Patent application number | Description | Published |
20110030058 | SYSTEM AND METHOD FOR SCANNING AND MARKING WEB CONTENT - Instructions to access content at a destination node is intercepted. Content at the destination node is analyzed for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content. | 02-03-2011 |
20120047509 | Systems and Methods for Improving Performance of Computer Systems - Priorities of an application and/or processes associated with an application executing on a computer is determined according to user-specific usage patterns of the application and stored for subsequent use, analysis and distribution. | 02-23-2012 |
20120303477 | Systems and Methods for Recommending Software Applications - A potentially beneficial software product is recommended to a user based, in part, on an analysis of parameters associated with the user's usage of software applications already installed on the user's computer. | 11-29-2012 |
20130019310 | DETECTION OF ROGUE SOFTWARE APPLICATIONSAANM Ben-Itzhak; YuvalAACI BrnoAACO CZAAGP Ben-Itzhak; Yuval Brno CZAANM Osis; KasparsAACI RigaAACO LVAAGP Osis; Kaspars Riga LVAANM Boz; MikeAACI Foster CityAAST CAAACO USAAGP Boz; Mike Foster City CA US - Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application. | 01-17-2013 |
20130227544 | Systems and Methods for Enhancing Performance of Software Applications - A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software. | 08-29-2013 |
20130297626 | SYSTEMS AND METHODS FOR EXTRACTION OF POLICY INFORMATION - In a system for extracting policy information from text, a processor analyzes if the text is relevant to a top-level category, and then determines if at least a portion of the text is relevant to categories and subcategories within a taxonomy of categories and subcategories related to the top-level category. If at least a portion of the text is determined to be relevant to the category/subcategory, a classifier extracts policy information associated with the category/subcategory. Using text that includes a known policy the classifiers can be trained to correctly recognize categories/subcategories, and the values associated therewith. | 11-07-2013 |
20150020083 | SYSTEMS AND METHODS FOR PROVIDING USER-SPECIFIC CONTENT ON AN ELECTRONIC DEVICE - Systems and methods for providing user-specific content on an electronic device are disclosed. The user-specific data can be generated in isolated applications that are prohibited from communicating directly with one another. Sharing of user data that enables these isolated applications to generate such user-specific data can be facilitated by the use of a master program that can be loaded along with each of the isolated applications on the electronic device. | 01-15-2015 |
20150024787 | MOBILE DEVICE TRACKING PREVENTION METHOD AND SYSTEM - A mobile device tracking prevention method and system includes monitoring a mobile device for movement, determining whether an operating state of a wireless module of the mobile device should be adjusted when movement of the mobile device is detected, and controlling the operating state of the wireless module based on the determination. One or more of the actual geographic location of the mobile device, network IDs broadcasted by nearby network access points, and signal strengths of the access points as detected by the mobile device can be monitored to detect movement of the mobile device. Changes to any of these may be indicative of movement of the mobile device, which may serve as the basis for enabling or disabling the wireless module to prevent tracking of the mobile device without sacrificing user productivity. | 01-22-2015 |
Patent application number | Description | Published |
20080276320 | Byte-distribution analysis of file security - A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for analysis, then processing a buffer of file data from the unfamiliar file, including generating a histogram of frequencies of occurrence of bytes within a buffer of file data from the unfamiliar file, excluding a designated set of bytes, and if the generated histogram of frequencies of occurrence of the non-excluded bytes deviates substantially from a reference distribution, then signaling that the unfamiliar file is potentially malicious. A system and a computer-readable storage medium are also described and claimed. | 11-06-2008 |
20090019545 | COMPUTER SECURITY METHOD AND SYSTEM WITH INPUT PARAMETER VALIDATION - A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed. | 01-15-2009 |
20100023756 | SPLITTING AN SSL CONNECTION BETWEEN GATEWAYS - A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed. | 01-28-2010 |
20100251373 | SYSTEM AND METHOD FOR INSPECTING DYNAMICALLY GENERATED EXECUTABLE CODE - A method for protecting a client computer from dynamically generated malicious content, including receiving at a gateway computer content being sent to a client computer for processing, the content including a call to an original function, and the call including an input, modifying the content at the gateway computer, including replacing the call to the original function with a corresponding call to a substitute function, the substitute function being operational to send the input to a security computer for inspection, transmitting the modified content from the gateway computer to the client computer, processing the modified content at the client computer, transmitting the input to the security computer for inspection when the substitute function is invoked, determining at the security computer whether it is safe for the client computer to invoke the original function with the input, transmitting an indicator of whether it is safe for the client computer to invoke the original function with the input, from the security computer to the client computer, and invoking the original function at the client computer with the input, only if the indicator received from the security computer indicates that such invocation is safe. A system and a computer-readable storage medium are also described and claimed. | 09-30-2010 |
20120144485 | COMPUTER SECURITY METHOD AND SYSTEM WITH INPUT PARAMETER VALIDATION - A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed. | 06-07-2012 |
20140040610 | Splitting an SSL Connection Between Gateways - A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed. | 02-06-2014 |