CrowdStrike, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 512 pour CrowdStrike, Inc. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 442
        Marque 70
Juridiction
        États-Unis 463
        International 31
        Canada 11
        Europe 7
Date
Nouveautés (dernières 4 semaines) 10
2026 janvier (MACJ) 4
2025 décembre 9
2025 novembre 5
2025 octobre 12
Voir plus
Classe IPC
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 95
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 75
H04L 9/40 - Protocoles réseaux de sécurité 72
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures 68
G06N 20/00 - Apprentissage automatique 41
Voir plus
Classe NICE
42 - Services scientifiques, technologiques et industriels, recherche et conception 62
09 - Appareils et instruments scientifiques et électriques 28
45 - Services juridiques; services de sécurité; services personnels pour individus 19
35 - Publicité; Affaires commerciales 14
41 - Éducation, divertissements, activités sportives et culturelles 10
Voir plus
Statut
En Instance 110
Enregistré / En vigueur 402
  1     2     3     ...     6        Prochaine page

1.

DETERMINING AND MITIGATING ARTIFICIAL INTELLIGENCE MODEL VULNERABILITIES

      
Numéro d'application 18758259
Statut En instance
Date de dépôt 2024-06-28
Date de la première publication 2026-01-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Miron, Calin
  • Radu, Marian
  • Korn, Arnd

Abrégé

The present disclosure provides techniques for determining and mitigating AI model vulnerabilities. A processing device generates, via a first AI model, a plurality of prompt variations based on an indication of a vulnerability. The processing device determines that a second AI model is vulnerable to the vulnerability based on at least one prompt variation in the plurality of prompt variations. The processing device generates a plurality of filter variations based on a plurality of filters and the at least one prompt variation. The processing device tests the plurality of filter variations and the at least one prompt variation on the second AI model. The processing device generates, based on the testing, a report indicative of an effectiveness of the plurality of filter variations in mitigating the vulnerability with respect to the second AI model.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

2.

Cross-Cluster Search Optimization

      
Numéro d'application 18754274
Statut En instance
Date de dépôt 2024-06-26
Date de la première publication 2026-01-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Daniel, Kenn
  • Rostermund, Mike

Abrégé

A preliminary tag search improves computer functioning by reducing cross-cluster searches. Today's cloud service providers maintain large, distributed datasets stored by multiple clusters having many nodes. Many cross-cluster searches generate no search results, but unsuccessful cross-cluster searches still consume much hardware resources, network bandwidth, and electrical energy. The preliminary tag search eliminates unfruitful cross-cluster searches. The preliminary tag search may identify only the cross-cluster searches that will generate positive search results. The preliminary tag search may identify wasteful cross-cluster searches that would generate no search results. Prior to conducting cross-cluster searches, a distributed database service may first perform the preliminary tag search that identifies successful/unsuccessful cross-cluster searches. The distributed database service may then decline or skip unsuccessful cross-cluster searches.

Classes IPC  ?

3.

PATCH COMPLEXITY CLASSIFICATION

      
Numéro d'application 18755268
Statut En instance
Date de dépôt 2024-06-26
Date de la première publication 2026-01-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Drew, Shaefer
  • Ristin, Boban
  • Ramos, Pablo
  • Brautbar, Michael
  • Mcdonald, Callum
  • Chang, Yong Nan

Abrégé

The present disclosure provides an approach of collecting vulnerability data corresponding to a vulnerability of a target product. The approach provides the vulnerability data to an artificial intelligence model that is trained to determine a complexity indicator from the vulnerability data. The complexity indicator corresponds to applying a vulnerability patch to remediate the vulnerability. The approach determines a patch complexity classification by providing the complexity indicator to the artificial intelligence model and, in turn, provides the patch complexity classification to a target system corresponding to the target product.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

4.

PROTECTED TRAINING OF PRIVATE ADAPTER MODELS FOR A HOSTED FOUNDATION MODEL

      
Numéro d'application 18759438
Statut En instance
Date de dépôt 2024-06-28
Date de la première publication 2026-01-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Radu, Marian
  • Sumedrea, Paul

Abrégé

Methods and systems are provided for training copies of a private adapter network at respective client computing devices; and aggregating of trained weight sets in a common parameter space as a weight set of a hosted foundation model at a cloud computing system. A private adapter model can be a subdivision of a hosted foundation model, segmented from some number of layers of a hosted foundation model or can be distinct from the hosted foundation model, given that the private adapter model configures a computing host to update a weight set in a common parameter space as a weight set of the hosted foundation model. By performing a protected update to a weight set, true values of the coefficients of the weight set derived from inputting features of a labeled dataset at a first layer of the private adapter model are obfuscated.

Classes IPC  ?

5.

Computing Fairness

      
Numéro d'application 18748178
Statut En instance
Date de dépôt 2024-06-20
Date de la première publication 2025-12-25
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Døssing, Stig Rohde

Abrégé

Estimated and actual processor runtimes improve computer functioning in fairly sharing computing resources. Today's computers and cloud-based services serve many users and many software applications sharing CPU resources. An operating system thus implements a scheduling policy that fairly allocates CPU time. A scheduler thread implements the scheduling policy based on estimated processor runtimes, and actual processor runtimes, associated with tasks. The operating system may maintain running tallies or totals for a user/group/organization based on credits (e.g., the estimated processor runtimes) and/or on penalties (e.g., the actual processor runtimes). The scheduler thread may select tasks for worker threads based on the credits and/or the penalties, thus ensuring that no user/group/organization unfairly consumes CPU time.

Classes IPC  ?

  • G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

6.

ENHANCED DATA PRUNING STRATEGY FOR MALWARE DETECTION MODELS

      
Numéro d'application 18753821
Statut En instance
Date de dépôt 2024-06-25
Date de la première publication 2025-12-25
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Flores Rodriguez, Hector
  • Angelescu, Laura
  • Yarbrough, Nick
  • Miron, Calin-Bogdan

Abrégé

Methods and systems for implementing enhanced data pruning strategy for malware detection models are described herein. According to an implementation, a computer device may distribute data associated with detected events into a plurality of storages. The computer device may sequentially perform one or more sampling operations to construct a dataset for malware detection model training. The computer device may first select a subset of the plurality of storages, each having a size equal to or less than a threshold, to be used for model training without pruning. The computer device may then select top-n most recent samples and top-n least confident samples from each of rest storages. Further, the computer device may perform Monte Carlo sampling enhanced with a power transformation on the rest storages to generate additional samples. The compute device may then generate the training dataset for the malware detection model training based on the sequentially sampling results.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

7.

CYBERSECURITY VULNERABILITY DETECTION WITH ARTIFICIAL INTELLIGENCE MODELS

      
Numéro d'application 18753724
Statut En instance
Date de dépôt 2024-06-25
Date de la première publication 2025-12-25
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Torres, Ian
  • Nazarian, Alexander
  • Korn, Arnd

Abrégé

The present disclosure provides techniques for red teaming with artificial intelligence (AI) models. A processing device generates, via a first AI model, an agent action space based on security data, where the agent action space is indicative of actions to perform to potentially compromise at least one of a computing system, a network, or an application. The processing device performs a reinforcement learning process with an agent based on the agent action space to obtain a log of the reinforcement learning process. The processing device generates, via a second AI model, a report based on the security data and at least a portion of the log, where the report is indicative of a security weakness of the at least one of the computing system, the network, or the application.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement

8.

REPRESENTATION-AGNOSTIC FILE CLASSIFIER

      
Numéro d'application 18900283
Statut En instance
Date de dépôt 2024-09-27
Date de la première publication 2025-12-18
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Störtz, Florian
  • Schwyzer, Felix
  • Radu, Marian

Abrégé

A method of monitoring an endpoint for malicious code includes deploying an artificial intelligence (AI) model to a endpoint protection system, the AI model trained on a plurality of executable code files in byte form, monitoring a target system for execution of a target executable file. The method further includes analyzing, by the AI model, the target executable file in the byte form of the target executable file and determining, based on an output of the AI model, a decision variable for the target executable file.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

9.

SEMI-SUPERVISED MALWARE CLASSIFICATION USING REPRESENTATION-AGNOSTIC TRANSFORMER MODELS

      
Numéro d'application 18900317
Statut En instance
Date de dépôt 2024-09-27
Date de la première publication 2025-12-18
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Störtz, Florian
  • Schwyzer, Felix
  • Radu, Marian
  • Gaman, Mihaela-Petruta

Abrégé

A method of monitoring an endpoint for malicious code includes obtaining a corpus of files collected by an endpoint protection system, selecting a subset of the corpus of files comprising labeled files, wherein the subset of the corpus is representative of the corpus of files, and training a first artificial intelligence (AI) model, using the subset of the corpus of files in byte form, to infer labels for unlabeled data. The method further includes applying the first AI model to unlabeled files of the corpus of files in byte form to generate labels for the unlabeled files, performing supervised training of a second AI model using the corpus of files and the labels generated for the unlabeled data, and deploying the second AI model to the endpoint protection system.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique

10.

Context-sensitive token-bucket rate limiting in eBPF

      
Numéro d'application 19049682
Numéro de brevet 12499215
Statut Délivré - en vigueur
Date de dépôt 2025-02-10
Date de la première publication 2025-12-16
Date d'octroi 2025-12-16
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Kelly, Martin

Abrégé

The present disclosure provides techniques for context-sensitive token-bucket rate limiting. A processing device obtains, in a kernel space of an operating system (OS), a message comprising a unique process identifier (UPID) and a message type. The processing device determines whether to send the message from the kernel space to a user space of the OS based on at least one of: the UPID, the message type, or a token count and a discrete time unit in an entry in a data structure in the kernel space. The processing device processes the message based on the determination of whether to send the message from the kernel space to the user space.

Classes IPC  ?

  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/60 - Protection de données

11.

Cybersecurity Command Line Assessment

      
Numéro d'application 18639506
Statut En instance
Date de dépôt 2024-04-18
Date de la première publication 2025-12-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Edwards, Paul Michael
  • Esfahani, Michael
  • Feener, Tyler David
  • Serebrennikov, Dmitry
  • Stein, Stefan
  • Wald, Arnaud Paul
  • Widen, Tanya Lena

Abrégé

A cloud-based, machine-learned cybersecurity command line interpretation service simplifies complex command lines using plain language. Command lines are input to the cybersecurity command line interpretation service for an interpretation by a machine learning model. If, however, a command line is known and been previously interpreted, then the cybersecurity command line interpretation service may conserve hardware and software resources by retrieving a historical command line interpretation. If the command line is unknown or not historically logged, then the cybersecurity command line interpretation service may generate a current command line interpretation using the machine learning model. The cybersecurity command line interpretation service may then generate a cybersecurity prediction associated with the command line based on the historical or current command line interpretation. The cybersecurity command line interpretation service thus provides a much faster interpretation and cybersecurity prediction for assessing command lines as malicious or benign.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

12.

Cloud-Based File Integrity Monitoring

      
Numéro d'application 18678089
Statut En instance
Date de dépôt 2024-05-30
Date de la première publication 2025-12-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Badragan, Silviu-Alexandru
  • Cotiga, Andrei-Viorel
  • Freund, Adam
  • Goresh, Samantha Alyn
  • Tinca, Ioan

Abrégé

A cloud-based file integrity monitoring service identifies content changes to a computer file. An endpoint cybersecurity agent monitors its host client device for read/write and other operating system events associated with the computer file. When the endpoint cybersecurity agent detects each operating system event, the endpoint cybersecurity agent captures and reports, in real time or near real time, a snapshot of the file content representing the computer file. So, as the host client device changes the computer file with each operating system event, the endpoint cybersecurity agent uploads timestamped snapshots of the file content to a cloud-based file integrity monitoring service. The cloud-based file integrity monitoring service stores each snapshot of the file content, thus logging a change history for the computer file. The cloud-based file integrity monitoring service may thus retrieve and analyze different snapshots at different points in time, thus quickly identifying the content changes to the computer file.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau

13.

AUTOMATED AI MODEL-BASED PIPELINE FOR DETECTION EXPLAINABILITY

      
Numéro d'application 18678899
Statut En instance
Date de dépôt 2024-05-30
Date de la première publication 2025-12-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Bolocan, Diana
  • Gaman, Mihaela-Petruta

Abrégé

The present disclosure provides techniques for AI model-based detection explainability. A processing device obtains computer-readable text and an indication of a false positive detection of malicious behavior with respect to the computer-readable text by a cybersecurity system, The processing device obtains, via an artificial intelligence (AI) model trained to generate language, a reason for the false positive detection of the malicious behavior. The processing device provides an indication of the reason for the false positive detection to a destination device.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

14.

CREATING COMPLEX HONEYNET ENVIRONMENTS WITH GENERATIVE ARTIFICIAL INTELLIGENCE

      
Numéro d'application 18673086
Statut En instance
Date de dépôt 2024-05-23
Date de la première publication 2025-11-27
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s)
  • Esfahani, Michael
  • Gastesi, Mikel
  • Hullmann, Alexander
  • Mugica, Mikel
  • Stein, Stefan
  • Wald, Arnaud
  • Widen, Tanya

Abrégé

Systems and methods for smart generation of content for a deceptive honeynet environment. The systems and methods generate a first prompt to an artificial intelligence (AI) model to generate a first output based on an initial input, receive the first output from the AI model, the first output comprising a first set of content, generate a second prompt to the AI model to generate a second output comprising a network configuration based on the first set of content and the initial input, receive the second output from the AI model, the second output comprising the network configuration, wherein the network configuration is consistent with the first set of content and the initial input, and store the first set of content and the network configuration.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

15.

SECURING FUNCTION AS A SERVICE CLOUD COMPUTING ENVIRONMENTS

      
Numéro d'application 19288833
Statut En instance
Date de dépôt 2025-08-01
Date de la première publication 2025-11-20
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Subhreveti, Dinesh
  • Kumar, Ramesh

Abrégé

A system and method of securing a Function as a Service (FaaS) cloud computing system without using access rights to operating system (OS) kernels of the cloud service system. The method includes receiving a request to invoke a user-function associated with a computing language. The method includes executing the user-function within an operating system that executes on a processing device of the cloud service system. The method includes monitoring, by the processing device, a real-time behavior of the user-function using a security sensor that executes within the operating system, wherein the security sensor is without access rights to a kernel of the operating system. The method includes acquiring behavioral data indicative of the real-time behavior of the user-function.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

16.

Fine-grained access to system commands run via an installed agent application

      
Numéro d'application 18975533
Numéro de brevet 12470565
Statut Délivré - en vigueur
Date de dépôt 2024-12-10
Date de la première publication 2025-11-11
Date d'octroi 2025-11-11
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Chafle, Suraj
  • Batzloff, Robert
  • Thompson, Emily
  • Federoff, Ashley

Abrégé

The present disclosure provides techniques for fine-grained access to system commands run via an installed agent application. A processing device receives, from an agent application, a user identifier and an indication of an agent application command with respect to a target endpoint, wherein the agent application command is included in a plurality of agent application commands assigned to a first user type that is different from a second user type corresponding to the user identifier. The processing device maps the agent application command to a permission level assigned to the agent application command. The processing device determines, based on the mapping, that the permission level is assigned to the user identifier. The processing device enables, based on the determination, the agent application to execute the agent application command with respect to the target endpoint.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

17.

AUTOMATIC RULE GENERATION FOR MALICIOUS INDICATORS BASED ON HISTORICAL DATA

      
Numéro d'application 18655597
Statut En instance
Date de dépôt 2024-05-06
Date de la première publication 2025-11-06
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Maganu, Mihai
  • Stoian, Andrei
  • Szocs, Ernest
  • Urian, Paul

Abrégé

Malicious indicators rule generation using historical data is provided. A method includes receiving, from threat detection engines of a plurality of vendor systems, a plurality of threat detection indications for a dataset. Each threat detection indication of the plurality of threat detection indications receives a vendor-specific tokenization based on historical data associated with the plurality of vendor systems. The method further includes identifying, from the plurality of threat detection indications, a lead detection from a first vendor system of the plurality of vendor systems and an accuracy detection from at least one second vendor system of the plurality of vendor systems. The lead detection and the accuracy detection have overlapping data from the dataset. The method further includes generating, by a processing device, a malicious behavior detection procedure based on the lead detection, the accuracy detection, and the vendor-specific tokenization being used to detect a malicious behavior in dataset.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

18.

FALCON SHIELD

      
Numéro de série 99479852
Statut En instance
Date de dépôt 2025-11-05
Propriétaire CrowdStrike, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates

19.

Machine Learned Contextual Cybersecurity Threat Prioritization

      
Numéro d'application 18649748
Statut En instance
Date de dépôt 2024-04-29
Date de la première publication 2025-10-30
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Brautbar, Michael Avraham
  • Kiraly, Daniel Constant
  • Petronaci, Michael

Abrégé

A cloud-based cybersecurity detection prioritization service prioritizes cybersecurity detections reported by endpoint client devices. The endpoint client devices report the cybersecurity detections to a cloud computing environment providing the cloud-based cybersecurity detection prioritization service. The endpoint client devices also report client machine contexts sampled from the endpoint client devices. The client machine contexts are compared to a cybersecurity machine contextual profile generated by a machine learning model trained using the client machine contexts sampled from the endpoint client devices. The cybersecurity detection prioritization service prioritizes the cybersecurity detections based on the cybersecurity machine contextual profile. The cloud-based cybersecurity detection prioritization service thus provides a quick ranking or categorization for queuing thousands of daily reports of viruses, hacks, and other cybersecurity detections. Prioritization allows for timely mitigations by humans of these alerts that minimize breaches.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

20.

Internet-Exposed Device Discovery

      
Numéro d'application 18650238
Statut En instance
Date de dépôt 2024-04-30
Date de la première publication 2025-10-30
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Glyer, Michael
  • Lichter, Yotam
  • Tal, Yaron

Abrégé

A cloud-based, external attack surface management (or EASM) service identifies computers, servers, smartphones, and other devices that are exposed to the public Internet. Any device that can connect to the public Internet may be vulnerable to cybersecurity attacks. The EASM service identifies a device exposed to the public Internet by comparing connection notifications to an address scan of the entire Internet. The connection notifications are sent by cybersecurity sensory agents installed at client devices. When a connection notification and the address scan of the entire Internet references a matching IP address and/or a matching port within a timeframe, the corresponding device is identified as being exposed to the public Internet.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/2517 - Traduction d'adresses de protocole Internet [IP] en utilisant des numéros de port
  • H04L 61/5076 - Mécanismes de mise à jour ou de notification, p. ex. DynDNS

21.

REAL-TIME STREAMING EVENT ENRICHMENT FOR SECURITY ENDPOINTS

      
Numéro d'application 18651379
Statut En instance
Date de dépôt 2024-04-30
Date de la première publication 2025-10-30
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Nash, Brent Ryan
  • Plush, James Robert
  • Rowen, Matthew

Abrégé

Hosts of a digital security system receive event data sent by sensors on endpoints that correspond with the hosts. The hosts locally maintain enrichment caches of information regarding the endpoints, and may update the enrichment caches based on information indicated by received event data. The hosts may also generate enriched event data, corresponding to received event data, by adding enrichment data indicated in the enrichment caches that was omitted from the event data sent by sensors.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat

22.

Scalable key value storage in a distributed storage system

      
Numéro d'application 18677777
Numéro de brevet 12450215
Statut Délivré - en vigueur
Date de dépôt 2024-05-29
Date de la première publication 2025-10-21
Date d'octroi 2025-10-21
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Nash, Brent Ryan
  • Berger, Timothy Jason
  • Berry, Sean
  • Chormale, Audumbar

Abrégé

Techniques for implementing a scalable key value storage in a distributed storage separate the storage of the collection of data objects from the storage of the index corresponding to the collection. According to an implementation, a database service may receive a request to create a collection of data objects in an object storage. A schema may be specified for the collection. The database service may generate a unique identifier (ID) corresponding to the collection and create the collection in the object storage. The objects in the collection and the associated schema may be further written to an object table and a schema table, respectively. The database service may further validate the schema and extract one or more indexable fields from the schema. The database service may send a request to a database search service to create an index for the collection in an index storage.

Classes IPC  ?

  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

23.

Multi-Instance Generic Operation Pipeline

      
Numéro d'application 18633740
Statut En instance
Date de dépôt 2024-04-12
Date de la première publication 2025-10-16
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Gonzalez, Raul
  • Wonder, Marielle Sorum Foster
  • Yehle, Tobin

Abrégé

An event detection service detects hardware and software events at endpoint devices. The event detection service deploys templates to agents in the field. Each template is created in the cloud to describe kernel-mode and user-mode events of interest. Each agent installs the templates without rebooting. Each agent monitors its host's event behaviors according to the templates. If the host's event behaviors satisfy the template, then the agent has a Multi-Instance Generic Operation pipeline that determines a template disposition specified by the template. The agent may thus dynamically detect event behaviors for a purpose, as specified by the template.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

24.

Machine-Learned Suspicious Query Detection

      
Numéro d'application 18630106
Statut En instance
Date de dépôt 2024-04-09
Date de la première publication 2025-10-09
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Agron, Dor
  • Brautbar, Michael Avraham
  • Drew, Shaefer
  • Kama, Avraham
  • Lavi, Asaf
  • Sheinfeld, Sagi
  • Zinar, Yaron

Abrégé

A cybersecurity detection prediction service pre-screens database queries reported by endpoint client devices. The endpoint client devices may report the database queries to a cloud computing environment providing the cybersecurity detection prediction service. The endpoint client devices, however, may locally assess the database queries. The database queries are compared to a cybersecurity assessment profile generated by a machine learning model trained using endpoint cybersecurity detections. The cybersecurity detection prediction service thus provides a much faster cybersecurity prediction.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

25.

eBPF GENERAL ALLOCATOR

      
Numéro d'application 18630667
Statut En instance
Date de dépôt 2024-04-09
Date de la première publication 2025-10-09
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s)
  • Deschamp, Justin
  • Kelly, Martin
  • Lim, Oscar
  • Vedovati, Marco

Abrégé

Systems and methods for an eBPF general allocator for an eBPF program is provided. The method includes receiving, by a first eBPF program, a first entry based on an atomic operation. The first entry is from a number of entries in a free list that indicates available space in a buffer. The available space is indexed by the number of entries in the free list. The method further includes identifying, based on the first entry, a pointer to the buffer. The pointer is associated with an allocation of the available space in the buffer based on the first entry. The allocation of the available space is to the first eBPF program. The method further includes executing, by a processing device, the first eBPF program with exclusive access to the allocation of the available space in the buffer during an execution instance of the first eBPF program.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

26.

INJECTED BYTE BUFFER DATA CLASSIFICATION

      
Numéro d'application 19017191
Statut En instance
Date de dépôt 2025-01-10
Date de la première publication 2025-10-09
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Stortz, Florian
  • Schwyzer, Felix
  • Radu, Marian

Abrégé

Methods and systems for injected byte buffer data classification are disclosed. According to an implementation, a security agent can detect process injection events, gather byte buffer data associated with the process injection events, and send the byte buffer data to a security service comprising a byte buffer classification function. The byte buffer classification function can be implemented as a trained transformer type neural network machine learning model, which can analyze the byte buffer data and generate a classification output comprising a probability that the byte buffer data is associated with a malicious process injection.

Classes IPC  ?

  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

27.

FALCON FLEX

      
Numéro de série 99432842
Statut En instance
Date de dépôt 2025-10-08
Propriétaire CrowdStrike, Inc. ()
Classes de Nice  ?
  • 45 - Services juridiques; services de sécurité; services personnels pour individus
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

licensing of software, namely, computer and network security software Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates

28.

CROWDSTRIKE FINANCIAL SERVICES

      
Numéro de série 99432848
Statut En instance
Date de dépôt 2025-10-08
Propriétaire CrowdStrike, Inc. ()
Classes de Nice  ? 36 - Services financiers, assurances et affaires immobilières

Produits et services

Financial services, namely, providing financing for purchasing cybersecurity software and services; financial services, namely, providing loans, lines of credit, and lease-purchase financing for cybersecurity technologies; financial management and consulting services related to budgeting, payment planning, and cash flow optimization for the acquisition of cybersecurity software and services; providing information and advisory services in the field of financing cybersecurity purchasing; financial transaction services, namely, providing secure commercial transactions and payment options for cybersecurity products and services

29.

System and Method for Timing-Based Network Entity Resolution

      
Numéro d'application 18622494
Statut En instance
Date de dépôt 2024-03-29
Date de la première publication 2025-10-02
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s) Brown, Daniel W.

Abrégé

A first request message is received from a first device that specifies a destination network address and identifier for a second device, and a first timestamp. A first acceptance message is received from the second device that specifies a destination network address and identifier for the first device, and a second timestamp. A second request message is received from the first device that specifies the destination network address and identifier for the second device, and a third timestamp. A second acceptance message is received from the second device that specifies the destination network address and identifier for the first device, and a fourth timestamp. The first device is determined to be communicating with the second device when the first and second timestamps indicate the first request and acceptance messages, and when the third and the fourth timestamps indicate the second request and acceptance messages, occurred at substantially the same time.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

30.

DATA LABELING USING A PREVALENCE-DRIVEN ARTIFICIAL INTELLIGENCE MODEL

      
Numéro d'application 18624424
Statut En instance
Date de dépôt 2024-04-02
Date de la première publication 2025-10-02
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Nechita, Mihai
  • Maganu, Mihai
  • Munteanu, Filip
  • Chipiristeanu, Daniel

Abrégé

The present disclosure provides an approach of receiving a hash corresponding to a sample file, and providing the hash to an artificial intelligence (AI) model. The AI model is trained to utilize prevalence data corresponding to the hash to predict whether the corresponding sample file includes malware. The approach produces, by a processing device using the AI model, a confidence level based on the hash. In turn, the approach associates a label to the sample file based on the confidence level to produce a labeled sample file.

Classes IPC  ?

31.

CROWDSTRIKE FALCON

      
Numéro d'application 1877592
Statut Enregistrée
Date de dépôt 2025-03-28
Date d'enregistrement 2025-03-28
Propriétaire CrowdStrike, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Downloadable computer software for computer and network security. Computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS)services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; application service provider [ASP], namely, hosting computer software applications of others in the field of knowledge management for creating searchable databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance and administration of digital keys and digital certificates via a global computer network. Monitoring of computer systems for security purposes.

32.

Double Subscription Service & Reactive Event Notification Loop

      
Numéro d'application 18593741
Statut En instance
Date de dépôt 2024-03-01
Date de la première publication 2025-09-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Avdal, Hazim
  • Markenzon, Aleksandr
  • Tarra, Samhitha
  • Truong, Victor East

Abrégé

A hierarchical subscription-publication service distributes an event notification. The event notification is associated with a database. The event notification is also associated to a graph having nodes and to a subgroup of the nodes. A first subscription service publishes the event notification to all subscribers associated with the database. A second or intermediary subscription service hierarchically nests within the outer subscription service and publishes the event notification to a subscriber subgroup of the subscribers associated with the subgroup of the nodes.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

33.

PRIVATE DATA SET INTERSECTION WITH MUTUAL DEVICE ANONYMITY

      
Numéro d'application 19213640
Statut En instance
Date de dépôt 2025-05-20
Date de la première publication 2025-09-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Servia Rodriguez, Sandra
  • Miron, Calin-Bogdan
  • Radu, Marian

Abrégé

A method for detecting a private set intersection includes receiving, at a third computing device, a first plurality of transformed data elements from a first computing device; receiving, at the third computing device, a second plurality of transformed data elements from a second computing device, wherein an identity of the first computing device is unknown to the second computing device and an identity of the second computing device is unknown to the first computing device; and transmitting, by a processing device executing on the third computing device to the first computing device and the second computing device, an indication of a subset of transformed data elements that are present in both the first plurality of transformed data elements and the second plurality of transformed data elements.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

34.

LOCALIZATION MIDDLEWARE

      
Numéro d'application 19079329
Statut En instance
Date de dépôt 2025-03-13
Date de la première publication 2025-09-04
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s) Jones-Muth, Vince

Abrégé

A system and method of a localization middleware. The method includes receiving a request for a particular dataset that is stored in a data store. The particular dataset includes a plurality of textual strings in a first format. The method includes selecting a first configuration file indicating that a first textual string of the plurality of textual strings should be localized and a second textual string of the plurality of textual strings should not be localized. The method includes generating, based on the first configuration file and a string replacement procedure, a localized dataset in a second format by replacing the first textual string of the plurality of textual strings with a previously translated string stored in a library of previously translated strings and abstaining from replacing the second textual string of the plurality of textual strings with another translated string.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur

35.

External Services in Distributed Databases

      
Numéro d'application 18586742
Statut En instance
Date de dépôt 2024-02-26
Date de la première publication 2025-08-28
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Cordes-Andersen, Kristian
  • Stisen, Allan

Abrégé

Computer nodes associated with a cluster store a distributed database. As the cluster provides a distributed database service, some or all of the nodes may interface with one or more external services. The external services may be specified by a service agreement, or the external services may be dynamically specified by a user/customer of the distributed database service. The external services may be available to any node of the cluster, or the external services may only be accessible to particular nodes and/or to particular cluster/service roles. In a mapreduce database framework, for example, the external services may be restricted to reducer/coordinator nodes. Whichever nodes are permitted, the nodes may use remote procedure calls to access external services.

Classes IPC  ?

  • G06F 16/2455 - Exécution des requêtes
  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet

36.

AUTOMATED VULNERABILITY REMEDIATION GUIDANCE BASED ON DETECTION LOGIC ELEMENTS

      
Numéro d'application 18588976
Statut En instance
Date de dépôt 2024-02-27
Date de la première publication 2025-08-28
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Lomte, Nitin Deepak
  • Chowdhury, Somnath
  • Kahan, Daniel

Abrégé

The present disclosure provides an approach of receiving a detection element that includes a vulnerability identifier and a version identifier. The vulnerability identifier corresponds to a vulnerability of an application and the version identifier corresponds to a version of the application effected by the vulnerability. The approach determines a remediation version identifier based on the vulnerability identifier and the version identifier. The remediation version identifier corresponds to a remediation version of the application that remediates the vulnerability. The approach then initiates an update at a client system based on the vulnerability identifier and the remediation version identifier.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

37.

AI model based cybersecurity detection prioritization for cybersecurity management systems

      
Numéro d'application 18929233
Numéro de brevet 12401679
Statut Délivré - en vigueur
Date de dépôt 2024-10-28
Date de la première publication 2025-08-26
Date d'octroi 2025-08-26
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Nandan, Manu
  • Brautbar, Michael

Abrégé

The present disclosure provides an approach of collecting historical cybersecurity detection data comprising a plurality of cybersecurity detections and a plurality of detection times. The approach transforms the historical cybersecurity detection data into a plurality of rank ordered detection datasets that rank order each one of the plurality of cybersecurity detections based on the plurality of detection times. In turn, the approach trains an artificial intelligence (AI) model using the plurality of rank ordered detection datasets to generate a prioritized output dataset from an input dataset.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

38.

Asynchronous Blocking of Exfiltration Events via Browser Extensions

      
Numéro d'application 18582051
Statut En instance
Date de dépôt 2024-02-20
Date de la première publication 2025-08-21
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Nedelcu, Radu Mihai

Abrégé

A cybersecurity data loss prevention service stops users from stealing, or exfiltrating, sensitive data. An endpoint cybersecurity agent coordinates the installation of a browser extension. The browser extension adds content scripts to a web browser that monitor for exfiltration events. The exfiltration events represent a user's browser inputs (such as cut-n-paste or drag-n-drop) that can be used to exfiltrate usernames, passwords, credit card numbers, company secrets, and any other sensitive data. When the browser extension detects any exfiltration event, the browser extension intercepts and synchronously blocks the exfiltration event from the web browser. Moreover, the browser extension sends a duplicate copy of the exfiltration event to the cybersecurity agent for evaluation. If the cybersecurity agent determines that the user's browser inputs should have been allowed, then the browser extension is instructed to trigger the duplicate copy. The web browser thus asynchronously processes the user's browser inputs, albeit slightly delayed.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes

39.

Entropy-based preemptive false positive mitigation

      
Numéro d'application 18812897
Numéro de brevet 12386965
Statut Délivré - en vigueur
Date de dépôt 2024-08-22
Date de la première publication 2025-08-12
Date d'octroi 2025-08-12
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Slawinski, Michael

Abrégé

The present disclosure provides an approach of computing a plurality of feature attribution vectors from a plurality of samples. The approach determines a plurality of low entropy distribution samples from the plurality of samples based on the plurality of feature attribution vectors, and determines a feature value distribution corresponding to the plurality of low entropy distribution samples. Then, the approach identifies a false positive candidate sample based on the feature value distribution and, in turn, constructs a mitigation rule, based on the false positive candidate sample, to mitigate a future false positive sample.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 18/21 - Conception ou mise en place de systèmes ou de techniquesExtraction de caractéristiques dans l'espace des caractéristiquesSéparation aveugle de sources
  • G06N 20/00 - Apprentissage automatique

40.

SYSTEM AND METHOD FOR UTILIZING AND REMOVING A NON-PERSISTENT COLLECTOR IN A COMPUTE ENVIRONMENT

      
Numéro d'application 19183571
Statut En instance
Date de dépôt 2025-04-18
Date de la première publication 2025-08-07
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Mamo, Eyal
  • Sidis, Amir
  • Ivanir, Omri

Abrégé

The present disclosure describes an approach that schedules a collector application, comprising executable code, to collect data from a workload. The approach executes the executable code to perform an operation to collect data from the workload. In turn, the approach removes the collector application from the workload in response to completion of the operation by the collector application.

Classes IPC  ?

41.

USING ARTIFICIAL INTELLIGENCE MODELS WITH INTERMEDIATE REPRESENTATIONS TO ANALYZE MALICIOUS FILES

      
Numéro d'application 18423139
Statut En instance
Date de dépôt 2024-01-25
Date de la première publication 2025-07-31
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Southgate, Andrew
  • Sumedrea, Paul

Abrégé

The present disclosure provides an approach of analyzing multiple modalities of a file to produce multiple analysis tokens. Each one of the analysis tokens corresponds to a respective modality of the file. The approach provides the multiple analysis tokens to an artificial intelligence model, which is trained to produce an intermediate representation vector based on the plurality of analysis tokens. In turn the approach uses the artificial intelligence model to produce, based on the intermediate representation vector, a classification that indicates whether the file corresponds to a cybersecurity threat.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 8/41 - Compilation

42.

Data prefiltering for large scale data classification

      
Numéro d'application 18818342
Numéro de brevet 12367424
Statut Délivré - en vigueur
Date de dépôt 2024-08-28
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Gdula, Olga
  • Schwyzer, Felix
  • Miron, Calin-Bogdan

Abrégé

Data prefiltering techniques for large scale data classification are disclosed herein. According to an implementation, a machine learning (ML) model can be trained to classify data elements. The ML model can be applied to a first data volume, resulting in determinations of data elements that belong in a relevant classification. The determined data elements can then be used to configure a prefilter. The prefilter can be applied to a second data volume to identify filtered data elements of types that are similar to the determined data elements. The filtered data elements can be provided to the ML model for classification.

Classes IPC  ?

43.

Operational Prediction on User-Based Contextual Sessions

      
Numéro d'application 18410149
Statut En instance
Date de dépôt 2024-01-11
Date de la première publication 2025-07-17
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Brautbar, Michael Avraham
  • Inghilterra, Ryan
  • Li, Xiaoning
  • Kapoor, Aditya
  • Uprety, Aashma

Abrégé

Contextual session-based operational prediction greatly improves computer functioning. As a cloud service is provided, a current contextual session is generated using multiple events provided by the cloud service. The current contextual session is compared to a contextual session profile. The contextual session profile represents historical contextual sessions that have been historically logged in associated with the cloud service. If the current contextual session conforms to the contextual session profile, then the cloud service is normally operating as historically observed and may be predicted as normal operation. If, however, the current contextual session fails to conform to the contextual session profile, then the cloud service is not operating as historically observed and may be predicted as abnormal operation. Alerts and warning may be generated to notify of abnormal cloud service operation. The contextual session-based operational prediction produces a faster and more accurate detection of the abnormal operation.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

44.

Semantic data determination using a large language model

      
Numéro d'application 18586318
Numéro de brevet 12360962
Statut Délivré - en vigueur
Date de dépôt 2024-02-23
Date de la première publication 2025-07-15
Date d'octroi 2025-07-15
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Korn, Arnd
  • Toraman, Erdem
  • Milicic, Nikola
  • Puj, Ritesh

Abrégé

Techniques for automatically determining metadata for fields of a data string, byte slice, or byte array using a semantic data model framework (SDMF) and a large language model (LLM) are discussed herein. The LLM can provide field descriptions to the SDMF which outputs additional or finer field descriptions. The techniques can include determining descriptions for fields of a non-standardized data string from a third-party or other entity thereby enabling analysis of third-party data strings for a potential security threat. The techniques can reduce an amount of time to identify missing metadata caused by lack of standardization of field names and evolving data feeds (e.g., third-parties).

Classes IPC  ?

  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/21 - Conception, administration ou maintenance des bases de données
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

45.

Protective Distributed Database Service

      
Numéro d'application 18407562
Statut En instance
Date de dépôt 2024-01-09
Date de la première publication 2025-07-10
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Bakkegaard, Nick
  • Cordes-Anersen, Kristian
  • Killmann, Rasmus Scheel
  • Mechlenborg, Peter
  • Nissen, Anders Hauge

Abrégé

Computer nodes associated with a cluster store a distributed database. The computer nodes are polled to retrieve their individual nodal query states. A coordinator node then merges the individual nodal query states to determine an overall query state associated with the distributed database. The coordinator node, though, has a memory capacity that can be overcome by some nodal query states. The coordinator node thus imposes a data size limit on the nodal query states to prevent memory failures. The coordinator node specifies the data size limit during any polling cycle, and the coordinator node receives compliant nodal query states that satisfy the data size limit. The coordinator node may adjust or revise the data size limit for subsequent polling cycles, based on a count of the nodal query states yet to be retrieved. The data size limit thus ensures that the memory capacity is not overcome during any polling cycle.

Classes IPC  ?

  • G06F 16/2453 - Optimisation des requêtes
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées

46.

USING LARGE LANGUAGE MODELS TO GENERATE NATURAL LANGUAGE DESCRIPTIONS OF CODE FOR ENHANCED THREAT ANALYSIS AND MALWARE DETECTION

      
Numéro d'application 18399390
Statut En instance
Date de dépôt 2023-12-28
Date de la première publication 2025-07-03
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Monea, Damian
  • Cocea, Stefan-Bogdan
  • Gaman, Mihaela-Petruta

Abrégé

A system and method of using generative AI to generate natural language descriptions of code for enhanced threat analysis and malware detection. The method includes determining that a file comprises source code for causing malicious activity. The method includes generating, by a processing device and using one or more large language models (LLMs), natural language (NL) descriptions of the source code responsive to determining whether the file comprises the source code to cause the malicious activity. The method includes providing the NL descriptions of the source code to a classification model trained to generate a first set of maliciousness scores each indicating whether source codes are associated with one or more types of malicious activity. The method includes generating, using the classification model, a maliciousness score for the source code indicating that the source code is associated with the one or more types of malicious activity.

Classes IPC  ?

  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source

47.

LARGE LANGUAGE MODEL-BASED SOFTWARE REVERSE ENGINEERING ASSISTANT

      
Numéro d'application 18395939
Statut En instance
Date de dépôt 2023-12-26
Date de la première publication 2025-06-26
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Schwyzer, Felix
  • Kapoor, Aditya
  • Miron, Calin-Bogdan
  • Radu, Marian

Abrégé

Systems and methods of utilizing a large language model (LLM) to reverse engineer software is provided. The method includes obtaining sample assembly language from coded information or data. The sample assembly language is input to a machine learning (ML) model trained to recognize when the sample assembly language includes malicious code. The method further includes identifying, from the sample assembly language, a functionality implemented by the sample assembly language, where the functionality is indicative of whether the sample assembly language includes the malicious code. The method further includes generating, by a processing device, a natural language indication of the functionality implemented by the sample assembly language. The natural language indication is an output of the ML model.

Classes IPC  ?

  • G06F 8/74 - Ingénierie inverseExtraction d’informations sur la conception à partir du code source

48.

BEHAVIOR-BASED ASSET CLASSIFICATIONS

      
Numéro d'application 18545761
Statut En instance
Date de dépôt 2023-12-19
Date de la première publication 2025-06-19
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Inghilterra, Ryan
  • Drew, Shaefer
  • Brautbar, Michael

Abrégé

Techniques, systems, and computer-readable media for dynamic behavior-based asset classification are described herein. An asset classification system can detect and receive data associated with a host computer, determine, based on the data, a behavior associated with the host computer, assign the host computer a server classification based on the determination that the behavior represents a behavior of focus, and record the assigned server classification associated with the host computer. In various examples, the asset classification system can determine the behavior is a behavior of focus based on one or more of: a number of connections to other computers associated with a shared customer identifier, a number of unique other host computers connecting to the host computer, and/or a number of unique non-local accounts that have logged in to the host computer, and that the host computer has had an inbound connection on a common port.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

49.

Rules generation to prioritize computer network devices

      
Numéro d'application 18647422
Numéro de brevet 12335300
Statut Délivré - en vigueur
Date de dépôt 2024-04-26
Date de la première publication 2025-06-17
Date d'octroi 2025-06-17
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Nandan, Manu
  • Brautbar, Michael
  • Holla, Hariprasad
  • Kennedy, Stephen

Abrégé

The present disclosure provides an approach of generating a target feature vector based on information corresponding to a target entity. The target entity utilizes a target system that includes a target asset. The approach matches the target feature vector to a compatible entity cluster from a plurality of entity clusters. The compatible entity cluster corresponds to a current entity system. The approach generates a target asset prioritization rule based on prioritization information of the current entity system. In turn, the approach prompts the target system to assign a prioritization label to the target asset based on the target asset prioritization rule.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

50.

Probabilistic event linking

      
Numéro d'application 18963186
Numéro de brevet 12328325
Statut Délivré - en vigueur
Date de dépôt 2024-11-27
Date de la première publication 2025-06-10
Date d'octroi 2025-06-10
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Mukasa, Sseziwa
  • Brown, Daniel

Abrégé

A method of monitoring a network for linked events includes receiving an indication of an occurrence of a first event in a computing environment, calculating a first estimated rate of occurrence of the first event based on a first cache associated with the first event, and identifying an occurrence of a second event within a threshold amount of time prior to the occurrence of the first event. The method further includes calculating a second estimated rate of occurrence of the second event based on a second cache associated with the second event and determining, based on the first estimated rate of occurrence of the first event and the second estimated rate of occurrence of the second event, whether the occurrence of the first event and the occurrence of the second event have a common cause.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

51.

RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNING

      
Numéro d'application 18521834
Statut En instance
Date de dépôt 2023-11-28
Date de la première publication 2025-05-29
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Molony, Robert
  • Brautbar, Michael
  • Nandan, Manu
  • O'Brien, Ciaran

Abrégé

Techniques for calculating risk scores of entity assignments are discussed herein. The system generates a probability matrix using a collaborative filtering technique such as singular value decomposition. The probability matrix is populated with probability values for each entity representing a probability that, based on the various relationships or associations of that entity with other entities, the entity has been granted an assignment. Risk values are used to provide a weighting value to assignments, separating relatively higher risk assignments from relatively lower risk assignments. The system thereafter calculates a risk score for one or more of the entities using the information in the assignment matrix, the probability matrix, and the risk values. The system can flag or identity one or more entities whose risk scores do not meet various criteria.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

52.

Risk scoring of cloud permission assignments using supervised machine learning

      
Numéro d'application 18903573
Numéro de brevet 12316667
Statut Délivré - en vigueur
Date de dépôt 2024-10-01
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Molony, Robert
  • Brautbar, Michael
  • Nandan, Manu
  • O'Brien, Ciaran

Abrégé

Techniques for calculating risk scores of entity assignments are discussed herein. The system generates a probability matrix using a collaborative filtering technique such as singular value decomposition. The probability matrix is populated with probability values for each entity representing a probability that, based on the various relationships or associations of that entity with other entities, the entity has been granted an assignment. Risk values are used to provide a weighting value to assignments, separating relatively higher risk assignments from relatively lower risk assignments. The system thereafter calculates a risk score for one or more of the entities using the information in the assignment matrix, the probability matrix, and the risk values. The system can flag or identity one or more entities whose risk scores do not meet various criteria.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

53.

RISK SCORING USING SUPERVISED MACHINE LEARNING

      
Numéro d'application 18516593
Statut En instance
Date de dépôt 2023-11-21
Date de la première publication 2025-05-22
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Balles, Christopher
  • Arb, Kellen
  • Cosmadelis, Michael
  • Corlin, Sean
  • Fintel, Jeremy

Abrégé

Techniques for using supervised machine learning to train risk models used to analyze group data for security risks are discussed herein. A system can receive a user input identifying risk values associated with categories or attributes of a group having access to computing resources. The system can use the risk model to generate a risk score for the group. The risk score can be used to further analyze aspects of the group or provide recommendations to reduce or eliminate security risks.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

54.

Conditional bloom filters representing field aliasing

      
Numéro d'application 18764519
Numéro de brevet 12306843
Statut Délivré - en vigueur
Date de dépôt 2024-07-05
Date de la première publication 2025-05-20
Date d'octroi 2025-05-20
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Von Der Ahé, Peter
  • Nielsen, Mikkel Milo Tromborg
  • Sørensen, Erik Søe

Abrégé

Conditional Bloom filters improve computer functioning when membership testing different data sets. Today's cloud service providers maintain large, distributed datasets often incorporating or absorbing data having different labels and schemes. Nearly all cloud service providers, for example, utilize one or more different log vendors/providers that use different data conventions. The conditional Bloom filters resolve these vendor differences using field aliasing that relates vendor-specific field names to their corresponding common or alias field names. Each vendor's unique dataset may be mapped or normalized to a common scheme, thus ensuring that membership testing using the conditional Bloom filters retains precision and improves computer functioning in the presence of aliases.

Classes IPC  ?

  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 16/242 - Formulation des requêtes
  • G06F 16/2455 - Exécution des requêtes

55.

DEFAULT-DENY NETWORK EGRESS ARCHITECTURE IN A VIRTUAL PRIVATE CLOUD

      
Numéro d'application 18509940
Statut En instance
Date de dépôt 2023-11-15
Date de la première publication 2025-05-15
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Fintel, Jeremy
  • Fernandez, Belmin
  • Hodges, Brian

Abrégé

Methods and systems for designing a default-deny network egress control architecture in a virtual private cloud (VPC) environment are described herein. According to an implementation, the system may create a first subnet in a private computer network to perform egress control. The system implements a private network address translation (NAT) gateway, a network access control list (NACL), and a private elastic network interface (ENI) in the first subnet. The first subnet may be referred to a “blackhole subnet” or a “terminating subnet.” Upon receiving a traffic destined to a public computer network, e.g., Internet, the private NAT gateway may determine whether the traffic is authorized to egress based on the NACL. The private NAT gateway forwards the traffic to the private ENI to discard the traffic if the traffic is not authorized to egress and logs the information associated with the traffic.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

56.

Directory service recommender assessment and scoring

      
Numéro d'application 18922798
Numéro de brevet 12294580
Statut Délivré - en vigueur
Date de dépôt 2024-10-22
Date de la première publication 2025-05-06
Date d'octroi 2025-05-06
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Bishop, Brenden Thomas
  • Brautbar, Michael Avraham

Abrégé

A cybersecurity service assesses, scores, and/or prioritizes activities associated with a directory service. When the directory service is requested to change a directory service assignment, the directory service may first request a verdict from the cybersecurity service. The cybersecurity service may use profiling and/or machine learning to predict directory service assignments. The cybersecurity service may then score and prioritize requests to change/update directory service assignments. Small deviations from predicted directory service assignments, for example, may indicate harmless/normal directory service activity. Larger deviations, though, may indicate abnormal directory service activity. Larger deviations may even indicate malicious directory service activity, such as permission escalation and cyberbreaches. Scoring and prioritization allows for resource allocation and timely mitigations by human experts.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

57.

Method and Apparatus for Data Synchronization and Persistence Between Computing Devices

      
Numéro d'application 18383791
Statut En instance
Date de dépôt 2023-10-25
Date de la première publication 2025-05-01
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s) Schofield, James Michael

Abrégé

A computing system includes a first computing device that executes an object-oriented software application which maintain objects, for example, in a heap data structure, in memory. The object-oriented software application includes an API to convert between objects in the memory and data in a relational database and transmit requests to perform one or more operations involving the data in the relational database corresponding to the objects in the memory. A decorator layer in communication with the API identifies the objects in the memory corresponding to the transmitted requests to perform one or more operations involving the data in the relational database. A local object storage API transfers copies of the identified objects to a local data store. A persistence API, in communication with the decorator layer and the object storage API, synchronizes the copied objects in the local data store with the data involved in the requests to perform the one or more operations with the relational database.

Classes IPC  ?

  • G06F 9/54 - Communication interprogramme
  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet

58.

Monitoring File System Operations using eBPF DFA Architecture

      
Numéro d'application 18495646
Statut En instance
Date de dépôt 2023-10-26
Date de la première publication 2025-05-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Deschamp, Justin John Kevin

Abrégé

A deterministic finite automata (DFA) is used by an extended Berkley packet filter (or “eBPF”) to monitor file system operations and non-file system operations. The DFA is stored as an eBPF map. Before a kernel of an operating system executes any file system operation, the kernel runs an eBPF program that queries the DFA for a filename associated with the system operation. The DFA represents safe/suspicious filenames associated with computer files. If the filename matches the DFA, then the kernel notifies a cybersecurity agent. The cybersecurity agent may then block or allow the file system operation, depending on whether the filename is safe or suspicious. The DFA stored in the extended BPF thus greatly improves computer functioning by very quickly and simply identifying safe/suspicious operations.

Classes IPC  ?

  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données

59.

Secure code clustering through LLM-based semantic analysis

      
Numéro d'application 18496722
Numéro de brevet 12461742
Statut Délivré - en vigueur
Date de dépôt 2023-10-27
Date de la première publication 2025-05-01
Date d'octroi 2025-11-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Monea, Damian
  • Sumedrea, Paul
  • Gaman, Mihaela-Petruta
  • Dinu, Alexandru

Abrégé

An approach is provided that provides a plurality of source code samples to an artificial intelligence model (AIM) trained to describe source code based on performing semantic analysis on the source code. The approach produces, using the AIM, a plurality of semantic descriptions that describe the plurality of source code samples. Then, the approach converts the plurality of semantic descriptions into a plurality of semantic embeddings. In turn, the approach creates a plurality of clusters from the plurality of semantic embeddings, wherein each one of the plurality of clusters corresponds to two or more of the plurality of source code samples.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 8/40 - Transformation de programme
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes
  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 16/2457 - Traitement des requêtes avec adaptation aux besoins de l’utilisateur
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 40/30 - Analyse sémantique
  • G06N 20/00 - Apprentissage automatique

60.

Cybersecurity Typing and Inferencing

      
Numéro d'application 18499270
Statut En instance
Date de dépôt 2023-11-01
Date de la première publication 2025-05-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Salumu, Providence

Abrégé

A cybersecurity event validation service provides a user-friendly scheme for detecting a cyberattack or threat. The cybersecurity event validation service accepts very simple, high-level, user-friendly descriptions of the cyberattack or threat. A user of the cybersecurity event validation service thus need not input detailed hardware/software events that specify the potential cyberattack or threat. The cybersecurity event validation service, instead, validates the user's very simple descriptions for correctness. If the user's very simple descriptions conform to basic rules or requirements, then the cybersecurity event validation service elegantly fills in the deep hardware and software details using context and inferences. The cybersecurity event validation service thus elaborates and enhances the user's very simple descriptions by supplying specific hardware/software details needed to detect the cyberattack or threat. The user thus need not be versed in the intricate programming/configurational details for defining the cyberattack or threat.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

61.

ADAPTERS FOR RUNTIME APPLICATION SELF-PROTECTION

      
Numéro d'application 18494509
Statut En instance
Date de dépôt 2023-10-25
Date de la première publication 2025-05-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Sumedrea, Paul
  • Popa, Cristian Viorel
  • Corlatescu, Dragos
  • Sava, Vasile-Daniel

Abrégé

An approach is provided that trains an artificial intelligence model (AIM) using training data to produce a generalized AIM, wherein the training data comprises log-collected data corresponding to multiple application types and the generalized AIM is trained to detect one or more cross-platform cybersecurity threats. The approach identifies multiple application-specific training data sets, wherein each one of the application-specific training data sets includes labeled application logs corresponding to one of the multiple application types. The approach then fine-tunes the generalized AIM using the multiple application-specific training data sets to produce multiple dedicated AIMs, wherein each one of the dedicated AIMs is trained to detect one or more application-centric cybersecurity threats targeted at a corresponding one of the application types.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

62.

SECURE CODE ANALYSIS COPILOT

      
Numéro d'application 18495626
Statut En instance
Date de dépôt 2023-10-26
Date de la première publication 2025-05-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Sumedrea, Paul
  • Popa, Cristian Viorel
  • Sava, Vasile-Daniel

Abrégé

An approach is provided that identifies a vulnerability corresponding to an initial source code. Then, the approach generates a prompt comprising the initial source code and the vulnerability. The approach inputs the prompt into an artificial intelligence model (AIM) that is trained to determine whether the initial source code comprises the vulnerability. In turn, the approach removes, using the AIM, the vulnerability from the initial source code to produce a refactored source code in response to determining that the initial source code comprises the vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 8/72 - Refonte de code
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

63.

STABLE AND DISCERNABLE MAPPING OF CATEGORICAL DATA TO COLORS FOR GRAPHICAL DISPLAY

      
Numéro d'application 18374571
Statut En instance
Date de dépôt 2023-09-28
Date de la première publication 2025-04-03
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s) Skovsbøll, Søren

Abrégé

Data is received. Each datum therein has one of a plurality of categorical values associated with a categorical variable. Each datum is deterministically mapped to a respective one of a plurality of colors in a color space based on its categorical value. The color to which each datum is deterministically mapped is then transformed to yield a minimum threshold separation between the respective colors. A graphical representation comprising the color to which each datum is respectively deterministically mapped, and as transformed to yield the minimum threshold separation between the respective colors, is displayed.

Classes IPC  ?

  • G06T 11/00 - Génération d'images bidimensionnelles [2D]

64.

Localization middleware

      
Numéro d'application 18592104
Numéro de brevet 12265836
Statut Délivré - en vigueur
Date de dépôt 2024-02-29
Date de la première publication 2025-04-01
Date d'octroi 2025-04-01
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Jones-Muth, Vince

Abrégé

A system and method of a localization middleware for localizing datasets using textual replacement techniques. The method includes receiving a request for a particular dataset that is stored in a data store, the particular dataset includes a plurality of textual strings in a non-regional version. The method includes determining a regional version for the particular dataset based on the request. The method includes identifying a library of translations associated with the non-regional version and the regional version. The method includes performing, by a processing device based on the library of translations and the particular dataset, a string replacement procedure to generate a localized dataset including one or more textual strings in the regional version.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur

65.

CROWDSTRIKE FALCON

      
Numéro d'application 242657400
Statut En instance
Date de dépôt 2025-03-28
Propriétaire CrowdStrike, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Downloadable computer software for computer and network security. (1) Computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS)services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; application service provider [ASP], namely, hosting computer software applications of others in the field of knowledge management for creating searchable databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance and administration of digital keys and digital certificates via a global computer network. (2) Monitoring of computer systems for security purposes.

66.

Source Code Similarity

      
Numéro d'application 18464095
Statut En instance
Date de dépôt 2023-09-08
Date de la première publication 2025-03-13
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Brautbar, Michael Avraham
  • Nandan, Manu

Abrégé

Automated source code similarity greatly improves computer functioning. Any source code file is evaluated with respect to publicly-available open source code. If the source code file is similar to the publicly-available open source code, then a computer system may be approved or authorized to perform any hardware/software operations associated with the source code file. Should, however, the source code file be dissimilar to the publicly-available open source code, then the hardware/software operations are blocked to prevent disclosure of the source code file. For example, read/write/input/output operations are blocked and/or network interfaces are disabled. Source code similarity thus thwarts suspicious activities that indicate misappropriation or exfiltration of the source code file.

Classes IPC  ?

67.

Nodal redundancy storage decisions

      
Numéro d'application 18460785
Numéro de brevet 12361017
Statut Délivré - en vigueur
Date de dépôt 2023-09-05
Date de la première publication 2025-03-06
Date d'octroi 2025-07-15
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Døssing, Stig Rohde
  • Daniel, Kenn

Abrégé

Nodal redundancy storage decisions efficiently distribute redundant copies of electronic data. A cloud computing network establishes a policy that governs how and where the redundant copies are stored within the cloud computing network (such as by region, zone, and cluster targets). Each cloud computing node is then delegated, with autonomy, to manage a redundant copy to achieve the policy established by the cloud computing network. Each cloud computing node may independently and individually decide to store, to not store, or to evict the redundant copy without consensus of other nodes and without consultation or instruction from the cloud computing network. The nodal redundancy storage decisions are thus decentralized from region, zone, and cluster management.

Classes IPC  ?

  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques

68.

STATIC ANALYZER INSTRUCTION GENERATION BASED ON ACTION OF EXTERNAL INITIALIZATION CODE DURING INITIALIZATION

      
Numéro d'application 18952611
Statut En instance
Date de dépôt 2024-11-19
Date de la première publication 2025-03-06
Propriétaire CROWDSTRIKE, INC. (USA)
Inventeur(s)
  • Sidis, Amir
  • Mano, Saar
  • Mamo, Eyal

Abrégé

The present disclosure provides an approach that receives an application code including an external initialization code component. The approach emulates the external initialization code component in a simulated local computing environment. The approach records, by a processing circuitry, an action by the external initialization code component to the application code during code initialization. In turn, the approach generates, based on the action, a set of instructions for a static analyzer to perform static analysis on the application code.

Classes IPC  ?

  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie

69.

Embedding Entity Matching

      
Numéro d'application 18460886
Statut En instance
Date de dépôt 2023-09-05
Date de la première publication 2025-03-06
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Bishop, Brenden Thomas
  • Boubezari, Amine
  • Brautbar, Michael Avraham

Abrégé

Embedding entity matching greatly improves computer functioning. Different datasets are matched to a common entity using entity embeddings generated by a machine learning entity embedding model. The entity embeddings are converted to entity similarities, thus revealing the datasets associated with the common entity. Efficient matrix operations further improve computer functioning. Embedding entity matching thus quickly identifies common employee records and user accounts using less hardware resources, less electricity, and less time.

Classes IPC  ?

  • G06F 18/22 - Critères d'appariement, p. ex. mesures de proximité
  • G06F 7/08 - Tri, c.-à-d. rangement des supports d'enregistrement dans un ordre de succession numérique ou autre, selon la classification d'au moins certaines informations portées sur les supports

70.

Nodal Work Assignments in Cloud Computing

      
Numéro d'application 18948668
Statut En instance
Date de dépôt 2024-11-15
Date de la première publication 2025-02-27
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Døssing, Stig Rohde

Abrégé

Nodal work assignments efficiently distribute server work items, such as storing redundant copies of electronic data. A cloud computing network establishes a policy that governs how and where the redundant copies are stored cloud computing nodes (such as by region, zone, and cluster targets). The cloud computing network repeatedly or continuously re-evaluates the work assignments based on replication assignment skews and/or leadership penalties. The nodal work assignments thus minimize hardware and software operations, network traffic, and electrical energy consumption.

Classes IPC  ?

  • H04L 67/1031 - Commande du fonctionnement des serveurs par un répartiteur de charge, p. ex. en ajoutant ou en supprimant de serveurs qui servent des requêtes
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

71.

Injected byte buffer data classification

      
Numéro d'application 18628172
Numéro de brevet 12223036
Statut Délivré - en vigueur
Date de dépôt 2024-04-05
Date de la première publication 2025-02-11
Date d'octroi 2025-02-11
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Stortz, Florian
  • Schwyzer, Felix
  • Radu, Marian

Abrégé

Methods and systems for injected byte buffer data classification are disclosed. According to an implementation, a security agent can detect process injection events, gather byte buffer data associated with the process injection events, and send the byte buffer data to a security service comprising a byte buffer classification function. The byte buffer classification function can be implemented as a trained transformer type neural network machine learning model, which can analyze the byte buffer data and generate a classification output comprising a probability that the byte buffer data is associated with a malicious process injection.

Classes IPC  ?

  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

72.

Cybersecurity detection

      
Numéro d'application 18363607
Numéro de brevet 12388848
Statut Délivré - en vigueur
Date de dépôt 2023-08-01
Date de la première publication 2025-02-06
Date d'octroi 2025-08-12
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Dalcher, Gregory William
  • Zaytsev, Vitaly

Abrégé

A cybersecurity service protects endpoint devices from cybersecurity attacks. The cybersecurity service deploys cybersecurity attack feature vectors to agents in the field. The cybersecurity attack feature vectors are created in the cloud to efficiently describe observed groups of cybersecurity attacks. One method to assemble these is to generate clustering centroids for the observed groups. Each agent monitors its host according to the cybersecurity attack feature vectors. Each agent monitors its host's event behaviors and locally extracts an event behavior feature vector. The agent compares the cybersecurity attack feature vectors to the event behavior feature vector and, if similarity is determined, then the agent determines that the host's event behaviors are evidence of a cybersecurity attack. The agent may implement threat procedures, such as suspending/terminating the event behaviors and generating alerts. The agent remains a small, lightweight cybersecurity detector that does not need constant Internet access.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 9/40 - Protocoles réseaux de sécurité

73.

TECHNIQUES FOR ASSESSING MALWARE CLASSIFICATION

      
Numéro d'application 18358720
Statut En instance
Date de dépôt 2023-07-25
Date de la première publication 2025-01-30
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Korn, Arnd
  • Miron, Calin-Bogdan
  • Radu, Marian

Abrégé

A sample file that is associated with malware and a first modification model of a plurality of modification models to alter the sample file are selected. The first modification model generates a modification configuration based on the sample file. The modification configuration identifies a modification to be performed on the sample file. The sample file and the modification configuration are provided to a modification engine to generate a modified sample file. The modification configuration is adjusted based on the first modification model in response to receiving a classification from a classification model that identifies the modified sample file as being free of malware.

Classes IPC  ?

74.

Techniques for delegated inter-party private set intersection

      
Numéro d'application 18358728
Numéro de brevet 12326849
Statut Délivré - en vigueur
Date de dépôt 2023-07-25
Date de la première publication 2025-01-30
Date d'octroi 2025-06-10
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Servia Rodriguez, Sandra
  • Miron, Calin-Bogdan
  • Radu, Marian

Abrégé

A method for detecting a private set intersection includes receiving a first plurality of transformed data elements from a first computing device, the first plurality of transformed data elements representing a transform by a pseudorandom function of a first plurality of data elements; receiving a second plurality of transformed data elements from a second computing device, the second plurality of transformed data elements representing a transform by the pseudorandom function of a second plurality of data elements; and transmitting, by a processing device to the first computing device and the second computing device, an indication of a subset of transformed data elements that are present in both the first plurality of transformed data elements and the second plurality of transformed data elements.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

75.

Counter Adversary Large Language Models

      
Numéro d'application 18397820
Statut En instance
Date de dépôt 2023-12-27
Date de la première publication 2025-01-30
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Southgate, Andrew
  • Sumedrea, Paul
  • Sava, Vasile-Daniel

Abrégé

A system and method of using generative AI to maintain conversations with attacking devices to discover their adversary techniques and tactics. The method includes receiving an initial message originating from an attacking device and directed to a target device. The method includes generating, using one or more classification models, a maliciousness score for the initial message indicating that the initial message is associated with one or more types of malicious activity. The method includes providing, by a processing device, the initial message to a predictive model trained to maintain conversations with attacking devices by predicting responses to malicious messages. The method includes generating, using the predictive model, two or more responses based on the initial message and at least one subsequent message, wherein each response of the two or more responses causes the attacking device to send a respective subsequent message to the predictive model.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

76.

Assessing Computer System Vulnerabilities and Exposures

      
Numéro d'application 18225336
Statut En instance
Date de dépôt 2023-07-24
Date de la première publication 2025-01-30
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s)
  • Stiller, Timothy
  • Stoy, Brandon

Abrégé

Assessing computer system vulnerabilities and exposures by periodically querying data sources to gather information pertaining to computing system vulnerabilities and exposures (CVEs), such as, for each CVE, an identification of the CVE, a number of corresponding references to the CVE, and a number of code repositories that can be used to exploit the CVE. Compiling a datastore of the information. Periodically querying the datastore about the information and generating one or more views of a lifecycle of each CVE in response thereto.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

77.

Threat classification in a streaming system

      
Numéro d'application 18829996
Numéro de brevet 12261890
Statut Délivré - en vigueur
Date de dépôt 2024-09-10
Date de la première publication 2025-01-30
Date d'octroi 2025-03-25
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Sundriyal, Pranav
  • Sherwood, William
  • Cotiga, Andrei
  • Freund, Adam

Abrégé

Techniques for identifying data usable for generating security recommendations are discussed herein. A system can determine unique identifiers for events associated with a data stream and determine a frequency of different events occurring in the data stream. The system can generate recommendation data usable for defending the data stream from future malicious events based on a number of similar events occurring over a time period.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

78.

Threat classification in a streaming system

      
Numéro d'application 18227257
Numéro de brevet 12462023
Statut Délivré - en vigueur
Date de dépôt 2023-07-27
Date de la première publication 2025-01-30
Date d'octroi 2025-11-04
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Cotiga, Andrei

Abrégé

Techniques for identify data usable for generating security recommendations are discussed herein. A system can determine unique identifiers for events associated with a data stream, and determine a frequency of different events occurring in the data stream. The system can generate recommendation data usable for defending the data stream from future malicious events based on a number of similar events occurring over a time period.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

79.

LARGE LANGUAGE MODEL ASSISTED CYBERSECURITY PLATFORM

      
Numéro d'application 18425973
Statut En instance
Date de dépôt 2024-01-29
Date de la première publication 2025-01-30
Propriétaire Crowdstrike, Inc. (USA)
Inventeur(s)
  • Chihaia, Theo
  • Radu, Daniel
  • Cojocaru, Adrian-Cosmin

Abrégé

A system and method of using generative AI to convert NL queries to database commands for accessing one or more databases. The method includes receiving a natural language (NL) request for information associated with a private network. The method includes providing the NL request to an artificial intelligence (AI) model trained to identify, from a plurality of access objects associated with a plurality of databases and a plurality of event types, a particular access object that provides access to one or more event datasets associated with the NL request. The method includes generating, by a processing device and using the AI model, a database request associated with the particular access object based on the NL request.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/2452 - Traduction des requêtes

80.

Adversarial script generation using artificial intelligence models

      
Numéro d'application 18622167
Numéro de brevet 12204644
Statut Délivré - en vigueur
Date de dépôt 2024-03-29
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Cocea, Stefan-Bogdan
  • Monea, Damian
  • Dinu, Alexandru
  • Popa, Cristian Viorel
  • Gaman, Mihaela-Petruta

Abrégé

The present disclosure provides an approach of providing, to an artificial intelligence (AI) model, a malicious script that includes a malicious behavior. The AI model is configured to modify software code of the malicious script to produce modified software code that obfuscates the malicious behavior. The approach produces, by a processing device using the AI model, an adversarial script that includes the modified software code that obfuscates the malicious behavior. In turn, the approach initiates a malware detector to test the adversarial script.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 8/30 - Création ou génération de code source
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

81.

USING LARGE LANGUAGE MODELS TO RECOMMEND AND VALIDATE ASSET AND/OR CLOUD CONFIGURATIONS

      
Numéro d'application 18405749
Statut En instance
Date de dépôt 2024-01-05
Date de la première publication 2025-01-16
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Sumedrea, Paul
  • Monea, Damian

Abrégé

A system and method of using generative AI to recommend and validate asset and/or cloud configurations. The method includes acquiring a set of parameters associated with one or more network entities of a computing network. The method includes providing the set of parameters to a configuration model trained to generate, based on semantic matching, recommended configurations for network entities and validated configurations for the network entities. The method includes generating, by a processing device using the configuration model, one or more recommended configurations for the one or more network entities based on the set of parameters.

Classes IPC  ?

  • H04L 41/084 - Configuration en utilisant des informations préexistantes, p. ex. en utilisant des gabarits ou en copiant à partir d’autres éléments
  • G06F 40/20 - Analyse du langage naturel

82.

SMART NOTIFICATION FOR STRUCTURED AND UNSTRUCTURED DATA

      
Numéro d'application 18545202
Statut En instance
Date de dépôt 2023-12-19
Date de la première publication 2025-01-16
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Corlatescu, Dragos
  • Belibov, Dan
  • Radu, Daniel
  • Kurtz, George Robert
  • Sentonas, Michael
  • Radu, Marian

Abrégé

Systems and methods for providing cybersecurity notifications based on structured and unstructured data. The systems and methods receive a natural language query from a client device and processes, by an artificial intelligence model, the natural language query to identify elements of cybersecurity intelligence to monitor. The systems and methods further monitor cybersecurity intelligence for a match to the identified elements from the natural language query and provide a notification to the client device in response to the matching of the identified elements to one or more items of cybersecurity intelligence.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 3/0455 - Réseaux auto-encodeursRéseaux encodeurs-décodeurs

83.

THREAT EXPOSURE MANAGEMENT SYSTEM USING LARGE LANGUAGE MODELS

      
Numéro d'application 18523581
Statut En instance
Date de dépôt 2023-11-29
Date de la première publication 2025-01-16
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Sumedrea, Paul
  • Monea, Damian

Abrégé

A system and method of using generative AI to identify exposures of computing devices on computing networks to actual and/or potential threats. The method includes collecting a plurality of responses from a plurality of devices to a target device on a private network. The method includes providing the plurality of responses to a classification model trained to assign device descriptions for device responses based on semantic matching of the device responses to database data. The method includes assigning, by the processing device using the classification model, a plurality of device descriptions for the plurality of responses to the target device, each response is respectively associated with one or more device descriptions of the plurality of device descriptions. The method includes generating, based on the plurality of device descriptions, a status report comprising a list of network addresses associated with a group of devices having access to the target device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

84.

CROWDSTRIKE

      
Numéro d'application 1833395
Statut Enregistrée
Date de dépôt 2024-11-26
Date d'enregistrement 2024-11-26
Propriétaire CrowdStrike, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer security consulting; consulting in the field of information technology; computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates.

85.

HYBRID SENSITIVE DATA SCRUBBING USING PATTERNS AND LARGE LANGUAGE MODELS

      
Numéro d'application 18375112
Statut En instance
Date de dépôt 2023-09-29
Date de la première publication 2025-01-02
Propriétaire CROWDSTRIKE, INC. (USA)
Inventeur(s)
  • Sumedrea, Paul
  • Popa, Cristian Viorel
  • Cocea, Stefan-Bogdan
  • Gaman, Mihaela-Petruta

Abrégé

A system and method of scrubbing sensitive data from records using patterns and large language models (LLM). The method includes receiving a request to process a record comprising data including sensitive data. The method includes identifying, based on one or more regex rules, a first set of scrubbing candidates associated with the record. The method includes identifying, by a processing device and based on a large language model (LLM), a second set of scrubbing candidates associated with the record. The method includes generating, based on the first set of scrubbing candidates and the second set of scrubbing candidates, a scrubbed record by scrubbing the record to remove the sensitive data.

Classes IPC  ?

  • G06F 21/60 - Protection de données
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
  • G06N 20/00 - Apprentissage automatique

86.

TECHNIQUES FOR UTILIZING EMBEDDINGS TO MONITOR PROCESS TREES

      
Numéro d'application 18216833
Statut En instance
Date de dépôt 2023-06-30
Date de la première publication 2025-01-02
Propriétaire CROWDSTRIKE, INC. (USA)
Inventeur(s)
  • Sava, Vasile-Daniel
  • Sumedrea, Paul
  • Popa, Cristian Viorel

Abrégé

A process tree embedding is generated corresponding to a process tree. The process tree comprises a plurality of processes. The process tree embedding is processed with a machine learning model to generate an identification of malware associated with the process tree. In some embodiments, processing the process tree embedding with the machine learning model to generate the identification of malware associated with the process tree includes: processing the process tree embedding with the machine learning model to generate a classification of the process tree as being associated with malware; and, responsive to the classification indicating that the process tree is associated with malware, generating the identification of a first process of the plurality of processes that is relevant to the classification of the process tree as being associated with malware.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

87.

Machine Learned Malicious Predictions

      
Numéro d'application 18343697
Statut En instance
Date de dépôt 2023-06-28
Date de la première publication 2025-01-02
Propriétaire CROWDSTRIKE, INC. (USA)
Inventeur(s)
  • Fraser, Joshua
  • Faulhaber, Joseph Leo

Abrégé

A cloud-based cyber security detection prediction service pre-screens cyber security detections reported by endpoint client devices. The endpoint client devices report the cyber security detections to a cloud-computing environment providing the cloud-based cyber security detection prediction service. The cyber security detections are compared to a cyber security assessment profile generated by a machine learning model trained using human expert cyber security assessments. The human expert cyber security assessments were applied by human cyber security subject matter experts scrutinizing historical detection data. The cloud-based cyber security detection prediction service thus provides a much faster cyber security prediction based on human expertise.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

88.

Nodal work assignments in cloud computing

      
Numéro d'application 18358994
Numéro de brevet 12184723
Statut Délivré - en vigueur
Date de dépôt 2023-07-26
Date de la première publication 2024-12-31
Date d'octroi 2024-12-31
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Døssing, Stig Rohde

Abrégé

Nodal work assignments efficiently distribute server work items, such as storing redundant copies of electronic data. A cloud computing network establishes a policy that governs how and where the redundant copies are stored cloud computing nodes (such as by region, zone, and cluster targets). The cloud computing network repeatedly or continuously re-evaluates the work assignments based on replication assignment skews and/or leadership penalties. The nodal work assignments thus minimize hardware and software operations, network traffic, and electrical energy consumption.

Classes IPC  ?

  • H04L 67/1031 - Commande du fonctionnement des serveurs par un répartiteur de charge, p. ex. en ajoutant ou en supprimant de serveurs qui servent des requêtes
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

89.

FUNNEL TECHNIQUES FOR NATURAL LANGUAGE TO API CALLS

      
Numéro d'application 18461305
Statut En instance
Date de dépôt 2023-09-05
Date de la première publication 2024-12-26
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Corlatescu, Dragos
  • Belibov, Dan
  • Radu, Daniel
  • Budau, Elena
  • Radu, Marian

Abrégé

The present disclosure produces a first output in response to inputting a first prompt into a large language model (LLM). The first prompt comprises a first document group that corresponds to a second document group, and the LLM is limited by a maximum token limit that is less than a token count of the second document group. The present disclosure generates a second prompt that comprises a subset of the second document group corresponding to the first output. The present disclosure then produces a second output based on the subset of the second document group in response to inputting the second prompt into the LLM.

Classes IPC  ?

  • G06F 16/332 - Formulation de requêtes
  • G06F 16/335 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d’utilisateurs ou de groupes
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence

90.

Rules-Based Malware Resolution Suggestions

      
Numéro d'application 18338112
Statut En instance
Date de dépôt 2023-06-20
Date de la première publication 2024-12-26
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s) Sumpter, Alastair

Abrégé

A rules-based malware detection and assessment service pre-screens malware events reported by endpoint client devices. The endpoint client devices report the malware events to a cloud-computing environment providing the malware detection and assessment service. The malware events are compared to logical rules specifying malware and safe activities. Moreover, the malware detection and assessment service maintains a comprehensive, historical database that stores logs and tracks each malware event. Any new malware events are compared to the historical database. Any matching historical entry indicates a duplicate or repetitive malware detection, so the historical detection and assessment may be retrieved and suggested. The rules-based malware detection and assessment service thus provides a much faster and simpler resolution that easily scales to the ever-increasing volume of malware reports.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

91.

INCREMENTAL SOLVES USING LLMS FOR API CALLS

      
Numéro d'application 18475058
Statut En instance
Date de dépôt 2023-09-26
Date de la première publication 2024-12-26
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Corlatescu, Dragos
  • Belibov, Dan
  • Radu, Daniel
  • Chihaia, Theo
  • Radu, Marian

Abrégé

Systems and methods for incremental solves using LLMs for API calls is presented. The systems and methods produce, by a first large learning model (LLM), a processing plan based on a first prompt, wherein the processing plan includes a plurality of tasks corresponding to a plurality of services. The systems and methods send a plurality of messages corresponding to the plurality of tasks to a plurality of service agents, wherein the plurality of service agents correspond to the plurality of services and comprise a plurality of second LLMs that produce a plurality of agent responses. The systems and methods then generate a query response based on the plurality of agent responses.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/54 - Communication interprogramme
  • G06N 3/045 - Combinaisons de réseaux

92.

FALCON ADVERSARY OVERWATCH

      
Numéro d'application 1826220
Statut Enregistrée
Date de dépôt 2024-08-15
Date d'enregistrement 2024-08-15
Propriétaire CrowdStrike, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer security consulting; consulting in the field of information technology; computer security consultancy services for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attacker; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer security services by online scanning, detecting, quarantining, and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SaaS) services featuring software for computer and network security; software as a service (SaaS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; electronic monitoring services for advanced computer threat detection using real-time monitoring and machine learning to detect computer threats and viruses, and for providing detailed analysis and contextual intelligence to inform responses to sophisticated computer threats; monitoring and investigation of bad actors and adversaries across computer networks to neutralize emerging computer threats and improve cybersecurity and computer network security.

93.

Identifying patterns in large quantities of collected emails

      
Numéro d'application 18326919
Numéro de brevet 12488037
Statut Délivré - en vigueur
Date de dépôt 2023-05-31
Date de la première publication 2024-12-05
Date d'octroi 2025-12-02
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Feener, Tyler
  • Loui, Eric
  • Stein, Stefan
  • Wald, Arnaud
  • Widen, Tanya

Abrégé

A system and method of detecting malicious activity in emails using pattern recognition. The method includes maintaining a plurality of associations between a plurality of emails and a plurality of multi-dimensional (MD) vectors of the plurality of emails. Each association is between a respective email of the plurality of emails and a respective MD vector of the plurality of MD vectors that corresponds to the respective email. The method includes identifying, based on one or more keywords, a set of MD vectors of the plurality of MD vectors. The method includes selecting, based on the plurality of associations, a set of emails associated with the set of MD vectors. The method includes generating, by a processing device, based on the set of emails or the set of MD vectors, a set of clusters to represent patterns in the set of emails.

Classes IPC  ?

  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/31 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/3329 - Formulation de requêtes en langage naturel
  • G06F 16/35 - PartitionnementClassement

94.

THREAT PREDICTION IN A STREAMING SYSTEM

      
Numéro d'application 18203603
Statut En instance
Date de dépôt 2023-05-30
Date de la première publication 2024-12-05
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Chihaia, Theo
  • Abrams, Jaclyn
  • Spurlock, Joel Robert
  • Faulhaber, Joseph

Abrégé

Techniques for aggregating data usable for generating security recommendations are discussed herein. A system can aggregate detection data from host devices associated with different organizations based on profile information describing each organization. The system can analyze the aggregated data to identify potential security threats in a data stream, and generate recommendation data usable for defending the data stream from future malicious events.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

95.

Cyber security boot status markers

      
Numéro d'application 18358564
Numéro de brevet 12380215
Statut Délivré - en vigueur
Date de dépôt 2023-07-25
Date de la première publication 2024-12-05
Date d'octroi 2025-08-05
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Moore, Garrett
  • Foster, Jr., Blair C.

Abrégé

Boot status markers record historical boot processes performed by a computer system. Each time the computer system boots, an operating system performs a boot process and interfaces with an antimalware driver. The antimalware driver determines the boot status markers that were set during previous boot processes. The antimalware driver may then classify other drivers based on the boot status markers set during the previous boot processes. The antimalware driver may then report driver classifications to the operating system. The operating system may then block, or allow, the drivers based on the driver classifications.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

96.

PREVENTION OF PROMPT INJECTION ATTACKS ON LARGE LANGUAGE MODELS BY TOKENIZATION OF STRUCTURED DATA ELEMENTS

      
Numéro d'application 18446314
Statut En instance
Date de dépôt 2023-08-08
Date de la première publication 2024-12-05
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Radu, Daniel
  • Radu, Marian
  • Krasser, Sven

Abrégé

Systems and methods for implementing prevention of prompt injection attacks on large language models by tokenization of structured data elements is presented. The systems and methods replace one or more data elements in a database response with one or more tokens to produce a tokenized database response. The systems and methods provide the tokenized database response to a large language model (LLM). The systems and methods receive a tokenized LLM output that includes at least one of the one or more tokens. The systems and methods produce a detokenized LLM output by replacing the one or more tokens in the tokenized LLM output with the one or more data elements.

Classes IPC  ?

  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
  • G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu

97.

Analysis of malware

      
Numéro d'application 18667819
Numéro de brevet 12518013
Statut Délivré - en vigueur
Date de dépôt 2024-05-17
Date de la première publication 2024-11-21
Date d'octroi 2026-01-06
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Kurtz, George Robert
  • Alperovitch, Dmitri
  • Kulkarni, Amol
  • Miller, Jan
  • Radu, Daniel

Abrégé

A security service can determine a synthetic context based at least in part on context data associated with a first malware sample, and detonate the first malware sample in the synthetic context to provide one or more first event records representing events performed by the first malware sample and detected during detonation. Additionally or alternatively, the security service can detonate the first malware sample and locate a second malware sample in a corpus based at least in part on the one or more first event records. Additionally or alternatively, the security service can receive event records representing events detected during a detonation of a first malware sample, the detonation based at least in part on context data, and locate a second malware sample in the corpus based at least in part on the one or more reference event records.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

98.

DETECTING TARGETED INTRUSION ON MOBILE DEVICES

      
Numéro d'application 18141703
Statut En instance
Date de dépôt 2023-05-01
Date de la première publication 2024-11-07
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Brant, Connor
  • Williams, David

Abrégé

Techniques to determining a program installed on a computing device may be indicative of performing a targeted intrusion of the computing device is described. A log file associated with the computing device may be generated. Various indicators from the log file may be determined. A security program may determine that the program may be indicative of performing the targeted intrusion based on at least one of the indicators. The security program may determine an action to take based on the indication of performing the targeted intrusion.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

99.

Techniques for detecting file similarity

      
Numéro d'application 18142333
Numéro de brevet 12505071
Statut Délivré - en vigueur
Date de dépôt 2023-05-02
Date de la première publication 2024-11-07
Date d'octroi 2025-12-23
Propriétaire CrowdStrike, Inc. (USA)
Inventeur(s)
  • Capone, Jeffrey
  • Jones, Joshua
  • Tsai, Artsiom
  • Fanaeian, Naeem

Abrégé

A computer-implemented method of detecting similarity between a first file and a plurality of second files, the method includes generating a first vector corresponding to the first file and a plurality of second vectors each corresponding to one of the plurality of second files; determining that the first file is similar to at least one of the plurality of second files based on a comparison of the first vector to the plurality of second vectors; and responsive to determining that the first file is similar to the at least one of the plurality of second files, performing a remediation operation on the first file.

Classes IPC  ?

  • G06F 16/17 - Détails d’autres fonctions de systèmes de fichiers
  • G06F 17/16 - Calcul de matrice ou de vecteur

100.

Reconfigurable Model for Auto-Classification System and Method

      
Numéro d'application 18773407
Statut En instance
Date de dépôt 2024-07-15
Date de la première publication 2024-11-07
Propriétaire CROWDSTRIKE, INC. (USA)
Inventeur(s)
  • Ludlow, Stephen
  • Pettigrew, Steve
  • Dowgailenko, Alex
  • Deligia, Agostino
  • Giguere, Isabelle

Abrégé

A reconfigurable automatic document-classification system and method provides classification metrics to a user and enables the user to reconfigure the classification model. The user can refine the classification model by adding or removing exemplars, creating, editing or deleting rules, or performing other such adjustments to the classification model. This technology enhances the overall transparency and defensibility of the auto-classification process.

Classes IPC  ?

  • G06F 16/35 - PartitionnementClassement
  • G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
  • G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06F 16/93 - Systèmes de gestion de documents
  • G06N 20/00 - Apprentissage automatique
  • G06N 99/00 - Matière non prévue dans les autres groupes de la présente sous-classe
  1     2     3     ...     6        Prochaine page