unknown sample or that of an emerging malware family.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/54 - Communication interprogramme
  • G06F 18/23213 - Techniques non hiérarchiques en utilisant les statistiques ou l'optimisation des fonctions, p. ex. modélisation des fonctions de densité de probabilité avec un nombre fixe de partitions, p. ex. K-moyennes

29.

Automated mitigation of cyber threats using a semantic cybersecurity database

      
Numéro d'application 17229248
Numéro de brevet 11882148
Statut Délivré - en vigueur
Date de dépôt 2021-04-13
Date de la première publication 2024-01-23
Date d'octroi 2024-01-23
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hagen, Josiah Dede
  • Girard, David
  • Andersson, Jonathan Edward
  • Ciancaglini, Vincenzo
  • Weigend, Jannis
  • Ibrahim, Ahmed M.
  • Gorbulev, Mikhail

Abrégé

Systems and methods are presented for mitigating cyber threats. Cybersecurity-related data are stored in a semantic cybersecurity database. A user interface converts a user input to a command utterance. A command node that corresponds to the command utterance is identified in the cybersecurity database. The command node is resolved to one or more action nodes that are connected to the command node, and each action node is resolved to one or more parameter nodes that are connected to the action node. The command node has a command that implements actions indicated in the action nodes. Each action can have one or more required parameters indicated in the parameter nodes. The values of the required parameters are obtained from the command utterance, prompted from the user, or obtained from the cybersecurity database. Actions with their parameter values are executed to mitigate a cyber threat in accordance with the user input.

Classes IPC  ?

30.

Methods and arrangement for preventing spam comments without application specific changes

      
Numéro d'application 16554211
Numéro de brevet 11841918
Statut Délivré - en vigueur
Date de dépôt 2019-08-28
Date de la première publication 2023-12-12
Date d'octroi 2023-12-12
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s) Li, Chia

Abrégé

A method for preventing spam comments from populating a web site is provided. The method includes intercepting a HTTP (Hypertext Transfer Protocol) response, which includes a web page with a form for enabling a client's general comments to be published on the web site. The method also includes modifying the web page with the form to create a modified web page with a randomized form. The modifying includes randomly adding a set of randomized variable names to the web page with the form. The set of randomized variable names is a set of randomly generated character strings. The method further includes forwarding the modified web page with the randomized form to the client. The method yet also includes adding the set of randomized variable name to a form database, which is configured for storing data about the modified web page with the randomized form.

Classes IPC  ?

  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06F 40/174 - Remplissage de formulairesFusion
  • H04L 51/52 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel pour la prise en charge des services des réseaux sociaux

31.

Systems and methods for preventing information leakage

      
Numéro d'application 17510914
Numéro de brevet 11841970
Statut Délivré - en vigueur
Date de dépôt 2021-10-26
Date de la première publication 2023-12-12
Date d'octroi 2023-12-12
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s) Fan, Chi-Huang

Abrégé

A system for preventing information leakage due to access by an application to a file is provided. The system for preventing information leakage includes an application identification module configured to obtain data associated with the application. The system for preventing information leakage also includes an association table containing file-type data and trusted-application data. In addition, the system also includes an access control module to determine the application identifier and the association table. The system for preventing information leakage is configured to determine whether to deny content access by the application to content of the file as saved in the file.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/60 - Protection de données

32.

False alarm reduction by novelty detection

      
Numéro d'application 16729848
Numéro de brevet 11822655
Statut Délivré - en vigueur
Date de dépôt 2019-12-30
Date de la première publication 2023-11-21
Date d'octroi 2023-11-21
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Pryde, Jayson
  • Bisuna, Bernard

Abrégé

Features of sample files that are known to be normal are extracted by random projection. The random projection values of the sample files are used as training data to generate one or more anomaly detection models. Features of a target file being inspected are extracted by generating a random projection value of the target file. The random projection value of the target file is input to an anomaly detection model to determine whether or not the target file has features that are novel relative to the sample files. The target file is declared to be an outlier when an anomaly detection model generates an inference that indicates that the target file has novel features.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

33.

Detecting unauthorized access points in a network

      
Numéro d'application 17510892
Numéro de brevet 11818580
Statut Délivré - en vigueur
Date de dépôt 2021-10-26
Date de la première publication 2023-11-14
Date d'octroi 2023-11-14
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Wu, Chun-Da

Abrégé

Methods and apparatus for detecting, in a gateway device configured for facilitating communication between an intranet and an external network, the existence of an unauthorized wireless access point in the intranet. The method includes determining whether a packet received at the gateway originates from one of the wireless devices. If a received at the gateway originates from a wireless device, the method includes determining whether a source MAC address associated with the packet is one of the set of known MAC addresses. If not, the method further includes taking a remedial action to prevent the unauthorized wireless access point from accessing one of the intranet and the external network.

Classes IPC  ?

34.

Multiclass classification system with accumulator-based arbitration

      
Numéro d'application 17156869
Numéro de brevet 11805139
Statut Délivré - en vigueur
Date de dépôt 2021-01-25
Date de la première publication 2023-10-31
Date d'octroi 2023-10-31
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Liao, Chinghsien
  • Cheng, Daniel

Abrégé

A multiclass classifier generates a probability vector for individual data units of an input data stream. The probability vector has prediction probability values for classes that the multiclass classifier has been trained to detect. A class with the highest prediction probability value among the classes in a probability vector is selected as the predicted class. A confidence score is calculated based on the prediction probability value of the class. Confidence scores of the class are accumulated within a sliding window. The class is declared to be the detected class of the input data stream when the accumulated value of the class meets an accumulator threshold. A security policy for an application program that is mapped to the class is enforced against the input data stream.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • H04L 9/40 - Protocoles réseaux de sécurité

35.

Secure video content transmission over a computer network

      
Numéro d'application 17376697
Numéro de brevet 11804961
Statut Délivré - en vigueur
Date de dépôt 2021-07-15
Date de la première publication 2023-10-31
Date d'octroi 2023-10-31
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Oliver, Jonathan James
  • Chang, Chia-Yen
  • Tsao, Wen-Kwang
  • Wu, Ping Huan
  • Maggi, Federico
  • Gogela, Jiri
  • Yarochkin, Fyodor

Abrégé

A computer network includes a camera node, a network access node, a verification node, and a display node. Video content recorded by a camera at the camera node is transmitted to the display node and to the verification node for verification. The video content is verified at the display node and at the verification node. Recording metadata of the video content is stored in a distributed ledger and retrieved by the display node to verify the video content. The verification node receives, from the network access node, verification data for verifying the video content.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/787 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p. ex. la localisation
  • G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • H04W 12/71 - Identité matérielle
  • H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité

36.

Systems and methods for detecting scam emails

      
Numéro d'application 16679567
Numéro de brevet 11757816
Statut Délivré - en vigueur
Date de dépôt 2019-11-11
Date de la première publication 2023-09-12
Date d'octroi 2023-09-12
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Lin, Tsung-Fu
  • Peng, Jyh-Ying
  • Yeh, Che-Fu
  • Huang, Yen-Shuo
  • Shen, Jeng-Yan

Abrégé

A scam detection system includes a user computer that runs a security application and a backend system that runs a scam detector. An email is received at the user computer. The security application extracts and forwards a content of the email, which includes a body of the email, to the backend system. The email body of the email is anonymized by removing personally identifiable information from the email body. A hash of the anonymized email body is generated and compared against hashes of a whitelist and a blacklist. The anonymized email body is classified. A segment of text of the anonymized email body is identified and provided to the user computer when the anonymized email body is classified as scam.

Classes IPC  ?

  • H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
  • G06Q 10/107 - Gestion informatisée du courrier électronique
  • H04L 9/40 - Protocoles réseaux de sécurité

37.

Stateful detection of cyberattacks

      
Numéro d'application 16774358
Numéro de brevet 11736498
Statut Délivré - en vigueur
Date de dépôt 2020-01-28
Date de la première publication 2023-08-22
Date d'octroi 2023-08-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Tsao, Wen-Kwang
  • Wong, Mun-Hou
  • Bu, Annie
  • Chang, Chia-Yen
  • Oliver, Jonathan James
  • Huang, Liam
  • Lai, Allen
  • Chiu, Chien-Yi
  • Wu, Ping-Huan

Abrégé

A system for stateful detection of cyberattacks includes an endpoint computer and a backend computer system. The endpoint computer monitors for cyberattacks and sends out queries for detected security events. The backend computer system stores observation data that are included in the queries. The backend computer system combines current observation data from a current query, relevant observation data from previous queries, and relevant cybersecurity data. The combined data are evaluated for cyberattacks.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 16/242 - Formulation des requêtes

38.

Frictionless authentication for logging on a computer service

      
Numéro d'application 16255273
Numéro de brevet 11714891
Statut Délivré - en vigueur
Date de dépôt 2019-01-23
Date de la première publication 2023-08-01
Date d'octroi 2023-08-01
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

A login authentication process to access a computer service includes displaying a virtual keyboard on a display screen of a computer. A user enters a password by clicking on the virtual keyboard. The manner the user clicked on the virtual keyboard to enter the password is compared to the manner an authorized user of the computer service clicked on the virtual keyboard to enter an authorized password during a learning phase. The login authentication is deemed to be a success when the password matches the authorized password, and the manner the user clicked on the virtual keyboard to enter the password matches the manner the authorized user clicked on the virtual keyboard to enter the authorized password.

Classes IPC  ?

  • G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06F 3/0354 - Dispositifs de pointage déplacés ou positionnés par l'utilisateurLeurs accessoires avec détection des mouvements relatifs en deux dimensions [2D] entre le dispositif de pointage ou une partie agissante dudit dispositif, et un plan ou une surface, p. ex. souris 2D, boules traçantes, crayons ou palets
  • G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 3/04886 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels par partition en zones à commande indépendante de la surface d’affichage de l’écran tactile ou de la tablette numérique, p. ex. claviers virtuels ou menus
  • G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p. ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
  • G06F 3/0486 - Glisser-déposer

39.

Systems and methods for facilitating malicious site detection

      
Numéro d'application 17510905
Numéro de brevet 11706222
Statut Délivré - en vigueur
Date de dépôt 2021-10-26
Date de la première publication 2023-07-18
Date d'octroi 2023-07-18
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Qiu, Peng
  • Huangfu, Zeyi

Abrégé

A system for facilitating Internet security for devices on a local area network (LAN) is disclosed. The LAN may connect to a rating server through the Internet and may including at least an anti-malware application for detecting malware. The system may include a black list for being implemented on the LAN for storing identifiers of a set of forbidden sites. The devices may be prevented from accessing content provided by each of the forbidden sites. The system may also include a profiler for being implemented on the LAN for updating the black list utilizing a set of result data. The data may include scan result data and rating result data. The scan result data may pertain to results of scans performed by the anti-malware application; the rating result data may pertain to results of rating performed by the rating server.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

40.

Clustering of binary files using architecture-agnostic digests

      
Numéro d'application 16552430
Numéro de brevet 11687652
Statut Délivré - en vigueur
Date de dépôt 2019-08-27
Date de la première publication 2023-06-27
Date d'octroi 2023-06-27
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Pinheiro, Fernando Vinicius Merces
  • Costoya, Joey Nojas

Abrégé

A target binary file is clustered by reducing the target binary file to its architecture-agnostic functions, which are converted into an input string. The target digest of the input string is calculated and compared to digests of malicious binary files. A cluster having digests of malicious binary files that are similar to the target digest is identified. In response to identifying the cluster, the target binary file is detected to be malicious and of the same malware family as the malicious binary files of the cluster.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée

41.

System and method for detecting malicious scripts

      
Numéro d'application 16239942
Numéro de brevet 11574053
Statut Délivré - en vigueur
Date de dépôt 2019-01-04
Date de la première publication 2023-02-07
Date d'octroi 2023-02-07
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chen, Te-Ching
  • Ho, Chih-Kun
  • Lee, Yung-Hsiang

Abrégé

An endpoint system receives a target file for evaluation for malicious scripts. The original content of the target file is normalized and stored in a normalized buffer. Tokens in the normalized buffer are translated to symbols, which are stored in a tokenized buffer. Strings in the normalized buffer are stored in a string buffer. Tokens that are indicative of syntactical structure of the normalized content are extracted from the normalized buffer and stored in a structure buffer. The content of the tokenized buffer and counts of tokens represented as symbols in the tokenized buffer are compared against heuristic rules indicative of malicious scripts. The contents of the tokenized buffer and string buffer are compared against signatures of malicious scripts. The contents of the tokenized buffer, string buffer, and structure buffer are input to a machine learning model that has been trained to detect malicious scripts.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06N 20/00 - Apprentissage automatique
  • G06F 9/54 - Communication interprogramme
  • G06N 5/00 - Agencements informatiques utilisant des modèles fondés sur la connaissance
  • G06F 40/211 - Parsage syntaxique, p. ex. basé sur une grammaire hors contexte ou sur des grammaires d’unification
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence

42.

Malicious code scanning of remotely-located files

      
Numéro d'application 17110703
Numéro de brevet 11574058
Statut Délivré - en vigueur
Date de dépôt 2020-12-03
Date de la première publication 2023-02-07
Date d'octroi 2023-02-07
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Johnson, Brendan Matthew

Abrégé

A file is stored in a public cloud storage. A serverless computing platform receives an event notification that the file has been stored and, in response, creates an instance of an ephemeral environment wherein a security module is executed. The security module creates a memory-mapped space with memory locations that are mapped to the entire content of the file but does not allocate memory for all of the memory locations. Instead, the security module retrieves sections of the file from the public cloud storage as these sections are accessed in their designated memory locations in accordance with the memory mapping, allocates memory for the retrieved sections, stores the retrieved sections in their designated memory locations, and scans the retrieved sections in their designated memory locations for malicious code. The security module continues scanning the file in sections until relevant sections of the file have been scanned.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

43.

Context-aware machine learning system

      
Numéro d'application 15884660
Numéro de brevet 11568301
Statut Délivré - en vigueur
Date de dépôt 2018-01-31
Date de la première publication 2023-01-31
Date d'octroi 2023-01-31
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yueh, Peng-Yuan
  • Chang, Chia-Yen
  • Wang, Po-I
  • Chen, Te-Ching

Abrégé

A machine learning system includes multiple machine learning models. A target object, such as a file, is scanned for machine learning features. Context information of the target object, such as the type of the object and how the object was received in a computer, is employed to select a machine learning model among the multiple machine learning models. The machine learning model is also selected based on threat intelligence, such as census information of the target object. The selected machine learning model makes a prediction using machine learning features extracted from the target object. The target object is allowed or blocked depending on whether or not the prediction indicates that the target object is malicious.

Classes IPC  ?

44.

Password protection with independent virtual keyboard

      
Numéro d'application 16716156
Numéro de brevet 11558375
Statut Délivré - en vigueur
Date de dépôt 2019-12-16
Date de la première publication 2023-01-17
Date d'octroi 2023-01-17
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/31 - Authentification de l’utilisateur
  • H04L 67/306 - Profils des utilisateurs
  • G06F 3/04886 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels par partition en zones à commande indépendante de la surface d’affichage de l’écran tactile ou de la tablette numérique, p. ex. claviers virtuels ou menus
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
  • G06F 21/42 - Authentification de l’utilisateur par des canaux séparés pour les données de sécurité
  • G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes

45.

Decryption of encrypted network traffic using an inline network traffic monitor

      
Numéro d'application 17208167
Numéro de brevet 11539755
Statut Délivré - en vigueur
Date de dépôt 2021-03-22
Date de la première publication 2022-12-27
Date d'octroi 2022-12-27
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Boyce, Kevin G.

Abrégé

An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.

Classes IPC  ?

46.

On-demand scanning of e-mail attachments

      
Numéro d'application 17234676
Numéro de brevet 11516249
Statut Délivré - en vigueur
Date de dépôt 2021-04-19
Date de la première publication 2022-11-29
Date d'octroi 2022-11-29
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

An attachment to an e-mail message received at an e-mail gateway is scanned by a scan server and then is converted into an HTML file. The HTML file includes preview data of the attachment (minus any macro scripts), the entire original data of the attachment, scan functionality enabling a user to send the attachment back to a scan server for a second scan, or extract functionality enabling a user to extract the original attachment data for saving or opening in an application. The recipient is able to open or save the attachment directly if he or she believes it comes from a trusted sender. If the attachment seems suspicious, the recipient previews the attachment first before performing a scan, opening the attachment or deleting it. The recipient performs a scan of the attachment by clicking a “scan” button to send the attachment to a backend server for a second scan where an updated virus pattern file may be available to detect any zero-day malware.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
  • H04L 51/08 - Informations annexes, p. ex. pièces jointes

47.

Mitigation of cyberattacks on cellular devices

      
Numéro d'application 17137789
Numéro de brevet 11510061
Statut Délivré - en vigueur
Date de dépôt 2020-12-30
Date de la première publication 2022-11-22
Date d'octroi 2022-11-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Lin, Chih-Shen
  • Cheng, Jyun-Yan
  • Yen, Ting-Yin
  • Li, Yi-Lun

Abrégé

A pause command is sent to a Subscriber Identity Module (SIM) card of a cellular device in response to detecting a cyberattack against the cellular device on the cellular network. To mitigate the cyberattack, the SIM card temporarily disconnects the cellular device from the cellular network for a pause time. The SIM card prohibits the cellular device from connecting to the cellular network during the pause time and automatically allows the cellular device to reconnect to the cellular network after the pause time.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 76/30 - Libération de la connexion
  • H04W 48/02 - Restriction d'accès effectuée dans des conditions spécifiques
  • H04W 76/10 - Établissement de la connexion
  • H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G16Y 30/10 - Sécurité de l’infrastructure
  • H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
  • G16Y 10/75 - Technologie de l'informationCommunication

48.

Robust whitelisting of legitimate files using similarity score and suspiciousness score

      
Numéro d'application 16841025
Numéro de brevet 11487876
Statut Délivré - en vigueur
Date de dépôt 2020-04-06
Date de la première publication 2022-11-01
Date d'octroi 2022-11-01
Propriétaire Trend Micro Inc. (Japon)
Inventeur(s) Pryde, Jayson

Abrégé

A locality-sensitive hash value is calculated for a suspect file in an endpoint computer. A similarity score is calculated for the suspect hash value by comparing it to similarly-calculated hash values in a cluster of known benign files. A suspiciousness score is calculated for the suspect hash value based upon similar matches in a cluster of benign files and a cluster of known malicious files. These similarity score and the suspiciousness score or combined in order to determine if the suspect file is malicious or not. Feature extraction and a set of features for the suspect file may be used instead of the hash value; the classes would contain sets of features rather than hash values. The clusters may reside in a cloud service database. The suspiciousness score is a modified Tarantula technique. Matching of locality-sensitive hashes may be performed by traversing tree structures of hash values.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

49.

Protection of kernel extension in a computer

      
Numéro d'application 17207197
Numéro de brevet 11461465
Statut Délivré - en vigueur
Date de dépôt 2021-03-19
Date de la première publication 2022-10-04
Date d'octroi 2022-10-04
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Jiang, Chuan
  • Li, Xilin
  • Zhang, Yafei

Abrégé

A method protects a daemon in an operating system of a host computer. The operating system detects that there is an access of a plist file of a daemon by a process in the computer. If so, then it executes a callback function registered for the plist file. The callback function sends to a kernel extension a notification of the attempted access. The kernel extension returns a value to the operating system indicating that the access should be denied. The operating system denies access to the plist file of the daemon by the process. The extension may also notify an application which prompts the user for instruction. The kernel extension also protects itself by executing its exit function when a command is given to unload the extension, and the exit function determines whether or not the command is invoked by an authorized application, such as by checking a flag.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données

50.

Automatic charset and language detection with machine learning

      
Numéro d'application 16547211
Numéro de brevet 11449794
Statut Délivré - en vigueur
Date de dépôt 2019-08-21
Date de la première publication 2022-09-20
Date d'octroi 2022-09-20
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Diao, Lili

Abrégé

Language-based machine learning approach for automatically detecting universal charset and the language of a received document is disclosed. The language-based machine learning approach employs a plurality of text document samples in different languages, after converting them to a selected Unicode style (if their original encoding schemes are not the selected Unicode), to generate a plurality of language-based machine learning models during the training stage. During the application stage, vector representations of the received document for different combinations of charsets and their respective applicable languages are tested against the plurality of machine learning models to ascertain the charset and language combination that is most similar to its associated machine learning model, thereby identifying the charset and language of the received document.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06F 40/16 - Apprentissage automatique des règles de transformation, p. ex. au moyen d’exemples
  • G06F 40/30 - Analyse sémantique

51.

Detecting unsecure data flow in automation task programs

      
Numéro d'application 16822346
Numéro de brevet 11440190
Statut Délivré - en vigueur
Date de dépôt 2020-03-18
Date de la première publication 2022-09-13
Date d'octroi 2022-09-13
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s)
  • Maggi, Federico
  • Pogliani, Marcello
  • Quarta, Davide
  • Vittone, Martino
  • Zanero, Stefano

Abrégé

An automation task program is inspected for unsecure data flow. The task program is parsed to generate a parse tree, which is visited to generate control flow graphs of functions of the task program. The control flow graphs have nodes, which have domain-agnostic intermediate representations. The control flow graphs are connected to form an intermediate control flow graph. The task program is deemed to have an unsecure data flow when data is detected to flow from a data source to a data sink, with the data source and the data sink forming a source-sink pair that is indicative of an unsecure data flow.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • B25J 9/16 - Commandes à programme
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage

52.

Detecting malware by pooled analysis of sample files in a sandbox

      
Numéro d'application 17072311
Numéro de brevet 11379578
Statut Délivré - en vigueur
Date de dépôt 2020-10-16
Date de la première publication 2022-07-05
Date d'octroi 2022-07-05
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s)
  • Qu, Jun
  • Ding, Zhichao
  • Tao, Renkui

Abrégé

Systems and methods are presented for performing sandboxing to detect malware. Sample files are received and activated individually in separate sandboxes in one mode of operation. In another mode of operation, sample files are assigned to pools. Sample files of a pool are activated together in the same sandbox. The sample files of the pool are deemed to be normal when no anomalous event is detected in the sandbox. Otherwise, when an anomalous event is detected in the sandbox, the sample files of the pool are activated separately in separate sandboxes to isolate and identify malware among the sample files.

Classes IPC  ?

  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

53.

Detection of malicious mobile apps

      
Numéro d'application 17028364
Numéro de brevet 11356853
Statut Délivré - en vigueur
Date de dépôt 2020-09-22
Date de la première publication 2022-06-07
Date d'octroi 2022-06-07
Propriétaire TREND MICRO INCORPORATED (Japon)
Inventeur(s)
  • Wu, Longping
  • Ye, Hua
  • Yin, Bin
  • Zhou, Zhihua
  • Zhang, Zhengbao

Abrégé

A mobile app is in a form of a package file. A structural feature digest is generated from contents of a manifest part, bytecode part, and resource part of the package file. A mobile device receives an unknown mobile app, generates a structural feature digest of the unknown mobile app, and sends the structural feature digests to a backend system over a computer network. In the backend system, the structural feature digest of the unknown mobile app is compared to structural feature digests of known malicious mobile apps. The unknown mobile app is detected to be malicious when its structural feature digest is similar to that of a known malicious mobile app.

Classes IPC  ?

  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04W 12/128 - Dispositions anti-programmes malveillants, p. ex. protection contre la fraude par SMS ou les programmes malveillants mobiles
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 8/52 - Binaire à binaire
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles

54.

Malware detection using locality sensitive hashing of API call sequences

      
Numéro d'application 16787204
Numéro de brevet 11354409
Statut Délivré - en vigueur
Date de dépôt 2020-02-11
Date de la première publication 2022-06-07
Date d'octroi 2022-06-07
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s) Kenefick, Ian

Abrégé

An agent on an endpoint computer computes a locality-sensitive hash value for an API call sequence of an executing process. This value is sent to a cloud computer which includes an API call sequence blacklist database of locality-sensitive hash values. A search is performed using a balanced tree structure of the database using the received hash value and a match is determined based upon whether or not a metric distance is under or above a distance threshold. The received value may also be compared to a white list of locality-sensitive hash values. Attribute values of the executing process are also received from the endpoint computer and may be used to inform whether or not the executing process is deemed to be malicious. An indication of malicious or not is returned to the endpoint computer and if malicious, the process may be terminated and its subject file deleted.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/54 - Communication interprogramme

55.

Dynamic taint tracking on mobile devices

      
Numéro d'application 16363056
Numéro de brevet 11354433
Statut Délivré - en vigueur
Date de dépôt 2019-03-25
Date de la première publication 2022-06-07
Date d'octroi 2022-06-07
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Sun, Liang
  • Sun, Xingxing
  • Ye, Hua

Abrégé

Taint is dynamically tracked on a mobile device. Taint virtual instructions are added to virtual instructions of a control-flow graph (CFG). A taint virtual instruction has a taint operand that corresponds to an operand of a virtual instruction and has a taint output that corresponds to an output of the virtual instruction in a block of the CFG. Registers are allocated for the taint virtual instruction and the virtual instructions. After register allocation, the taint virtual instruction and the virtual instructions are converted to native code, which is executed to track taint on the mobile device.

Classes IPC  ?

  • G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 8/41 - Compilation

56.

Protected smart contracts for managing internet of things devices

      
Numéro d'application 16372840
Numéro de brevet 11349926
Statut Délivré - en vigueur
Date de dépôt 2019-04-02
Date de la première publication 2022-05-31
Date d'octroi 2022-05-31
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Wang, Tai-An
  • Chen, Liang-Chih
  • Chen, Yu-Shu
  • Yen, Ting-Yin

Abrégé

A system includes Internet of things (IOT) devices that are paired with corresponding edge computers. Smart contracts are generated for edge computers, and deployed in a blockchain. Upon receipt of a message, a smart contract compares a sender of the message to a designated owner of the smart contract. The smart contract has a privilege checker that allows a message from the owner of the smart contract to initiate execution of a function that modifies a variable of the smart contract, but prevents messages from non-owners from initiating execution of the function.

Classes IPC  ?

  • H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
  • H04L 9/40 - Protocoles réseaux de sécurité

57.

Visual representation of sender domain information and e-mail routing

      
Numéro d'application 16852015
Numéro de brevet 11329936
Statut Délivré - en vigueur
Date de dépôt 2020-04-17
Date de la première publication 2022-05-10
Date d'octroi 2022-05-10
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

The system executes online on corporate premises or in a cloud service, or offline. An e-mail message is received at a server within a corporate network or cloud service. A header of the e-mail message is parsed to determine locations of server computers through which the e-mail message has traveled. Geographic locations are placed into a routing map. A banner is inserted into the e-mail message that includes the routing map or a link to the routing map. The routing map is stored by the e-mail gateway server at a storage location identified by the link. The modified e-mail message is delivered or downloaded from the e-mail server to a user computer in real time. The sender Web site is parsed to identify sender domain information to be inserted into the banner. If offline, a product fetches and modifies the e-mail message using an API of the e-mail server.

Classes IPC  ?

  • H04L 51/10 - Informations multimédias
  • H04L 51/234 - Surveillance ou traitement des messages pour le suivi des messages
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

58.

Prevention of credential phishing based upon login behavior analysis

      
Numéro d'application 16692680
Numéro de brevet 11323476
Statut Délivré - en vigueur
Date de dépôt 2019-11-22
Date de la première publication 2022-05-03
Date d'octroi 2022-05-03
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

A system is implemented in browser plug-in software or in endpoint agent software on a user computer. The user accesses a Web site and fills in a login request form and submits it to the Web site. The system triggers a “forgot password” feature and detects a phishing Web site by determining that it does not send a reset link to a valid user e-mail address, or, the system detects a phishing Web site by determining that it does send a reset link to an invalid e-mail address. Or, the system detects a phishing Web site by determining that it sends a reset link to a user e-mail address from a domain different from the domain of a login request form. Or, the system fills in an incorrect account name or password in a login request form and detects a phishing Web site by determining that the Web site does not indicate that the incorrect user name or incorrect password are incorrect. Or, the system submits incorrect credentials and detects a phishing Web site by determining that the Web site does not implement any way to reset the account name or password.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/954 - Navigation, p. ex. en utilisant la navigation par catégories
  • G06F 11/32 - Surveillance du fonctionnement avec indication visuelle du fonctionnement de la machine

59.

System and method for detecting leakage of email addresses

      
Numéro d'application 16558622
Numéro de brevet 11316894
Statut Délivré - en vigueur
Date de dépôt 2019-09-03
Date de la première publication 2022-04-26
Date d'octroi 2022-04-26
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Shiga, Tomoyuki
  • Mase, Machika
  • Hasegawa, Hiroshi

Abrégé

A system for detecting leakage of email addresses generates an alias email address that will be used by a user to register with a web service. The alias email address is an alias for a primary email address of the user, and is paired with the web service. The web service is included in a whitelist upon confirmation from the web service that the alias email address has been registered with the web service. Emails that are addressed to the alias email address and from the web service are forwarded to the primary email address. Emails that are addressed to the alias email address but is not from the web service are detected to be suspicious.

Classes IPC  ?

  • H04L 51/42 - Aspects liés aux boîtes aux lettres, p. ex. synchronisation des boîtes aux lettres
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

60.

Automatic identification of critical network assets of a private computer network

      
Numéro d'application 15586602
Numéro de brevet 11308403
Statut Délivré - en vigueur
Date de dépôt 2017-05-04
Date de la première publication 2022-04-19
Date d'octroi 2022-04-19
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chou, Ping-I
  • Huang, Yen-Shuo

Abrégé

Critical network assets of a private computer are automatically identified by training a machine learning model with histograms of features obtained by aggregating data of log entries. The model is deployed in a private computer network and retrained using training data set of the private computer network. Data from log entries of a target network asset are aggregated, numerically transformed, and converted into features histograms. The features histograms are concatenated into a single file, which is provided to the machine learning model for prediction. The machine learning model outputs a prediction score that gives an indication of whether or not the target network asset is critical.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

61.

Systems and methods for detecting network attacks

      
Numéro d'application 17239324
Numéro de brevet 11310142
Statut Délivré - en vigueur
Date de dépôt 2021-04-23
Date de la première publication 2022-04-19
Date d'octroi 2022-04-19
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Boyce, Kevin G.
  • Tuttle, Troy W.

Abrégé

Network attacks are detected by a protocol engine that works in conjunction with one or more streaming protocol analyzers. The protocol engine receives network packets over a computer network and generates metadata of the network packets. The metadata are placed in a transport envelope, which is streamed over the computer network. The transport envelope is received over the computer network. After receiving the transport envelope over the computer network, the metadata are extracted from the transport envelope and provided to the one or more streaming protocol analyzers, which analyze the metadata to detect network attacks.

Classes IPC  ?

  • H04L 43/18 - Analyseurs de protocole
  • H04L 69/18 - Gestionnaires multi-protocoles, p. ex. dispositifs uniques capables de gérer plusieurs protocoles
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

62.

Methods and system for combating cyber threats using a related object sequence hash

      
Numéro d'application 16573357
Numéro de brevet 11296868
Statut Délivré - en vigueur
Date de dépôt 2019-09-17
Date de la première publication 2022-04-05
Date d'octroi 2022-04-05
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s) Maglalang, Ardin Christopher C.

Abrégé

A cyber threat intelligence of a cyber threat includes a threat chain that describes objects involved in the cyber threat and relationships between the objects. A related object hash of an object is calculated by calculating a hash of one or more objects that are linked to the object as indicated in the cyber threat intelligence. A related object sequence hash of the threat chain is generated by calculating a total of the related object hashes. The related object sequence hash of the threat chain is compared to a related object sequence hash of another threat chain to detect cyber threats.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

63.

Generation of file digests for detecting malicious executable files

      
Numéro d'application 16676649
Numéro de brevet 11270000
Statut Délivré - en vigueur
Date de dépôt 2019-11-07
Date de la première publication 2022-03-08
Date d'octroi 2022-03-08
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chiang, Chia-Ming
  • Hao, Po-Han
  • Wang, Kuo-Cheng

Abrégé

A cybersecurity server receives an executable file that has bytecode and metadata of the bytecode. Strings are extracted from the metadata, sorted, and merged into data streams. The data streams are merged to form a combined data stream. A digest of the combined data stream is calculated using a fuzzy hashing algorithm. The similarity of the digest to another digest is determined to detect whether or not the executable file is malware or a member of a malware family.

Classes IPC  ?

  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

64.

Systems and methods for distributed digital rights management with decentralized key management

      
Numéro d'application 16430827
Numéro de brevet 11258601
Statut Délivré - en vigueur
Date de dépôt 2019-06-04
Date de la première publication 2022-02-22
Date d'octroi 2022-02-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Wang, Tai-An
  • Chen, Liang-Chih
  • Yen, Ting-Yin
  • Chen, Yu-Shu

Abrégé

One embodiment disclosed relates to a system for digital data distribution with decentralized key management. The system utilizes a data provider, a data demander, cloud storage, a blockchain, and a smart contract registered with the blockchain. The data provider encrypts the digital data using a session key and puts the encrypted digital data to the cloud storage, which returns a URL for the stored digital data. In addition, the session key is itself encrypted using the public key of the data demander. The access data at the smart contract is updated with the encrypted session key and the URL. The data demander uses its own private key to decrypt the session key and then uses the session key to decrypt the digital data. Other embodiments and features are also disclosed.

Classes IPC  ?

65.

Computer network monitoring with event prediction

      
Numéro d'application 16515602
Numéro de brevet 11258825
Statut Délivré - en vigueur
Date de dépôt 2019-07-18
Date de la première publication 2022-02-22
Date d'octroi 2022-02-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yang, Chin-En
  • Tsao, Wen-Kwang
  • Wu, Yi-De
  • Chou, Yu-Hsuan
  • Yaneza, Jr., Jaime

Abrégé

A cybersecurity system includes sensors that detect and report computer security events. Collected reports of computer security events are formed into state sequences, which are used as training data to train and build a prediction model. A current computer security event is detected and used as an input to the prediction model, which provides a prediction of a next computer security event. A monitoring level of a cybersecurity sensor is adjusted in accordance with the predicted next computer security event.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 20/00 - Apprentissage automatique
  • G06N 5/04 - Modèles d’inférence ou de raisonnement

66.

Detection of forged e-mail messages at e-mail gateway

      
Numéro d'application 16597609
Numéro de brevet 11212245
Statut Délivré - en vigueur
Date de dépôt 2019-10-09
Date de la première publication 2021-12-28
Date d'octroi 2021-12-28
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Ding, Ritchied
  • Qu, Rocky
  • Yang, Robert

Abrégé

An e-mail message is sent from a public e-mail address via the e-mail account of a user and delivered to an e-mail gateway. The message is destined for the e-mail account of a recipient. The gateway determines that the public e-mail address is on a list of users desiring two-factor authentication. The gateway determines that the message contains an anomaly indicating fraud or possible forgery. The gateway sends a two-factor authentication message to a hidden e-mail account of the user. The user reviews the message and responds with a confirmation message either confirming that the message is legitimate or indicating that it is a forgery. If the message is legitimate the gateway allows the message to be delivered to the recipient; if not, the message remains in quarantine and is not delivered. The gateway exists at the user's corporation, the recipient's corporation or is hosted at a third-party cloud service.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 12/58 - Systèmes de commutation de messages
  • G06Q 10/10 - BureautiqueGestion du temps
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 40/30 - Analyse sémantique

67.

Evaluation of files for cyber threats using a machine learning model

      
Numéro d'application 16527575
Numéro de brevet 11182481
Statut Délivré - en vigueur
Date de dépôt 2019-07-31
Date de la première publication 2021-11-23
Date d'octroi 2021-11-23
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Oliver, Jonathan James
  • Chang, Chia-Yen
  • Tsao, Wen-Kwang
  • Hsu, Li-Hsin

Abrégé

A system for evaluating files for cyber threats includes a machine learning model and a locality sensitive hash (LSH) repository. When the machine learning model classifies a target file as normal, the system searches the LSH repository for a malicious locality sensitive hash that is similar to a target locality sensitive hash of the target file. When the machine learning model classifies the target file as malicious, the system checks if response actions are enabled for the target file. The system reevaluates files that have been declared as normal, and updates the LSH repository in the event of false negatives. The system disables response actions for files that have been reported as false positives.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/903 - Requêtes
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06N 20/00 - Apprentissage automatique

68.

Inspection of network traffic on accelerated platforms

      
Numéro d'application 16597135
Numéro de brevet 11184191
Statut Délivré - en vigueur
Date de dépôt 2019-10-09
Date de la première publication 2021-11-23
Date d'octroi 2021-11-23
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Indiradevi, Salim Sreenarayanapillai
  • Pan, Ryan

Abrégé

A network security device has a local area network (LAN) interface and a wide area network (WAN) interface, with a capability to route packets of a network connection along a fast path that bypasses a network stack of an operating system of the network security device. A packet of a network connection that is received at the LAN interface is routed to a virtual network interface. A packet inspector reads the packet from the virtual network interface, inspects the packet, and writes the packet back to the virtual network interface after inspection. The packet is routed from the virtual network interface to the WAN interface, and exits the WAN interface towards the destination network address of the packet. After inspecting one or more packets of the network connection, subsequently received packets of the network connection are routed along the fast path.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/46 - Interconnexion de réseaux

69.

Evaluation of files for cybersecurity threats using global and local file information

      
Numéro d'application 16448300
Numéro de brevet 11151250
Statut Délivré - en vigueur
Date de dépôt 2019-06-21
Date de la première publication 2021-10-19
Date d'octroi 2021-10-19
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chang, Chia-Yen
  • Tsao, Wen-Kwang

Abrégé

A global locality sensitive hash (LSH) database stores global locality sensitive hashes of files of different private computer networks. Each of the private computer networks has a corresponding local LSH database that stores local locality sensitive hashes of files of the private computer network. A target locality sensitive hash is generated for a target file of a private computer network. The global and local LSH databases are searched for a locality sensitive hash that is similar to the target locality sensitive hash. The target file is marked for further evaluation for malware or other cybersecurity threats when the target locality sensitive hash is not similar to any of the global and local locality sensitive hashes.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

70.

Systems and methods for data certificate notarization utilizing bridging from private blockchain to public blockchain

      
Numéro d'application 16384177
Numéro de brevet 11151276
Statut Délivré - en vigueur
Date de dépôt 2019-04-15
Date de la première publication 2021-10-19
Date d'octroi 2021-10-19
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Wang, Tai-An
  • Chen, Liang-Chih
  • Yen, Ting-Yin
  • Chen, Yu-Shu

Abrégé

One embodiment disclosed relates to a system for managing data for logistics, sourcing and/or production. The system includes: a private blockchain maintained by a first network of nodes; a trusted public blockchain maintained by a second network of nodes; a private agent system; and a bridge system connected to both the private blockchain and the public blockchain. The private agent system operates to extract blocks of metadata from the private blockchain and utilize a hash tree structure to generate a first root hash value from the blocks of metadata. The bridge system operates to verify the first root hash value and store the first root hash value as a notarized data certificate in the trusted public blockchain. Another embodiment disclosed relates to a method for data certificate notarization utilizing a bridging system from a private blockchain to a trusted public blockchain. Other embodiments and features are also disclosed.

Classes IPC  ?

  • G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/182 - Systèmes de fichiers distribués
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

71.

Replacement of e-mail attachment with URL

      
Numéro d'application 16265328
Numéro de brevet 11126722
Statut Délivré - en vigueur
Date de dépôt 2019-02-01
Date de la première publication 2021-09-21
Date d'octroi 2021-09-21
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Ding, Ritchied
  • Qu, Rocky
  • Li, Richard

Abrégé

An attachment to an e-mail message is replaced with a URL before that message is delivered to an end user, thus providing more time to perform a better scan at a cloud server computer. The attachment is removed from the e-mail message and sent to the cloud server computer for a dynamic scan and a static scan which will likely include updates better able to detect malicious software. The e-mail message with the URL is delivered to the end user and there is a delay before the end user reads the message or attempts to open the attachment. An artificial delay may be introduced at an e-mail gateway before the message is delivered to the end-user. If the attachment is benign then the end user is allowed to download it via the URL; if the attachment is malicious then the end user is only given a warning message.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
  • H04L 12/58 - Systèmes de commutation de messages

72.

Apparatus and method for cloud-based accelerated filtering and distributed available compute security processing

      
Numéro d'application 15954030
Numéro de brevet 11128646
Statut Délivré - en vigueur
Date de dépôt 2018-04-16
Date de la première publication 2021-09-21
Date d'octroi 2021-09-21
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Corbiere, Zachery
  • Lu, Wei

Abrégé

One embodiment of the presently-disclosed invention relates to an intrusion prevention system that includes a plurality of FPGA instances and a plurality of compute instances in a cloud network. The plurality of FPGA instances perform pre-processing that determines whether data packets received from the network gateway are associated with suspicious flows. The data packets associated with the suspicious flows are communicated from the plurality of FPGA instances to a plurality of compute instances in the cloud network. The plurality of compute instances perform post-processing that determines whether a suspicious flow is malicious. Other embodiments, aspects and features are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

73.

Systems and methods for detecting and responding to anomalous messaging and compromised accounts

      
Numéro d'application 16294248
Numéro de brevet 11128649
Statut Délivré - en vigueur
Date de dépôt 2019-03-06
Date de la première publication 2021-09-21
Date d'octroi 2021-09-21
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yeh, Che-Fu
  • Hsu, Cheng Hsin
  • Wu, Pei-Yin
  • Chen, Ming-Hung
  • Pu, Peng-Shih
  • Chen, Rung Chi

Abrégé

One embodiment disclosed relates to a system for detecting anomalous messaging, discovering compromised accounts, and generating responses to threatened attacks. The system utilizes API commands and log forwarding for interaction and communication between a messaging and account hunting platform, other hunting platforms, an action center, and a security operations center. Another embodiment relates to a method of, and system for, performing a complete root cause analysis. Another embodiment relates to a method of, and system for, anomaly discovery which may advantageously utilize reference data to correlate different anomalies for reporting as a single incident.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

74.

Intrusion prevention system with machine learning model for real-time inspection of network traffic

      
Numéro d'application 15490609
Numéro de brevet 11128664
Statut Délivré - en vigueur
Date de dépôt 2017-04-18
Date de la première publication 2021-09-21
Date d'octroi 2021-09-21
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Andersson, Jonathan
  • Hagen, Josiah
  • Niemczyk, Brandon

Abrégé

An intrusion prevention system includes a machine learning model for inspecting network traffic. The intrusion prevention system receives and scans the network traffic for data that match an anchor pattern. A data stream that follows the data that match the anchor pattern is extracted from the network traffic. Model features of the machine learning model are identified in the data stream. The intrusion prevention system classifies the network traffic based at least on model coefficients of the machine learning model that are identified in the data stream. The intrusion prevention system apples a network policy on the network traffic (e.g., block the network traffic) when the network traffic is classified as malicious.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06N 20/00 - Apprentissage automatique

75.

Secure video content transmission over a computer network

      
Numéro d'application 16294273
Numéro de brevet 11101995
Statut Délivré - en vigueur
Date de dépôt 2019-03-06
Date de la première publication 2021-08-24
Date d'octroi 2021-08-24
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Oliver, Jonathan James
  • Chang, Chia-Yen
  • Tsao, Wen-Kwang
  • Wu, Ping Huan
  • Maggi, Federico
  • Gogela, Jiri
  • Yarochkin, Fyodor

Abrégé

A computer network includes a camera node, a network access node, a verification node, and a display node. Video content recorded by a camera at the camera node is transmitted to the display node and to the verification node for verification. The video content is verified at the display node and at the verification node. Recording metadata of the video content is stored in a distributed ledger and retrieved by the display node to verify the video content. The verification node receives, from the network access node, verification data for verifying the video content.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/08 - Répartition de clés
  • H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
  • G06F 16/787 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p. ex. la localisation
  • G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
  • H04W 12/71 - Identité matérielle

76.

Generation of file digests for cybersecurity applications

      
Numéro d'application 16672924
Numéro de brevet 11068595
Statut Délivré - en vigueur
Date de dépôt 2019-11-04
Date de la première publication 2021-07-20
Date d'octroi 2021-07-20
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chiang, Chia-Ming
  • Hao, Po-Han
  • Wang, Kuo-Cheng

Abrégé

A cybersecurity server receives an executable file. The executable file is disassembled to generate assembly code of the executable file. High-entropy blocks and blocks of printable American Standard Code for Information Interchange (ASCII) characters are removed from the assembly code. Instructions of the assembly code are normalized, chunked, and merged into a data stream. The digest of the data stream is calculated using a fuzzy hashing algorithm. The similarity of the digest to a malicious digest is determined to evaluate the executable file for malware.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

77.

Detection of periodic transmissions for identifying malicious computers

      
Numéro d'application 16451332
Numéro de brevet 11063969
Statut Délivré - en vigueur
Date de dépôt 2019-06-25
Date de la première publication 2021-07-13
Date d'octroi 2021-07-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Luo, Shoufu
  • Andersson, Jonathan Edward
  • Hagen, Josiah Dede

Abrégé

In one embodiment, a network security device monitors network communications between a computer and another computer. A periodicity of transmissions made by one computer to the other computer is determined, with the periodicity being used to identify candidate time point pairs having intervals that match the periodicity. A graph is constructed with time points of the candidate time point pairs as nodes and with intervals of time point pairs as edges. A longest path that continuously links one time point to another time point on the graph is compared to a threshold length to verify that the transmissions are periodic, and are thus potentially indicative of malicious network communications.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage

78.

Application-aware routing in network address translation environments

      
Numéro d'application 16930646
Numéro de brevet 11064032
Statut Délivré - en vigueur
Date de dépôt 2020-07-16
Date de la première publication 2021-07-13
Date d'octroi 2021-07-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yang, Guangxiang
  • Ding, Zhichao
  • Zhong, Yun

Abrégé

A network device has a Local Area Network (LAN) port and several Wide Area Network (WAN) ports. The network device detects a computing device that is connected to the LAN port initiating establishment of a TCP connection. The network device creates a TCP socket that establishes the TCP connection with the computing device and inspects TCP packets on the TCP connection to identify a cloud application associated with the TCP packets. The network device creates another TCP socket that establishes a TCP connection to the identified cloud application by way of a WAN port that is designated to be an output port for the identified cloud application. A routing path is created between the LAN port and the designated WAN port. Subsequent TCP packets originated by the computing device for the identified cloud application are forwarded along the routing path.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

79.

Methods and apparatus for intrusion prevention using global and local feature extraction contexts

      
Numéro d'application 16898927
Numéro de brevet 11044265
Statut Délivré - en vigueur
Date de dépôt 2020-06-11
Date de la première publication 2021-06-22
Date d'octroi 2021-06-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hagen, Josiah Dede
  • Andersson, Jonathan Edward
  • Luo, Shoufu
  • Niemczyk, Brandon
  • Zsohar, Leslie
  • Botkin, Craig
  • Andriukaitis, Peter

Abrégé

In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 20/00 - Apprentissage automatique
  • G06N 5/04 - Modèles d’inférence ou de raisonnement

80.

On-demand scanning of e-mail attachments

      
Numéro d'application 16249555
Numéro de brevet 11038916
Statut Délivré - en vigueur
Date de dépôt 2019-01-16
Date de la première publication 2021-06-15
Date d'octroi 2021-06-15
Propriétaire TREND MICRO, INC. (Japon)
Inventeur(s)
  • Cao, Jing
  • Yuan, Quan
  • Liu, Bo

Abrégé

An attachment to an e-mail message received at an e-mail gateway is scanned by a scan server and then is converted into an HTML file. The HTML file includes preview data of the attachment (minus any macro scripts), the entire original data of the attachment, scan functionality enabling a user to send the attachment back to a scan server for a second scan, or extract functionality enabling a user to extract the original attachment data for saving or opening in an application. The recipient is able to open or save the attachment directly if he or she believes it comes from a trusted sender. If the attachment seems suspicious, the recipient previews the attachment first before performing a scan, opening the attachment or deleting it. The recipient performs a scan of the attachment by clicking a “scan” button to send the attachment to a backend server for a second scan where an updated virus pattern file may be available to detect any zero-day malware.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/58 - Systèmes de commutation de messages

81.

Cybersecurity for a smart home

      
Numéro d'application 16257633
Numéro de brevet 11038910
Statut Délivré - en vigueur
Date de dépôt 2019-01-25
Date de la première publication 2021-06-15
Date d'octroi 2021-06-15
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Cheng, Yi-Li
  • Chang, Yao-Tang
  • Pu, Peng-Shih
  • Yeh, Che-Fu
  • Hsu, Shih-Han
  • Lin, Tsung-Fu
  • Chen, Ming-Hung
  • Chang, Yu-Min

Abrégé

A smart home includes Internet of things (IOT) devices that are paired with an IOT gateway. A backend system is in communication with the IOT gateway to receive IOT operating data of the IOT devices. The backend system generates a machine learning model for an IOT device. The machine learning model is consulted with IOT operating data of the IOT device to detect anomalous operating behavior of the IOT device. The machine learning model is updated as more and newer IOT operating data of the IOT device are received by the backend system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

82.

Anti-phishing system and method using computer vision to match identifiable key information

      
Numéro d'application 15840378
Numéro de brevet 10999322
Statut Délivré - en vigueur
Date de dépôt 2017-12-13
Date de la première publication 2021-05-04
Date d'octroi 2021-05-04
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yuan, Quan
  • Cao, Jing
  • Liu, Bo

Abrégé

The presently-disclosed solution provides an innovative system and method to protect a computer user from a phishing attack. Computer vision is effectively applied to match identifiable key information in suspect content against a database of identifiable key information of legitimate content. In one embodiment, the presently-disclosed solution converts suspect content to a digital image format and searches a database of logos and/or banners to identify a matching logo/banner image. Once the matching logo/banner image is found, the legitimate domain(s) associated with the matching logo/banner image is (are) determined. In addition, the presently-disclosed solution extracts all the URLs (universal resource links) directly from the textual data of the suspect content and further extracts the suspect domain(s) from those URLs. The suspect domain(s) is (are) then compared against the legitimate domain(s) to detect whether the suspect content is phishing content or not. Other embodiments and features are also disclosed.

Classes IPC  ?

  • H04L 12/58 - Systèmes de commutation de messages
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 16/583 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
  • G06F 40/10 - Traitement de texte

83.

Protection of antivirus daemon in a computer

      
Numéro d'application 16422550
Numéro de brevet 10990673
Statut Délivré - en vigueur
Date de dépôt 2019-05-24
Date de la première publication 2021-04-27
Date d'octroi 2021-04-27
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Jiang, Chuan
  • Li, Xilin
  • Zhang, Yafei

Abrégé

A method protects a daemon in an operating system of a host computer. The operating system detects that there is an access of a plist file of a daemon by a process in the computer. If so, then it executes a callback function registered for the plist file. The callback function sends to a kernel extension a notification of the attempted access. The kernel extension returns a value to the operating system indicating that the access should be denied. The operating system denies access to the plist file of the daemon by the process. The extension may also notify an application which prompts the user for instruction. The kernel extension also protects itself by executing its exit function when a command is given to unload the extension, and the exit function determines whether or not the command is invoked by an authorized application, such as by checking a flag.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données

84.

Methods and apparatus for controlling internet access

      
Numéro d'application 16548287
Numéro de brevet 10951583
Statut Délivré - en vigueur
Date de dépôt 2019-08-22
Date de la première publication 2021-03-16
Date d'octroi 2021-03-16
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chandrasekhar, Bharath Kumar
  • Kodukula, Narasimham

Abrégé

Apparatus and methods for controlling access by a browser to one or more Internet servers are disclosed. Access control is performed by ascertaining an IP address of an internet server that the user is trying to access and performing lookup of the IP address in an IP address rating database. If the lookup reveals that the IP address to be suspicious and data received from the internet server is encrypted, block the access to the internet server. Alternatively, if the lookup reveals the IP address to be suspicious, block the access to the first internet server by the browser without first performing content analysis on the data from the internet server.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

85.

Classification of executable files using a digest of a call graph pattern

      
Numéro d'application 16747718
Numéro de brevet 11157620
Statut Délivré - en vigueur
Date de dépôt 2020-01-21
Date de la première publication 2021-03-04
Date d'octroi 2021-10-26
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Fang, Chia-Ching
  • Weng, Shih-Hao

Abrégé

A cybersecurity server receives an executable file to be classified. A call graph of the executable file is generated. Functions of the executable file are represented as vertices in the call graph, and a vertex value is generated for each vertex. The vertex values are arranged in traversal order of the call graph to generate a call graph pattern. A digest of the call graph pattern is calculated and compared to one or more malicious digests.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
  • G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

86.

Anomalous logon detector for protecting servers of a computer network

      
Numéro d'application 16196277
Numéro de brevet 10938846
Statut Délivré - en vigueur
Date de dépôt 2018-11-20
Date de la première publication 2021-03-02
Date d'octroi 2021-03-02
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hsiao, Chih-Hsun
  • Lin, Yin-Tzu
  • Lee, Yen-Ying

Abrégé

A server hosted by a server computer is protected against anomalous logons. A working time profile is generated from an access log that has a record of logons to the server. Counts of access events per time period (e.g., per hour) are parsed from the access log, and processed using statistical procedures to find candidate working hours. A working time range includes candidate working hours. An account logging on the server is detected. The logon by the account is deemed to be anomalous when the logon is at a time outside the candidate working hours.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

87.

System and methods for security inspection and protection of software containers at runtime

      
Numéro d'application 15871475
Numéro de brevet 10922386
Statut Délivré - en vigueur
Date de dépôt 2018-01-15
Date de la première publication 2021-02-16
Date d'octroi 2021-02-16
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Li, Ching-Yi
  • Yang, You-Hsin
  • Chuang, Nai-Yu

Abrégé

The present disclosure provides effective solutions to security inspection and monitoring of operations within security containers. The solutions overcome the challenges and difficulties caused by the isolation of the containers. One embodiment relates a computer-implemented method in which a security agent is migrated between one or more containers and the host machine by changing its namespace. Another embodiment relates to a computer-implemented method for user-mode object monitoring of one or more containers in which a security agent migrates serially to multiple containers while keeping user-mode object-monitoring handles for the containers. Thereafter, the security agent may migrate into the host machine and continue monitoring events within the containers using the user-mode object-monitoring handles. Another embodiment relates to a host machine which includes a master agent that communicates with multiple security agents holding user-mode object-monitoring handles for corresponding containers. Other embodiments and features are also disclosed.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

88.

Detection of abusive user accounts in social networks

      
Numéro d'application 16144678
Numéro de brevet 10848455
Statut Délivré - en vigueur
Date de dépôt 2018-09-27
Date de la première publication 2020-11-24
Date d'octroi 2020-11-24
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Rihn, Jennifer
  • Oliver, Jonathan James

Abrégé

Abusive user accounts in a social network are identified from social network data. The social network data are processed to compare postings of the user accounts to identify a group of abusive user accounts. User accounts in the group of abusive user accounts are identified based on posted message content, images included in the messages, and/or posting times. Abusive user accounts can be canceled, suspended, or rate-limited.

Classes IPC  ?

  • H04L 12/58 - Systèmes de commutation de messages

89.

Detection of business email compromise attacks

      
Numéro d'application 15961245
Numéro de brevet 10834127
Statut Délivré - en vigueur
Date de dépôt 2018-04-24
Date de la première publication 2020-11-10
Date d'octroi 2020-11-10
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Yeh, Che-Fu
  • Lien, I-Ting
  • Li, Ming-Lun
  • Chou, Shih-Yu
  • Teng, Po-Yuan
  • Tsui, Yuan Jiun
  • Hsu, Cheng-Hsin
  • Tsao, Wen-Kwang
  • Hsu, Shih-Han
  • Wu, Pei-Yin
  • Oliver, Jonathan James

Abrégé

An email attempting to perpetrate a business email compromise (BEC) attack is detected based on similarity of the email to a known BEC email and on similarity of the email to a user email that would have been sent by the purported sender of the email. Metadata of the email is extracted and input to a BEC machine learning model to find the known BEC email among BEC email samples. The extracted metadata are also input to a personal user machine learning model of the purported sender to generate the user email.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06Q 10/10 - BureautiqueGestion du temps
  • H04L 12/58 - Systèmes de commutation de messages
  • G06N 20/00 - Apprentissage automatique

90.

Methods and systems for inspecting encrypted network traffic

      
Numéro d'application 16009819
Numéro de brevet 10805320
Statut Délivré - en vigueur
Date de dépôt 2018-06-15
Date de la première publication 2020-10-13
Date d'octroi 2020-10-13
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Wang, Kelong
  • Sun, Jian
  • Wang, Zheng

Abrégé

Encrypted network traffic between a server device and an application program running on a client device is monitored by a network security device in an enterprise computer network. Metadata of the application program is sent to a cloud security system to generate a reputation of the application program. The encrypted network traffic is decrypted and inspected for conformance with security policies when the application program is determined to be a browser application. When the application program is determined to be a non-browser application, the reputation of the application program is determined and the encrypted network traffic is blocked when the application program has a bad reputation. In a bypass mode of operation, the encrypted network traffic is allowed to pass through without inspection when the application program is determined to be a non-browser application.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

91.

Virtualization of smartphone functions in a virtual reality application

      
Numéro d'application 16439454
Numéro de brevet 10771620
Statut Délivré - en vigueur
Date de dépôt 2019-06-12
Date de la première publication 2020-09-08
Date d'octroi 2020-09-08
Propriétaire TREND MICRO INC. (Japon)
Inventeur(s)
  • Li, Minmin
  • Chen, Gang
  • Zhao, Xiaoming

Abrégé

A mobile virtualization application allows a VR application user to access mobile telephone basic functions in a third-party VR application. This virtualization application may be a virtualization plugin or an independent application which virtualizes mobile functions and creates VR models. The virtualization plugin bridges between the VR application and the mobile telephone operating system allowing the user to use directly mobile telephone basic functions in the VR application. VR application users can read directly their incoming text messages, e-mail messages, application notifications, etc., in the form of VR model, and, they can use a VR application input device to control their mobile telephone basic functions in order to send messages, control a camera, etc.

Classes IPC  ?

92.

Dynamic evaluation of executable files in a lightweight executor

      
Numéro d'application 16009801
Numéro de brevet 10754951
Statut Délivré - en vigueur
Date de dépôt 2018-06-15
Date de la première publication 2020-08-25
Date d'octroi 2020-08-25
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Tang, Jie
  • Wu, Weimin
  • Yu, Kai
  • Zhang, Chengguo

Abrégé

Executable files are evaluated for malware in one or more lightweight executors, such as lightweight executor processes. An executable file is loaded and executed in a lightweight executor. Instructions in an execution path of the executable file are executed. Instructions in another execution path of the executable file are executed in another lightweight executor when a conditional branch instruction in an execution path has a suspicious condition. A fake kernel that mimics a real operating system kernel receives system calls, and responds to the system calls without servicing them in a way the real operating system kernel would. Runtime behavior of the executable file is observed for malware behavior. A response action, such as preventing the executable file from subsequently executing in a computer, is performed when the executable file is detected to be malware.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

93.

Automatic credential input to a user interface of a remote mobile app

      
Numéro d'application 16277615
Numéro de brevet 10809915
Statut Délivré - en vigueur
Date de dépôt 2019-02-15
Date de la première publication 2020-08-20
Date d'octroi 2020-10-20
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Fang, Xinxin
  • Sun, Junwen
  • Fang, Chengyu

Abrégé

A server computer runs several remote mobile operating systems. A remote mobile app running on one of the remote mobile operating systems generates a user interface that includes an input field for receiving a credential. The user interface is displayed on a touchscreen of a mobile device that is in communication with the server computer. A touchscreen keyboard with an autofill button is displayed on the touchscreen. When a user of the mobile device clicks on the autofill button, the credential of the user is retrieved and sent from the mobile device to the server computer, where the credential is entered into the input field.

Classes IPC  ?

  • G06F 3/0489 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant des touches de clavier dédiées ou leurs combinaisons
  • H04W 4/20 - Signalisation de servicesSignalisation de données auxiliaires, c.-à-d. transmission de données par un canal non destiné au trafic
  • H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
  • G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels
  • G06F 21/31 - Authentification de l’utilisateur
  • H04W 12/06 - Authentification
  • G06F 40/174 - Remplissage de formulairesFusion
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/41 - Authentification de l’utilisateur par une seule ouverture de session qui donne accès à plusieurs ordinateurs

94.

Metadata extraction

      
Numéro d'application 16861509
Numéro de brevet 10965600
Statut Délivré - en vigueur
Date de dépôt 2020-04-29
Date de la première publication 2020-08-13
Date d'octroi 2021-03-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Zsohar, Leslie
  • Lu, Wei
  • Mullin, Randal
  • Botkin, Craig

Abrégé

Examples of implementations relate to metadata extraction. For example, a system of privacy preservation comprises a physical processor that executes machine-readable instructions that cause the system to normalize a network traffic payload with a hardware-based normalization engine controlled by a microcode program; parse the normalized network traffic payload, as the network traffic payload passes through a network, by performing a parsing operation of a portion of the normalized network traffic payload with a hardware-based function engine of a plurality of parallel-distributed hardware-based function engines controlled by the microcode program; and provide the hardware-based function engine with a different portion of the normalized network traffic payload responsive to an indication, communicated through a common status interface, that the different portion of the normalized network traffic payload is needed to complete the parsing operation.

Classes IPC  ?

  • H04L 12/815 - Configuration
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/813 - Commande basée sur des règles, p.ex. en fonction de la politique d’utilisation
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

95.

Methods and apparatus for intrusion prevention using global and local feature extraction contexts

      
Numéro d'application 15949299
Numéro de brevet 10728268
Statut Délivré - en vigueur
Date de dépôt 2018-04-10
Date de la première publication 2020-07-28
Date d'octroi 2020-07-28
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hagen, Josiah Dede
  • Andersson, Jonathan Edward
  • Luo, Shoufu
  • Niemczyk, Brandon
  • Zsohar, Leslie
  • Botkin, Craig
  • Andriukaitis, Peter

Abrégé

In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

96.

Organizing and storing network communications

      
Numéro d'application 16793239
Numéro de brevet 10965560
Statut Délivré - en vigueur
Date de dépôt 2020-02-18
Date de la première publication 2020-06-11
Date d'octroi 2021-03-30
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Lu, Wei
  • Zsohar, Leslie
  • Wartha, Edward A.
  • Mullin, Randal
  • Botkin, Craig

Abrégé

Examples relate to organizing and storing network communications. In one example, a programmable hardware processor may: receive a first set of network packets; identify, for each network packet included in the first set, a network flow, each network flow including at least one related packet; store each network packet included in a subset of the first set in a first data storage device; for each network packet included in the subset, organize the network packet according to the network flow identified for the network packet; identify, from the network flows, a set of network flows that each have at least one characteristic of interest; and store, in a second data storage device, each network packet included in each network flow of the set of network flows.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

97.

Detection of targeted email attacks

      
Numéro d'application 14461688
Numéro de brevet 10666676
Statut Délivré - en vigueur
Date de dépôt 2014-08-18
Date de la première publication 2020-05-26
Date d'octroi 2020-05-26
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Hsu, Ching-Cheng
  • Hsu, Hsun-Jen
  • Lien, I-Ting
  • Lin, Cheng-Han
  • Lin, Ching-Ming
  • Wang, Yin-Liang
  • Wu, Cheng-Han

Abrégé

Targeted email attacks are detected using feature combinations of known abnormal emails, interflow shapes formed by an email with other emails, or both. An email received in an endpoint computer system is scanned to identify abnormal features indicative of a targeted email attack and the abnormal features of the email are checked against abnormal feature combinations. The email can also be scanned to identify an interflow shape formed by the email with other emails and the interflow shape is checked against interflow shapes of known targeted email attacks.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/58 - Systèmes de commutation de messages
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]

98.

Dynamic phishing detection methods and apparatus

      
Numéro d'application 16545995
Numéro de brevet 10951636
Statut Délivré - en vigueur
Date de dépôt 2019-08-20
Date de la première publication 2020-02-06
Date d'octroi 2021-03-16
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chang, Ming-Tai Allen
  • Tsai, Yu-Fang Eddie

Abrégé

A computer-implemented method for detecting a phishing attempt by a given website is provided. The method includes receiving a webpage from the given website, which includes computer-readable code for the webpage. The method also includes ascertaining hyperlink references in the computer-readable code. Each hyperlink reference refers to at least a component of another webpage. The method further includes performing linking relationship analysis on at least a subset of websites identified to be referenced by the hyperlink references, which includes determining whether a first website is in a bi-directional/uni-directional linking relationship with the given website. The first website is one of the subset of websites. The method yet also includes, if the first website is in the bi-directional linking relationship, designating the given website a non-phishing website. The method yet further includes, if the first website is in the uni-directional linking relationship, performing anti-phishing measures with respect to the given website.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

99.

Dynamic page similarity measurement

      
Numéro d'application 16548269
Numéro de brevet 11042630
Statut Délivré - en vigueur
Date de dépôt 2019-08-22
Date de la première publication 2020-02-06
Date d'octroi 2021-06-22
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chen, Chao-Yu
  • Pu, Peng-Shih
  • Tsai, Yu-Fang

Abrégé

A method for determining which web page among multiple candidate web pages is similar to a given web page. For each candidate web page, a set of scoring rules is provided to score the components therein. When the given web page is compared against a candidate web page, each component that is found in both the given web page and the candidate web page under examination is given a score in accordance with the set of scoring rules that is specific to that web page under examination. A composite similarity score is computed for each comparison between the given webpage and a candidate web page. If the composite similarity score exceeds a predefined threshold value for a comparison between the given webpage and a candidate web page, that candidate web page is deemed the web page that is similar.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 16/23 - Mise à jour
  • G06F 16/248 - Présentation des résultats de requêtes

100.

Semi-automatic rule generator

      
Numéro d'application 16545321
Numéro de brevet 11706253
Statut Délivré - en vigueur
Date de dépôt 2019-08-20
Date de la première publication 2020-01-30
Date d'octroi 2023-07-18
Propriétaire Trend Micro Incorporated (Japon)
Inventeur(s)
  • Chen, Chih-Sheng
  • Hung, Yi-Chan
  • Su, Shr-An

Abrégé

A computer-implemented method for generating a first set of longest common sequences from a plurality of known malicious webpages, the first set of longest common sequences representing input data from which a human generates a set of regular expressions for detecting phishing webpages. There is included obtaining HTML source strings from the plurality of known malicious webpages and transforming the HTML source strings to reduce the number of at least one of stop words and repeated tags, thereby obtaining a set of transformed source strings. There is further included performing string alignment on the set of transformed source strings, thereby obtaining at least a scoring matrix. There is additionally included obtaining a second set of longest common sequences responsive to the performing the string alignment. There is further included filtering the second set of longest common sequences, thereby obtaining the first set of longest common sequences.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 40/279 - Reconnaissance d’entités textuelles
  1     2     3     ...     6        Prochaine page