Shape Security, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 175 pour Shape Security, Inc. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 152
        Marque 23
Juridiction
        États-Unis 123
        International 43
        Canada 8
        Europe 1
Date
2024 4
2023 7
2022 2
2021 6
2020 18
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 97
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 30
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures 20
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 20
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée 19
Voir plus
Statut
En Instance 2
Enregistré / En vigueur 173
  1     2        Prochaine page

1.

Security measures for extended sessions using multi-domain data

      
Numéro d'application 18220782
Numéro de brevet 12137097
Statut Délivré - en vigueur
Date de dépôt 2023-07-11
Date de la première publication 2024-11-05
Date d'octroi 2024-11-05
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Chen, Mengmeng
  • Agarwal, Sumit
  • Zhao, Yao

Abrégé

A security server device, method, non-transitory computer readable medium and security system that receives request data for a request from a client to a web server system where the request comprises a session identifier (ID) for a session between an authenticated user and the web server system. A determination is made whether the client is a single-user device based on the request data and multi-domain data. Another determinations is made on whether the client is compromised based on the request data. In response to the determinations that the client is a single-user device and is not compromised an extension of the session between the authenticated user on the client and the web server system is caused.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

2.

DETECTING COMPROMISED WEB PAGES IN A RUNTIME ENVIRONMENT

      
Numéro d'application 18746008
Statut En instance
Date de dépôt 2024-06-17
Date de la première publication 2024-10-10
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Hales, Wesley
  • Overson, Jarrod

Abrégé

Techniques are provided for detecting compromised web pages in a runtime environment. A first version of a web page is retrieved and loaded in a browser comprising a browser extension configured to detect event listeners added when web pages are loaded by the browser. First data is generated describing a first set of event listeners detected by the browser extension when the first version of the web page is loaded. At a second time a second version of the web page is retrieved and loaded in the browser. Second data is generated describing a second set of event listeners detected by the browser extension when the second version of the web page is loaded. It is determined that the web page is compromised based on comparing the first data and the second data. In response to determining that the web page is compromised, a threat response action is performed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques

3.

Call stack integrity check on client/server systems

      
Numéro d'application 16231340
Numéro de brevet RE050024
Statut Délivré - en vigueur
Date de dépôt 2018-12-21
Date de la première publication 2024-06-25
Date d'octroi 2024-06-25
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhao, Yao
  • Wang, Xinran

Abrégé

Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server computers through supervising instructions defined in a web page and/or web browser. In an embodiment, a computer system comprising one or more processors, coupled to a remote client computer, and configured to send, to the remote client computer, one or more instructions, which when executed by the remote client computer, cause a run-time environment on the remote client computer to: intercept, within the run-time environment, a first call to execute a particular function defined in the run-time environment by a first caller function in the run-time environment; determine a first caller identifier, which corresponds to the first caller function identified in a run-time stack maintained by the run-time environment; determine whether the first caller function is authorized to call the particular function based on the first caller identifier.

Classes IPC  ?

  • G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 67/01 - Protocoles

4.

Detecting malicious scripts in a web page

      
Numéro d'application 18374188
Numéro de brevet 12130920
Statut Délivré - en vigueur
Date de dépôt 2023-09-28
Date de la première publication 2024-01-18
Date d'octroi 2024-10-29
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Disney, Tim
  • Kedlaya, Madhukar
  • Schlenker, Claire
  • Khadke, Nitish

Abrégé

Techniques are provided for detecting a malicious script in a web page. Instrumentation code is provided for serving to a client computing device with a web page. The instrumentation code is configured to monitor web code execution at the client computing device when a script referenced by the web page is processed. Script activity data generated by the instrumentation code is received. The script activity data describes one or more script actions detected by the instrumentation code at the client computing device. Prior script activity data generated by a prior instance of the instrumentation code is obtained. A malicious change in the script is detected based on comparing the script activity data and the prior script activity data. In response to detecting the malicious change in the script, a threat response action is performed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

5.

Facilitating secure client data transfer

      
Numéro d'application 17071483
Numéro de brevet 11783087
Statut Délivré - en vigueur
Date de dépôt 2020-10-15
Date de la première publication 2023-10-10
Date d'octroi 2023-10-10
Propriétaire Shape Security, Inc. (USA)
Inventeur(s) Agarwal, Sumit

Abrégé

This technology receive first telemetry data collected at the client when first instrumentation code provided to the client during a first interaction with a first server is executed at the client. The first telemetry data is stored in a telemetry data set comprising telemetry data for one or more interactions between a plurality of clients and a plurality of servers. Second telemetry data, collected at the client when the second instrumentation code provided to the client during a second interaction with a second server is executed at the client, is received. Based on the second telemetry data, determining when the telemetry data set includes stored telemetry data for an interaction between the client and the first server. A transfer of data associated with the client and the first server to the second interaction is facilitated when the determination indicates the telemetry data set includes the stored telemetry data.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

6.

Code modification for detecting abnormal activity

      
Numéro d'application 17680977
Numéro de brevet 12058170
Statut Délivré - en vigueur
Date de dépôt 2022-02-25
Date de la première publication 2023-08-31
Date d'octroi 2024-08-06
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Call, Justin D
  • Zhou, Xiaoming
  • Huang, Xiaohan
  • Varadarajan, Subramanian
  • Hoover, Roger S.

Abrégé

Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

7.

Obfuscating programs using different instruction set architectures

      
Numéro d'application 17066962
Numéro de brevet 11741197
Statut Délivré - en vigueur
Date de dépôt 2020-10-09
Date de la première publication 2023-08-29
Date d'octroi 2023-08-29
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Gibbons, Kevin
  • Ficarra, Michael J.

Abrégé

Technology related to obfuscating programs using different instruction set architectures is disclosed. In one example, a method includes receiving a program implemented as a set of ordered instructions. Each instruction of the set of ordered instructions has a type specified by a first instruction set architecture (ISA). A subgroup of instructions is selected from the set of ordered instructions. A new instruction type is generated to perform the operations of the subgroup of consecutive instructions. The new instruction type is added to a second ISA. An updated program is generated by replacing the subgroup of instructions with a new instruction of the generated new instruction type. An interpreter for executing programs using the second ISA is generated. In response to a request for the program, the updated program and the interpreter is sent.

Classes IPC  ?

  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p. ex. par masquage

8.

Security measures for extended sessions using multi-domain data

      
Numéro d'application 17087840
Numéro de brevet 11743256
Statut Délivré - en vigueur
Date de dépôt 2020-11-03
Date de la première publication 2023-08-29
Date d'octroi 2023-08-29
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Chen, Mengmeng
  • Agarwal, Sumit
  • Zhao, Yao

Abrégé

A security server device, method, non-transitory computer readable medium and security system that receives request data for a request from a client to a web server system where the request comprises a session identifier (ID) for a session between an authenticated user and the web server system. A determination is made whether the client is a single-user device based on the request data and multi-domain data. Another determinations is made on whether the client is compromised based on the request data. In response to the determinations that the client is a single-user device and is not compromised an extension of the session between the authenticated user on the client and the web server system is caused.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

9.

Methods for automatically preventing data exfiltration and devices thereof

      
Numéro d'application 17069180
Numéro de brevet 11736512
Statut Délivré - en vigueur
Date de dépôt 2020-10-13
Date de la première publication 2023-08-22
Date d'octroi 2023-08-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Overson, Jarrod S.

Abrégé

Methods, non-transitory computer readable media, protection server apparatuses, and network security systems that improve network security for web applications by mitigating cyberattacks that cause the exfiltration of data are illustrated. With this technology, network request(s) are received from a client that specify domain(s) to which the client has sent data during rendering of a webpage. The webpage includes instrumentation code configured to intercept and post the network requests. A determination is then mage when one of the domain(s) is a malicious domain. Interceptor code is generated based on a type of attack that is associated with the one of the domains, when the determination indicates the one of the domains is a malicious domain. The instrumentation code is then updated to include the interceptor code. The interceptor code is configured to mitigate the attack when the webpage is subsequently rendered by another client.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

10.

Methods for security and privacy-enforced affinity scoring and devices thereof

      
Numéro d'application 17071504
Numéro de brevet 11652835
Statut Délivré - en vigueur
Date de dépôt 2020-10-15
Date de la première publication 2023-05-16
Date d'octroi 2023-05-16
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Agarwal, Sumit
  • Chen, Mengmeng

Abrégé

This technology maintains de-identified visit data to a plurality of websites from assigned user identifiers (UIDs) corresponding to a plurality of clients. The assigned UIDs include a different assigned UID for each client-website pair, the de-identified visit data associating the assigned UIDs to a plurality of groups. A first group from the groups is determined based on first request data corresponding to a first request from a client to a web server system. First group visit data describing visits to a set of the websites by assigned UIDs belonging to the first group is obtained from the de-identified visit data. Affinity data, comprising at least one affinity score for at least one of the websites, is generated based on the first group visit data. Generation of affiliate content based on the affinity data is caused, where the affiliate content corresponds to the at least one of the websites.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
  • H04L 67/306 - Profils des utilisateurs
  • H04L 43/062 - Génération de rapports liés au trafic du réseau

11.

Advanced interstitial techniques for web security

      
Numéro d'application 17024201
Numéro de brevet 11647036
Statut Délivré - en vigueur
Date de dépôt 2020-09-17
Date de la première publication 2023-05-09
Date d'octroi 2023-05-09
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Disney, Tim
  • Ficarra, Michael
  • Khadke, Nitish

Abrégé

A method non-transitory computer readable medium, device and system that receives one of one or more requests from a client to a web server system. An interstitial page is served to the client and comprises instrumentation code that, when executed at the client, collects telemetry data. The telemetry data is received and a threat analysis is performed on the telemetry data collected in association with the one of the requests. A determination is made on when, based on the performing the threat analysis, that the one of the requests is from a potential attacker. When the determination indicates the one of the requests is not from the potential attacker then the one of the requests is allowed.

Classes IPC  ?

12.

Mitigating malicious client-side scripts

      
Numéro d'application 17232805
Numéro de brevet 11475122
Statut Délivré - en vigueur
Date de dépôt 2021-04-16
Date de la première publication 2022-10-18
Date d'octroi 2022-10-18
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Kedlaya, Madhukar Nagaraja
  • Disney, Timothy Charles
  • Khadke, Nitish Kishore
  • Schlenker, Claire Madison

Abrégé

Technology related to detecting and/or mitigating malicious client-side scripts is disclosed. In one example, a method includes sending a request for a page of a client application. In response to the request for the page, the page and a supervisory script of the page are received. The supervisory script of the page of the client application can be executed within a client environment. The supervisory script can override an operation associated with an architected application programming interface (API) of the client environment. During rendering of the page, a call to the architected API of the client environment can be serviced by performing a modified operation that is different than the architected operation associated with the architected API.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes

13.

Security scoring based on multi domain telemetry data

      
Numéro d'application 16881251
Numéro de brevet 11258819
Statut Délivré - en vigueur
Date de dépôt 2020-05-22
Date de la première publication 2022-02-22
Date d'octroi 2022-02-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Agarwal, Sumit

Abrégé

A method, non-transitory compute r readable medium, device, and system that receives telemetry data collected based on instrumentation code executed at one of a plurality of client computing devices with a requested transaction with one of a plurality of web server systems. Identifying signal data (IDSD) usable to identify the one of client computing devices is determined based on the received telemetry data. Any matching telemetry data in a telemetry data set for a plurality of prior transactions between one or more of the client computing devices and one or more of the web server systems is identified based on any stored IDSDs that match the received IDSD. A security score associated with the one of the client computing devices is generated based on the identified matching telemetry data. A response to the requested transaction to the one of client computing devices is managed based on the generated security score.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

14.

Detecting malicious scripts in a web page

      
Numéro d'application 16914183
Numéro de brevet 11790083
Statut Délivré - en vigueur
Date de dépôt 2020-06-26
Date de la première publication 2021-12-30
Date d'octroi 2023-10-17
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Disney, Tim
  • Kedlaya, Madhukar
  • Schlenker Schlenker, Claire
  • Khadke, Nitish

Abrégé

Techniques are provided for detecting a malicious script in a web page. Instrumentation code is provided for serving to a client computing device with a web page. The instrumentation code is configured to monitor web code execution at the client computing device when a script referenced by the web page is processed. Script activity data generated by the instrumentation code is received. The script activity data describes one or more script actions detected by the instrumentation code at the client computing device. Prior script activity data generated by a prior instance of the instrumentation code is obtained. A malicious change in the script is detected based on comparing the script activity data and the prior script activity data. In response to detecting the malicious change in the script, a threat response action is performed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

15.

DETECTING MALICIOUS SCRIPTS IN A WEB PAGE

      
Numéro d'application US2021037041
Numéro de publication 2021/262460
Statut Délivré - en vigueur
Date de dépôt 2021-06-11
Date de publication 2021-12-30
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Disney, Tim
  • Kedlaya, Madhukar
  • Schlenker, Claire
  • Khadke, Nitish

Abrégé

Techniques are provided for detecting a malicious script in a web page. Instrumentation code is provided for serving to a client computing device with a web page. The instrumentation code is configured to monitor web code execution at the client computing device when a script referenced by the web page is processed. Script activity data generated by the instrumentation code is received. The script activity data describes one or more script actions detected by the instrumentation code at the client computing device. Prior script activity data generated by a prior instance of the instrumentation code is obtained. A malicious change in the script is detected based on comparing the script activity data and the prior script activity data. In response to detecting the malicious change in the script, a threat response action is performed.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

16.

Unsupervised and supervised machine learning approaches to detecting bots and other types of browsers

      
Numéro d'application 15669618
Numéro de brevet 11138463
Statut Délivré - en vigueur
Date de dépôt 2017-08-04
Date de la première publication 2021-10-05
Date d'octroi 2021-10-05
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Wang, Xinran
  • Zhao, Yao

Abrégé

Unsupervised or supervised machine learning (“ML”) techniques discussed herein can be used to classify browsers as one or more types of browser or within one or more browser groups. For example, a computer system configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: receive a first plurality of requests from a first plurality of browsers; generate a first plurality of request-feature vectors from the first plurality of requests; generate a plurality of browser groups based on the first plurality of request-feature vectors; receive a first new request from a first client computer; generate a first new request-feature vector based on the first new request; determine that the first new request-feature vector belongs to a first browser group among the plurality of browser groups; determine that the first browser group is associated with a first rule, and in response, respond to the first new request according to the first rule.

Classes IPC  ?

  • G06F 16/20 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet de données structurées, p. ex. de données relationnelles
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique
  • G06F 16/35 - PartitionnementClassement
  • G06N 20/00 - Apprentissage automatique

17.

Detecting compromised credentials in a credential stuffing attack

      
Numéro d'application 17232999
Numéro de brevet 12126631
Statut Délivré - en vigueur
Date de dépôt 2021-04-16
Date de la première publication 2021-08-19
Date d'octroi 2024-10-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Moen, Daniel G.
  • Schroeder, Carl

Abrégé

Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 20/00 - Apprentissage automatique
  • H04L 67/01 - Protocoles
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

18.

Proof-of-work based on runtime compilation

      
Numéro d'application 16653951
Numéro de brevet 11095443
Statut Délivré - en vigueur
Date de dépôt 2019-10-15
Date de la première publication 2021-08-17
Date d'octroi 2021-08-17
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Zhang, Bei

Abrégé

Techniques are provided for proof-of-work based on runtime compilation. Key generation code is partitioned into a set of code blocks. The key generation code generates an expected key value when compiled and executed. A shuffled set of code blocks is generated by reordering the set of code blocks. A client computing device is provided the shuffled set of code blocks and problem-solving code that, when executed at the client computing device, reconstructs the key generation code to generate a submission value by performing one or more compiling iterations. Each compiling iteration comprising reordering the shuffled set of code blocks to generate test code, and attempting to compile and execute the test code to generate the submission value. It is determined that the client computing device fully executed the problem-solving code based on the verifying the submission value.

Classes IPC  ?

19.

Detecting compromised web pages in a runtime environment

      
Numéro d'application 16709198
Numéro de brevet 12047411
Statut Délivré - en vigueur
Date de dépôt 2019-12-10
Date de la première publication 2021-06-10
Date d'octroi 2024-07-23
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Hales, Wesley
  • Overson, Jarrod

Abrégé

Techniques are provided for detecting compromised web pages in a runtime environment. A first version of a web page is retrieved and loaded in a browser comprising a browser extension configured to detect event listeners added when web pages are loaded by the browser. First data is generated describing a first set of event listeners detected by the browser extension when the first version of the web page is loaded. At a second time a second version of the web page is retrieved and loaded in the browser. Second data is generated describing a second set of event listeners detected by the browser extension when the second version of the web page is loaded. It is determined that the web page is compromised based on comparing the first data and the second data. In response to determining that the web page is compromised, a threat response action is performed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques

20.

SHAPE DEFENSE

      
Numéro d'application 1563333
Statut Enregistrée
Date de dépôt 2020-10-29
Date d'enregistrement 2020-10-29
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials.

21.

SHAPE CONNECT

      
Numéro d'application 1562517
Statut Enregistrée
Date de dépôt 2020-09-24
Date d'enregistrement 2020-09-24
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SaaS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SaaS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SaaS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SaaS) services featuring machine learning security and threat detection software for users seeking to protect and secure computer systems, accounts and credentials; software as a service (SaaS) services featuring software for security and threat detection for users seeking to protect and secure computer systems, accounts and credentials.

22.

SHAPE RECOGNIZE

      
Numéro d'application 1559403
Statut Enregistrée
Date de dépôt 2020-09-27
Date d'enregistrement 2020-09-27
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts and credentials.

23.

DETECTING COMPROMISED CREDENTIALS BY IMPROVED PRIVATE SET INTERSECTION

      
Numéro d'application US2020014622
Numéro de publication 2020/163087
Statut Délivré - en vigueur
Date de dépôt 2020-01-22
Date de publication 2020-08-13
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhao, Yao
  • Jiang, Jian
  • Liu, Rundong

Abrégé

In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.

Classes IPC  ?

  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/34 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité des bits ou des blocs de bits du message télégraphique étant interchangés dans le temps

24.

BLACKFISH

      
Numéro d'application 1544451
Statut Enregistrée
Date de dépôt 2020-07-10
Date d'enregistrement 2020-07-10
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials.

25.

Detecting compromised credentials by improved private set intersection

      
Numéro d'application 16380958
Numéro de brevet 11366892
Statut Délivré - en vigueur
Date de dépôt 2019-04-10
Date de la première publication 2020-08-06
Date d'octroi 2022-06-21
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Zhao, Yao
  • Jiang, Jian
  • Liu, Rundong

Abrégé

In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.

Classes IPC  ?

  • G06F 21/45 - Structures ou outils d’administration de l’authentification
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/60 - Protection de données
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

26.

DECISION TREE TRAINING USING A DATABASE SYSTEM

      
Numéro d'application US2019064552
Numéro de publication 2020/131386
Statut Délivré - en vigueur
Date de dépôt 2019-12-04
Date de publication 2020-06-25
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhang, Bei
  • Shah, Samir
  • Miller, Kenton

Abrégé

In an embodiment, a method for training a decision tree comprising a plurality of nodes using a database system comprises: storing in a database input data for training the decision tree, the input data comprising a plurality of feature values corresponding to a plurality of features; generating a particular node of the plurality of decision nodes by: selecting a subset of the plurality of features and a subset of the input data; using one or more queries to the database system, for each feature of the subset of the plurality of features, calculating an information gain associated with the feature based on the subset of the input data; identifying a particular feature of the subset of the plurality of features associated with the highest information gain; associating the particular node with the particular feature, wherein the particular node causes the decision tree to branch based on the particular feature.

Classes IPC  ?

  • G06F 7/00 - Procédés ou dispositions pour le traitement de données en agissant sur l'ordre ou le contenu des données maniées
  • G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

27.

Decision tree training using a database system

      
Numéro d'application 16222974
Numéro de brevet 11934931
Statut Délivré - en vigueur
Date de dépôt 2018-12-17
Date de la première publication 2020-06-18
Date d'octroi 2024-03-19
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhang, Bei
  • Shah, Samir
  • Miller, Kenton

Abrégé

In an embodiment, a computer-implemented method for training a decision tree using a database system, the decision tree comprising a plurality nodes, comprises, by one or more computing devices: storing in a database input data for training the decision tree, the input data comprising a plurality of feature values corresponding to a plurality of features; generating a particular node of the plurality of decision nodes by: selecting a subset of the plurality of features and a subset of the input data; using one or more queries to the database system, for each feature of the subset of the plurality of features, calculating an information gain associated with the feature based on the subset of the input data; identifying a particular feature of the subset of the plurality of features associated with the highest information gain; associating the particular node with the particular feature, wherein the particular node causes the decision tree to branch based on the particular feature.

Classes IPC  ?

  • G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/245 - Traitement des requêtes
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06N 5/045 - Explication d’inférenceIntelligence artificielle explicable [XAI]Intelligence artificielle interprétable
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

28.

EXECUTION OF TRAINED NEURAL NETWORKS USING A DATABASE SYSTEM

      
Numéro d'application US2019064550
Numéro de publication 2020/117989
Statut Délivré - en vigueur
Date de dépôt 2019-12-04
Date de publication 2020-06-11
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhang, Bei
  • Shah, Samir
  • Miller, Kenton

Abrégé

In an embodiment, a computer-implemented method for efficient execution of a trained neural network using a database system, the trained neural network comprising a plurality of layers and programmed at each of the layers to execute an affine transformation of an activation function and an input value, comprises: for a particular layer of the trained neural network, dividing the affine transformation into a plurality of transformation pieces; executing each of the transformation pieces to result in computed pieces and writing the computed pieces to a first database table; using one or more database queries, combining the computed pieces and applying the activation function to generate a set of output data; writing the output data to one of a plurality of different second database tables that respectively correspond to the layers; repeating the dividing, executing, combining, applying and writing for all layers of the trained neural network.

Classes IPC  ?

  • G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 3/08 - Méthodes d'apprentissage

29.

EXECUTION OF TRAINED NEURAL NETWORKS USING A DATABASE SYSTEM

      
Numéro d'application 16211138
Statut En instance
Date de dépôt 2018-12-05
Date de la première publication 2020-06-11
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhang, Bei
  • Shah, Samir
  • Miller, Kenton

Abrégé

In an embodiment, a computer-implemented method for efficient execution of a trained neural network using a database system, the trained neural network comprising a plurality of layers each comprising weight values and bias values and programmed at each of the layers to execute an affine transformation of an activation function and an input value, comprises: for a particular layer of the trained neural network, dividing the affine transformation input a plurality of transformation pieces; executing each of the transformation pieces to result in computed pieces and writing the computed pieces to a first database table; using one or more database queries, combining the computed pieces and applying the activation function to generate a set of output data; writing the output data to one of a plurality of different second database tables that respectively correspond to the layers; repeating the dividing, executing, combining, applying and writing for all layers of the trained neural network.

Classes IPC  ?

  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 3/08 - Méthodes d'apprentissage
  • G06F 16/2457 - Traitement des requêtes avec adaptation aux besoins de l’utilisateur
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées

30.

Delayed serving of protected content

      
Numéro d'application 16730975
Numéro de brevet 11070557
Statut Délivré - en vigueur
Date de dépôt 2019-12-30
Date de la première publication 2020-06-04
Date d'octroi 2021-07-20
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Idika, Nwokedi
  • Call, Justin D.

Abrégé

Techniques are described for delayed serving of protected content. A request has been made by a client computing device for a requested resource comprising a first portion and a second portion that is initially withheld from the client computing device. First content comprising the first portion of the requested resource and reconnaissance code is served for execution on the client computing device. When executed at the client computing device, the reconnaissance code gathers data at the client computing device that indicates whether the client computing device is human-controlled or bot-controlled. The data gathered by the reconnaissance code is received. Based on the data, it is determined that the client computing device is not bot-controlled. In response to determining that the client computing device is not bot-controlled, the second portion of the requested resource is served to the client computing device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
  • G06F 8/60 - Déploiement de logiciel
  • G06F 21/31 - Authentification de l’utilisateur

31.

Code modification for detecting abnormal activity

      
Numéro d'application 16729395
Numéro de brevet 11297097
Statut Délivré - en vigueur
Date de dépôt 2019-12-29
Date de la première publication 2020-06-04
Date d'octroi 2022-04-05
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Call, Justin D.
  • Zhou, Xiaoming
  • Huang, Xiaohan
  • Varadarajan, Subramanian
  • Hoover, Roger S.

Abrégé

Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

32.

Request modification for web security challenge

      
Numéro d'application 16730725
Numéro de brevet 11258820
Statut Délivré - en vigueur
Date de dépôt 2019-12-30
Date de la première publication 2020-05-07
Date d'octroi 2022-02-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Hansen, Marc R.

Abrégé

Techniques are provided for request modification for web security challenge. Data corresponding to a web page request by a client computing device for a web page is received. The web page comprises web code that allows a user to submit a request to initiate a web transaction with a web server system. Challenge code is generated that determines one or more values that are a valid solution to a challenge. The challenge code is provided for integrated code to be served in response to the web page request. The integrated code comprises the challenge code and modified web code that adds one or more parameters for the valid solution to the request. A particular request is received to initiate the web transaction. It is determined that the one or more parameter values are not a valid solution. In response, the web server system is prevented from processing the particular request.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/31 - Authentification de l’utilisateur
  • G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
  • H04L 67/01 - Protocoles

33.

Security code for integration with an application

      
Numéro d'application 16732123
Numéro de brevet 11139966
Statut Délivré - en vigueur
Date de dépôt 2019-12-31
Date de la première publication 2020-04-30
Date d'octroi 2021-10-05
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Schroeder, Carl
  • Hidayat, Ariya
  • Rentachintala, Chandrasekhar
  • Chiu, Ricky Y.

Abrégé

Techniques are provided for security code for integration with an application. A first request associated with a request by an application to an application server is received. The application includes security code that performs a set of one or more operations on one or more input parameters. The application is provided one or more parameter values, wherein the security code generates a secret cryptographic key based on the one or more parameter values. A security key is received that includes encrypted client data collected at the client device that is encrypted using the secret cryptographic key. The secret cryptographic key is generated based on the one or more parameter values and knowledge of the set of one or more operations. It is determined that the decrypted client data matches a pattern of data associated with malware. The application server is prevented from processing a second request.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/44 - Authentification de programme ou de dispositif
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES

34.

S

      
Numéro d'application 1519223
Statut Enregistrée
Date de dépôt 2019-10-16
Date d'enregistrement 2019-10-16
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely providing online non-downloadable machine learning software for users seeking to protect and secure computer systems.

35.

Deterministic reproduction of system state using seeded pseudo-random number generators

      
Numéro d'application 15060380
Numéro de brevet 10567363
Statut Délivré - en vigueur
Date de dépôt 2016-03-03
Date de la première publication 2020-02-18
Date d'octroi 2020-02-18
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Ficarra, Michael J.

Abrégé

Computer systems and methods for improving the security and efficiency of client computers interacting with server computers through an intermediary computer using one or more polymorphic protocols are discussed herein. In an embodiment, a computer system comprises a memory; one or more processors coupled to the memory and configured to: generate a modified identifier for a original object based on a original identifier and a nonce; render one or more instructions that include the nonce and define a modified object that corresponds to the original object and includes the modified identifier; send the one or more instructions to a client computer, wherein the one or more instructions, when executed by the client computer, are configured to cause the client computer to send a request from the client computer with the modified identifier and the nonce; receive, from the client computer, a request with a challenge identifier and a challenge nonce; generate a test identifier based on the original identifier and the challenge nonce; determine whether the test identifier matches the challenge identifier.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

36.

Caching for re-coding techniques

      
Numéro d'application 15224985
Numéro de brevet 10554777
Statut Délivré - en vigueur
Date de dépôt 2016-08-01
Date de la première publication 2020-02-04
Date d'octroi 2020-02-04
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Steele, Iii, Oscar H.
  • Call, Justin D.

Abrégé

This document describes, among other things, a computer-implemented method that can include receiving, from a web server system, web page code to be provided over the internet to a computing device. The web page code can correspond to a particular web page served by the web server system. The method may include generating an intermediate representation of at least a portion of the web page code, and comparing the intermediate representation to a prior intermediate representation of the particular web page. Based on a result of the comparison, the method can include determining what portion of the web page code to analyze for re-coding of the web page code before serving the web page code to the computing device.

Classes IPC  ?

  • G06F 17/20 - Manipulation de données en langage naturel
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 17/22 - Manipulation ou enregistrement au moyen de codes, p.ex. dans une séquence de caractères de texte
  • G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus

37.

SHAPE ENTERPRISE DEFENSE

      
Numéro d'application 1508659
Statut Enregistrée
Date de dépôt 2019-11-22
Date d'enregistrement 2019-11-22
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials.

38.

Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction

      
Numéro d'application 16553085
Numéro de brevet 11032243
Statut Délivré - en vigueur
Date de dépôt 2019-08-27
Date de la première publication 2019-12-26
Date d'octroi 2021-06-08
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Hansen, Marc

Abrégé

An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique UE identifier (“UEIN”) of the UE making the request. Using the UEIN, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue UEs while allowing for ordinary volumes of requests of requests the UEs, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/084 - Sécurité d'accès utilisant l’autorisation déléguée, p. ex. protocole d’autorisation ouverte [OAuth]
  • H04W 12/086 - Sécurité d'accès utilisant les domaines de sécurité
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 12/126 - Dispositions antivol, p. ex. protection contre le clonage de module d’identité d’abonné [SIM]

39.

SHAPE

      
Numéro d'application 1502200
Statut Enregistrée
Date de dépôt 2019-10-16
Date d'enregistrement 2019-10-16
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems.

40.

BLACKFISH

      
Numéro d'application 018161043
Statut Enregistrée
Date de dépôt 2019-12-03
Date d'enregistrement 2020-05-22
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (saas) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (saas) services featuring software for use by others featuring software for protecting and securing websites; software as a service (saas) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (saas) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (saas) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; Data security services; Computer security threat analysis for protecting data; IT security, protection and restoration; Computer security services for protection against illegal network access.

41.

Evaluating and modifying countermeasures based on aggregate transaction status

      
Numéro d'application 16533717
Numéro de brevet 11171925
Statut Délivré - en vigueur
Date de dépôt 2019-08-06
Date de la première publication 2019-11-28
Date d'octroi 2021-11-09
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Yang, Siying
  • Call, Justin D.

Abrégé

Techniques are provided for evaluating and modifying countermeasures based on aggregate transaction status. A first expression pattern is determined that occurs in each of first response messages served by the web server system in response to successful transactions of the transaction type. A second expression pattern is determined that occurs in each of second response messages served by the web server system in response to non-successful transactions of the transaction type requested. Aa status is determined for each of a plurality of transactions of the transaction type based on matching the first expression pattern or the second expression pattern to response messages served by the web server system. Aggregate status information for the transaction type based on the status for the set of operations is updated. Based on a change in the aggregate status information, a set of one or more security countermeasures is updated.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

42.

SHAPE DEFENSE

      
Numéro d'application 199512200
Statut Enregistrée
Date de dépôt 2019-11-11
Date d'enregistrement 2021-06-30
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

43.

SHAPE RECOGNIZE

      
Numéro d'application 199512300
Statut Enregistrée
Date de dépôt 2019-11-11
Date d'enregistrement 2021-06-30
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts and credentials

44.

Security systems for mitigating attacks from a headless browser executing on a client computer

      
Numéro d'application 16457589
Numéro de brevet 10798202
Statut Délivré - en vigueur
Date de dépôt 2019-06-28
Date de la première publication 2019-10-24
Date d'octroi 2020-10-06
Propriétaire Shape Security, Inc. (USA)
Inventeur(s) Li, Zhiwei

Abrégé

Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”. In an embodiment, a computer system comprises a memory; one or more processors coupled to the memory; a processor logic coupled to the memory and the one or more processors, and configured to: intercept, from a server computer, one or more original instructions to be sent to a browser of a client computer; send the one or more original instructions to the browser and one or more telemetry instructions, wherein the telemetry instructions are configured, when executed, to generate a set of telemetry data indicating one or more objects that were referenced by the browser and to send the set of telemetry data to the intermediary computer; receive the set of telemetry data and determine whether the browser is legitimate or illegitimate based on the set of telemetry data.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

45.

SHAPE DEFENSE

      
Numéro de série 88666259
Statut Enregistrée
Date de dépôt 2019-10-23
Date d'enregistrement 2020-05-19
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

46.

SHAPE RECOGNIZE

      
Numéro de série 88657371
Statut Enregistrée
Date de dépôt 2019-10-16
Date d'enregistrement 2021-06-08
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts and credentials

47.

SHAPE SECURITY

      
Numéro d'application 199590000
Statut Enregistrée
Date de dépôt 2019-10-08
Date d'enregistrement 2021-06-30
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others featuring software for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches.

48.

Split serving of computer code

      
Numéro d'application 16236520
Numéro de brevet 10567386
Statut Délivré - en vigueur
Date de dépôt 2018-12-30
Date de la première publication 2019-08-08
Date d'octroi 2020-02-18
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Idika, Nwokedi
  • Call, Justin D.

Abrégé

A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
  • G06F 8/60 - Déploiement de logiciel
  • G06F 21/31 - Authentification de l’utilisateur

49.

SHAPE SECURITY

      
Numéro d'application 1477069
Statut Enregistrée
Date de dépôt 2019-05-15
Date d'enregistrement 2019-05-15
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others featuring software for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches.

50.

Security policy for browser extensions

      
Numéro d'application 16236519
Numéro de brevet 10826872
Statut Délivré - en vigueur
Date de dépôt 2018-12-30
Date de la première publication 2019-07-11
Date d'octroi 2020-11-03
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Yang, Siying
  • Shekyan, Sergey

Abrégé

Techniques are provided for a security policy for browser extensions. A first pattern is determined that is present in requests from client computing devices when a first browser extension is operating on the client computing devices. The first pattern is identified in a first request from a first client computing device to a first web server system. It is determined, based on identifying the first pattern in the first request, that the first browser extension is associated with the first request. It is determined that the first browser extension associated with the first request is whitelisted with respect to the first web server system based on a security policy. In response to determining that the first browser extension is whitelisted with respect to the first web server system, a first automated response is performed that causes the first web server system to process the first request.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/44 - Authentification de programme ou de dispositif

51.

SHAPE CONNECT

      
Numéro d'application 197256300
Statut Enregistrée
Date de dépôt 2019-06-25
Date d'enregistrement 2021-06-30
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

52.

SHAPE ENTERPRISE DEFENSE

      
Numéro d'application 197256600
Statut Enregistrée
Date de dépôt 2019-06-25
Date d'enregistrement 2021-06-30
Propriétaire Shape Security, Inc. (a Delaware Corporation) (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

53.

SHAPE

      
Numéro d'application 197256100
Statut Enregistrée
Date de dépôt 2019-06-25
Date d'enregistrement 2022-11-09
Propriétaire Shape Security, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems

54.

SHAPE CONNECT

      
Numéro de série 88463234
Statut Enregistrée
Date de dépôt 2019-06-06
Date d'enregistrement 2019-12-03
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

55.

SHAPE ENTERPRISE DEFENSE

      
Numéro de série 88463241
Statut Enregistrée
Date de dépôt 2019-06-06
Date d'enregistrement 2019-12-17
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

56.

BLACKFISH

      
Numéro de série 88463231
Statut Enregistrée
Date de dépôt 2019-06-06
Date d'enregistrement 2020-06-23
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials; software as a service (SAAS) services, namely, providing security and threat detection to users seeking to protect and secure computer systems, accounts, and credentials

57.

Detection of malicious activity using behavior data

      
Numéro d'application 15986709
Numéro de brevet 11483324
Statut Délivré - en vigueur
Date de dépôt 2018-05-22
Date de la première publication 2019-05-30
Date d'octroi 2022-10-25
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Xu, Ye
  • Zhao, Yao
  • Wang, Xinran
  • Overson, Jarrod

Abrégé

Techniques are provided for detection of malicious activity using behavior data. A behavior model is trained with behavior data generated in association with a plurality of requests. Data is received that describes a particular request from a particular client device to a server system hosting a website. The data includes particular behavior data generated at the particular client device in association with the particular request. The particular behavior data is analyzed using the behavior model to generate a behavior model result. An automation determination for the particular request is generated based on the behavior model result. The particular request is handled based on the automation determination for the particular request.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 20/00 - Apprentissage automatique

58.

S

      
Numéro de série 88444369
Statut Enregistrée
Date de dépôt 2019-05-23
Date d'enregistrement 2020-06-30
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems

59.

SHAPE

      
Numéro de série 88444380
Statut Enregistrée
Date de dépôt 2019-05-23
Date d'enregistrement 2019-12-03
Propriétaire Shape Security, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software as a service (SAAS) services featuring software for use by others for detecting, monitoring, and preventing network security risks and privacy risks; software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; software as a service (SAAS) services, namely, providing machine learning based security and threat detection to users seeking to protect and secure computer systems

60.

Systems for detecting a headless browser executing on a client computer

      
Numéro d'application 14859084
Numéro de brevet 10298599
Statut Délivré - en vigueur
Date de dépôt 2015-09-18
Date de la première publication 2019-05-21
Date d'octroi 2019-05-21
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Zhang, Bei
  • Shekyan, Sergey

Abrégé

In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browser is a legitimate browser, or a headless browser, based, at least in part, on the result.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

61.

Mitigating attacks on server computers by enforcing platform policies on client computers

      
Numéro d'application 16190015
Numéro de brevet 10447726
Statut Délivré - en vigueur
Date de dépôt 2018-11-13
Date de la première publication 2019-03-14
Date d'octroi 2019-10-15
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Yang, Siying
  • Ghosemajumder, Shuman

Abrégé

In an embodiment, a computer system is configured to receive, from a client computer, a request with one or more values; determine, based on the one or more values, whether the request is from a platform-specific application compiled for a first computer platform; determine, based on the one or more values, whether the platform-specific application is being executed within an emulator being executed by a second computer platform, wherein the second computer platform is different than the first computer platform.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

62.

Count-based challenge-response credential pairs for client/server request validation

      
Numéro d'application 15249133
Numéro de brevet 10225255
Statut Délivré - en vigueur
Date de dépôt 2016-08-26
Date de la première publication 2019-03-05
Date d'octroi 2019-03-05
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Jampani, Ganesh
  • Irwan, Susanto

Abrégé

Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”. In an embodiment, a server computer system that is programmed to validate requests from a client computer to a server computer, the server computer system comprising: a memory persistently storing a set of server instructions; one or more processors coupled to the memory, wherein the one or more processors execute the set of server instructions, which causes the one or more processors to: generate a first challenge credential to be sent to the client computer, wherein the first challenge credential corresponds to a first response credential in a first challenge-response credential pair; render one or more first dynamic-credential instructions, which when executed by the client computer, cause the client computer to generate the first response credential in the first challenge-response credential pair; send, to the client computer, the first challenge credential and the one or more first dynamic-credential instructions, but not the first response credential; receive a first request that includes a first test-challenge credential and a first test-response credential; determine whether the first test-challenge credential and the first test-response credential are the first challenge-response credential pair; in response to determining that the first test-response credential is the first response credential, determine that a first count is associated with the first challenge-response credential pair, and determine whether the first count satisfies a first threshold; in response to determining that the first count does not satisfy the first threshold, determine that the first request is not a replay request and assign a second count to the first challenge-response credential pair.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

63.

Intercepting and injecting calls into operations and objects

      
Numéro d'application 15069667
Numéro de brevet 10216488
Statut Délivré - en vigueur
Date de dépôt 2016-03-14
Date de la première publication 2019-02-26
Date d'octroi 2019-02-26
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Overson, Jarrod
  • Yang, Siying

Abrégé

A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer. The intermediary computer transforms the first party operations into transformed first party operations by substituting the first set of operations with the second set of operations. The intermediary computer generates a second set of source code instructions that are based on the first set of source code instructions and the transformed first party operations. The intermediary computer then sends the second set of source code instructions to the client computer.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 8/30 - Création ou génération de code source
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

64.

Browser extension firewall

      
Numéro d'application 14942769
Numéro de brevet 10212130
Statut Délivré - en vigueur
Date de dépôt 2015-11-16
Date de la première publication 2019-02-19
Date d'octroi 2019-02-19
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Yang, Siying
  • Shekyan, Sergey

Abrégé

Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

65.

Blind hash compression

      
Numéro d'application 14980231
Numéro de brevet 10212137
Statut Délivré - en vigueur
Date de dépôt 2015-12-28
Date de la première publication 2019-02-19
Date d'octroi 2019-02-19
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Moen, Daniel G.
  • Hanks, Bryan D.

Abrégé

A computer-implemented method includes serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES

66.

Detecting attacks against a server computer based on characterizing user interactions with the client computing device

      
Numéro d'application 15645787
Numéro de brevet 10187408
Statut Délivré - en vigueur
Date de dépôt 2017-07-10
Date de la première publication 2019-01-22
Date d'octroi 2019-01-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Call, Justin D.
  • Wang, Xinran
  • Zhao, Yao
  • Peacock, Timothy Dylan

Abrégé

A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

67.

SECURE DETECTION AND MANAGEMENT OF COMPROMISED CREDENTIALS

      
Numéro d'application US2018040500
Numéro de publication 2019/010101
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de publication 2019-01-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Jin, Zhipu
  • Agrawal, Gautam
  • Moen, Daniel
  • Liang, Weiguo
  • Wang, Xingang

Abrégé

Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

68.

DETECTING COMPROMISED CREDENTIALS IN A CREDENTIAL STUFFING ATTACK

      
Numéro d'application US2018040499
Numéro de publication 2019/010100
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de publication 2019-01-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Moen, Daniel
  • Schroeder, Carl

Abrégé

Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes

69.

Detecting compromised credentials in a credential stuffing attack

      
Numéro d'application 16024691
Numéro de brevet 11044261
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de la première publication 2019-01-03
Date d'octroi 2021-06-22
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Moen, Daniel G
  • Schroeder, Carl

Abrégé

Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06N 20/00 - Apprentissage automatique

70.

Secure detection and management of compromised credentials using a salt and a set model

      
Numéro d'application 16025918
Numéro de brevet 10911438
Statut Délivré - en vigueur
Date de dépôt 2018-07-02
Date de la première publication 2019-01-03
Date d'octroi 2021-02-02
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Jin, Zhipu
  • Agrawal, Gautam
  • Moen, Daniel G.
  • Liang, Weiguo
  • Wang, Xingang

Abrégé

Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

71.

Mitigating security vulnerabilities in web content

      
Numéro d'application 16042891
Numéro de brevet 10397265
Statut Délivré - en vigueur
Date de dépôt 2018-07-23
Date de la première publication 2019-01-03
Date d'octroi 2019-08-27
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Shekyan, Sergey
  • Coates, Michael
  • Hales, Wesley
  • Peacock, Tim
  • Call, Justin

Abrégé

Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

72.

Blocking automated attacks with forced user interaction

      
Numéro d'application 16102716
Numéro de brevet 10397187
Statut Délivré - en vigueur
Date de dépôt 2018-08-13
Date de la première publication 2018-12-13
Date d'octroi 2019-08-27
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Hansen, Marc

Abrégé

An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique UE identifier (“UEIN”) of the UE making the request. Using the UEIN, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue UEs while allowing for ordinary volumes of requests of requests the UEs, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/08 - Sécurité d'accès
  • H04W 12/12 - Détection ou prévention de fraudes

73.

Mitigating attacks on server computers by enforcing platform policies on client computers

      
Numéro d'application 15068468
Numéro de brevet 10129289
Statut Délivré - en vigueur
Date de dépôt 2016-03-11
Date de la première publication 2018-11-13
Date d'octroi 2018-11-13
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Yang, Siying
  • Ghosemajumder, Shuman

Abrégé

In an embodiment, a computer system is configured to receive, from a client computer, a request with one or more values; determine, based on the one or more values, whether the request is from a platform-specific application compiled for a first computer platform; determine, based on the one or more values, whether the platform-specific application is being executed within an emulator being executed by a second computer platform, wherein the second computer platform is different than the first computer platform.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

74.

Client/server security by an intermediary rendering modified in-memory objects

      
Numéro d'application 16024621
Numéro de brevet 11088995
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de la première publication 2018-10-25
Date d'octroi 2021-08-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Call, Justin

Abrégé

In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

75.

Security systems for mitigating attacks from a headless browser executing on a client computer

      
Numéro d'application 15968573
Numéro de brevet 10367903
Statut Délivré - en vigueur
Date de dépôt 2018-05-01
Date de la première publication 2018-09-06
Date d'octroi 2019-07-30
Propriétaire Shape Security, Inc. (USA)
Inventeur(s) Li, Zhiwei

Abrégé

Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”. In an embodiment, a computer system comprises a memory; one or more processors coupled to the memory; a processor logic coupled to the memory and the one or more processors, and configured to: intercept, from a server computer, one or more original instructions to be sent to a browser of a client computer; send the one or more original instructions to the browser and one or more telemetry instructions, wherein the telemetry instructions are configured, when executed, to generate a set of telemetry data indicating one or more objects that were referenced by the browser and to send the set of telemetry data to the intermediary computer; receive the set of telemetry data and determine whether the browser is legitimate or illegitimate based on the set of telemetry data.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

76.

Polymorphic obfuscation of executable code

      
Numéro d'application 15756557
Numéro de brevet 10382482
Statut Délivré - en vigueur
Date de dépôt 2016-08-30
Date de la première publication 2018-08-30
Date d'octroi 2019-08-13
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Yang, Siying
  • Overson, Jarrod
  • Vinegar, Ben
  • Zhang, Bei

Abrégé

This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes

77.

Detecting man-in-the-browser attacks

      
Numéro d'application 15959920
Numéro de brevet 10341380
Statut Délivré - en vigueur
Date de dépôt 2018-04-23
Date de la première publication 2018-08-23
Date d'octroi 2019-07-02
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Zhao, Yao
  • Wang, Xinran

Abrégé

Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the purpose of combatting Man-in-the-Browser (MitB) attacks.

Classes IPC  ?

  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques

78.

Management of calls to transformed operations and objects

      
Numéro d'application 15945944
Numéro de brevet 10652275
Statut Délivré - en vigueur
Date de dépôt 2018-04-05
Date de la première publication 2018-08-09
Date d'octroi 2020-05-12
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Zhou, Xiaoming
  • Hoover, Roger
  • Shekyan, Sergey
  • Call, Justin

Abrégé

In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 9/54 - Communication interprogramme
  • G06F 21/12 - Protection des logiciels exécutables
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

79.

Code modification for automation detection

      
Numéro d'application 15925748
Numéro de brevet 10536479
Statut Délivré - en vigueur
Date de dépôt 2018-03-19
Date de la première publication 2018-07-26
Date d'octroi 2020-01-14
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Call, Justin D
  • Zhou, Xiaoming
  • Huang, Xiaohan
  • Varadarajan, Subramanian
  • Hoover, Roger S.

Abrégé

Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

80.

Deterministic reproduction of client/server computer state or output sent to one or more client computers

      
Numéro d'application 15919034
Numéro de brevet 10212173
Statut Délivré - en vigueur
Date de dépôt 2018-03-12
Date de la première publication 2018-07-19
Date d'octroi 2019-02-19
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Ficarra, Michael J.

Abrégé

Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

81.

OBFUSCATING SOURCE CODE SENT, FROM A SERVER COMPUTER, TO A BROWSER ON A CLIENT COMPUTER

      
Numéro d'application US2017064336
Numéro de publication 2018/102767
Statut Délivré - en vigueur
Date de dépôt 2017-12-01
Date de publication 2018-06-07
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Gibbons, Kevin
  • Disney, Tim
  • Ficarra, Michael, J.

Abrégé

Programs written in interpreted languages, such as JavaScript, are distributed in source form, which is helpful to attackers so that they can more easily derive the purposes and effects of a program. As discussed herein, a program's high-level code may be effectively obfuscated by transforming the program's code from its high-level programming language to low-level processor-specific language, such as x86 instructions for x86 processors, JVM bytecode for JVMs, or proprietary opcodes for a corresponding proprietary processor or interpreter. Additional obfuscation techniques can be applied the program's low-level processor-specific code.

Classes IPC  ?

  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p. ex. par masquage
  • G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet

82.

Reliable selection of security countermeasures

      
Numéro d'application 15805073
Numéro de brevet 10333924
Statut Délivré - en vigueur
Date de dépôt 2017-11-06
Date de la première publication 2018-05-31
Date d'octroi 2019-06-25
Propriétaire Shape Security, Inc. (USA)
Inventeur(s) Yang, Siying

Abrégé

Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p. ex. par masquage
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

83.

Challenge-dynamic credential pairs for client/server request validation

      
Numéro d'application 15563509
Numéro de brevet 10708249
Statut Délivré - en vigueur
Date de dépôt 2016-02-16
Date de la première publication 2018-03-29
Date d'octroi 2020-07-07
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Hidayat, Ariya
  • Call, Justin

Abrégé

In an embodiment, a computer system configured to: generate a first challenge credential to be sent to a client computer; render one or more first dynamic-credential instructions, which when executed by the client computer, cause the client computer to generate a first dynamic credential that corresponds to the first challenge credential; modify a first set of instructions, which define one or more original operations, to produce a second set of instructions, wherein the second set of instructions include the first challenge credential and the one or more first dynamic-credential instructions, and which when executed by the client computer, cause the first challenge credential to be included in the one or more requests sent from the client computer; send the second set of instructions to a second computer.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/44 - Authentification de programme ou de dispositif
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

84.

Client/server security by executing instructions and rendering client application instructions

      
Numéro d'application 15808504
Numéro de brevet 10834082
Statut Délivré - en vigueur
Date de dépôt 2017-11-09
Date de la première publication 2018-03-15
Date d'octroi 2020-11-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Call, Justin

Abrégé

In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

85.

Securing web page content

      
Numéro d'application 15791291
Numéro de brevet 10033755
Statut Délivré - en vigueur
Date de dépôt 2017-10-23
Date de la première publication 2018-02-15
Date d'octroi 2018-07-24
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Shekyan, Sergey
  • Coates, Michael
  • Hales, Wesley
  • Peacock, Tim
  • Call, Justin

Abrégé

Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet

86.

Using instrumentation code to detect bots or malware

      
Numéro d'application 15785309
Numéro de brevet 10193909
Statut Délivré - en vigueur
Date de dépôt 2017-10-16
Date de la première publication 2018-02-08
Date d'octroi 2019-01-29
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Call, Justin D.
  • Huang, Xiaohan
  • Zhou, Xiaoming
  • Varadarajan, Subramanian
  • Hansen, Marc R.

Abrégé

Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.

Classes IPC  ?

  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p. ex. par masquage
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source

87.

Modifying authentication for an application programming interface

      
Numéro d'application 15671017
Numéro de brevet 10834050
Statut Délivré - en vigueur
Date de dépôt 2017-08-07
Date de la première publication 2018-01-25
Date d'octroi 2020-11-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Call, Justin D.
  • Peacock, Timothy D.

Abrégé

Application programming interfaces (APIs) can be unintentionally exposed and allow for potentially undesirable use of corporate resources. An API call filtering system configured to monitor API call requests received via an endpoint and API call responses received via a supporting service of an API or web service. The API call filtering system enables enterprises to improve their security posture by identifying, studying, reporting, and securing their APIs within their enterprise network.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 9/54 - Communication interprogramme
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

88.

Client-side security key generation

      
Numéro d'application 15640399
Numéro de brevet 10567171
Statut Délivré - en vigueur
Date de dépôt 2017-06-30
Date de la première publication 2018-01-04
Date d'octroi 2020-02-18
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Schroeder, Carl
  • Hidayat, Ariya
  • Rentachintala, Chandrasekhar
  • Chiu, Ricky Y.

Abrégé

Techniques are provided for client-side security key generation. An initial request is received from an application executing on a client device. The application includes a security component includes security code. In response to the initial request, a key component is generated. The key component includes one or more parameters from which a valid security key can be generated at the client device by executing the security code. The key component is provided to the client device. A security key associated with a request from the client device to an application server is received. The security key is checked for validity. In response to determining that the security key is valid, processing of the request by the application server is caused.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire

89.

CLIENT-SIDE SECURITY KEY GENERATION

      
Numéro d'application US2017040148
Numéro de publication 2018/005893
Statut Délivré - en vigueur
Date de dépôt 2017-06-29
Date de publication 2018-01-04
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Schroeder, Carl
  • Hidayat, Ariya
  • Rentachintala, Chandrasekhar
  • Chiu, Ricky

Abrégé

Techniques are provided for client-side security key generation. An initial request is received from an application executing on a client device. The application includes a security component includes security code. In response to the initial request, a key component is generated. The key component includes one or more parameters from which a valid security key can be generated at the client device by executing the security code. The key component is provided to the client device. A security key associated with a request from the client device to an application server is received. The security key is checked for validity. In response to determining that the security key is valid, processing of the request by the application server is caused.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06F 21/31 - Authentification de l’utilisateur

90.

Encoding of sensitive data

      
Numéro d'application 14286324
Numéro de brevet 09858440
Statut Délivré - en vigueur
Date de dépôt 2014-05-23
Date de la première publication 2018-01-02
Date d'octroi 2018-01-02
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Wang, Xinran
  • Zhao, Yao

Abrégé

A computer-implemented method, the method includes identifying a piece of data to be served from a server system to a client device that is remote from the server system; creating a plurality of expressions that, when executed, provide a result that corresponds to the piece of data; and providing the plurality of expressions to the client device with code for executing the plurality of expressions.

Classes IPC  ?

  • G06F 21/10 - Protection de programmes ou contenus distribués, p. ex. vente ou concession de licence de matériel soumis à droit de reproduction
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

91.

Coordinated application of security policies

      
Numéro d'application 14596944
Numéro de brevet 09825995
Statut Délivré - en vigueur
Date de dépôt 2015-01-14
Date de la première publication 2017-11-21
Date d'octroi 2017-11-21
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Schroeder, Carl
  • Call, Justin D.
  • Yang, Siying

Abrégé

A computer-implemented method includes receiving, at a first server sub-system, content served to a client computing device; transcoding, with the first server sub-system, the received content using a policy received from a second security sub-system; determining, with the first server sub-system that the second server sub-system has likely ceased operating properly; receiving a request to vote on a leader server sub-system from one or more server sub-systems, and voting for from of the one or more server sub-systems; and subsequently transcoding received content according to a policy received from another of the server sub-systems that is not the second server sub-system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

92.

Management of dynamic credentials

      
Numéro d'application 15658129
Numéro de brevet 11552936
Statut Délivré - en vigueur
Date de dépôt 2017-07-24
Date de la première publication 2017-11-09
Date d'octroi 2023-01-10
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Call, Justin
  • Varadarajan, Subramanian
  • Hanks, Bryan

Abrégé

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.

Classes IPC  ?

  • G06F 21/44 - Authentification de programme ou de dispositif
  • H04L 9/08 - Répartition de clés
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

93.

Intercepting and supervising calls to transformed operations and objects

      
Numéro d'application 15651303
Numéro de brevet 10044753
Statut Délivré - en vigueur
Date de dépôt 2017-07-17
Date de la première publication 2017-11-02
Date d'octroi 2018-08-07
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Zhou, Xiaoming
  • Hoover, Roger
  • Shekyan, Sergey
  • Call, Justin

Abrégé

In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • G06F 9/00 - Dispositions pour la commande par programme, p. ex. unités de commande
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 9/54 - Communication interprogramme
  • G06F 21/12 - Protection des logiciels exécutables
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

94.

APPLYING BYTECODE OBFUSCATION TECHNIQUES TO PROGRAMS WRITTEN IN AN INTERPRETED LANGUAGE

      
Numéro d'application US2017021409
Numéro de publication 2017/156158
Statut Délivré - en vigueur
Date de dépôt 2017-03-08
Date de publication 2017-09-14
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Ficarra, Michael, J.
  • Gibbons, Kevin

Abrégé

In an embodiment, a computer system configured to improve security of client computer interacting with server computers comprises one or more processors; a digital electronic memory storing a set of program instructions which when executed using the one or more processors cause the one or more processors to: process a first set of original instructions that produce a first set of outputs or effects; generate a first set of interpreter instructions that define a first interpreter; generate a first set of alternate instructions from the first set of original instructions, wherein the first set of alternate instructions is functionally equivalent to the first set of original instructions when the first set of alternate instructions is executed by the first interpreter; send, to the first client computer, the first set of alternate instructions and the first set of interpreter instructions.

Classes IPC  ?

  • G06F 9/45 - Compilation ou interprétation de langages de programmation évolués

95.

VARIABLE RUNTIME TRANSPILATION

      
Numéro d'application US2017018747
Numéro de publication 2017/151352
Statut Délivré - en vigueur
Date de dépôt 2017-02-21
Date de publication 2017-09-08
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Overson, Jarrod S.
  • Hidayat, Ariya
  • Ficarra, Michael
  • Zhang, Bei
  • Call, Justin

Abrégé

In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

96.

DETERMINISTIC REPRODUCTION OF CLIENT/SERVER COMPUTER STATE OR OUTPUT SENT TO ONE OR MORE CLIENT COMPUTERS

      
Numéro d'application US2017020660
Numéro de publication 2017/152050
Statut Délivré - en vigueur
Date de dépôt 2017-03-03
Date de publication 2017-09-08
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Ficarra, Michael J.

Abrégé

Computer systems and methods for improving security or performance of client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet

97.

Variable runtime transpilation

      
Numéro d'application 15059080
Numéro de brevet 10855696
Statut Délivré - en vigueur
Date de dépôt 2016-03-02
Date de la première publication 2017-09-07
Date d'octroi 2020-12-01
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Overson, Jarrod S.
  • Hidayat, Ariya
  • Ficarra, Michael
  • Zhang, Bei
  • Call, Justin

Abrégé

In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

98.

Deterministic reproduction of client/server computer state or output sent to one or more client computers

      
Numéro d'application 15060322
Numéro de brevet 09917850
Statut Délivré - en vigueur
Date de dépôt 2016-03-03
Date de la première publication 2017-09-07
Date d'octroi 2018-03-13
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s) Ficarra, Michael J.

Abrégé

Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.

Classes IPC  ?

  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

99.

REVERSE PROXY COMPUTER: DEPLOYING COUNTERMEASURES IN RESPONSE TO DETECTING AN AUTONOMOUS BROWSER EXECUTING ON A CLIENT COMPUTER

      
Numéro d'application US2017017564
Numéro de publication 2017/139709
Statut Délivré - en vigueur
Date de dépôt 2017-02-10
Date de publication 2017-08-17
Propriétaire SHAPE SECURITY, INC. (USA)
Inventeur(s)
  • Mattson, Eli
  • Schroeder, Carl
  • Zhang, Bei
  • Shekyan, Sergey
  • Saghafi, Salman
  • Overson, Jarrod
  • Ellis, Lewis

Abrégé

A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

100.

Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer

      
Numéro d'application 15430224
Numéro de brevet 10326790
Statut Délivré - en vigueur
Date de dépôt 2017-02-10
Date de la première publication 2017-08-17
Date d'octroi 2019-06-18
Propriétaire Shape Security, Inc. (USA)
Inventeur(s)
  • Mattson, Eli
  • Schroeder, Carl
  • Zhang, Bei
  • Shekyan, Sergey
  • Saghafi, Salman
  • Overson, Jarrod
  • Ellis, Lewis

Abrégé

A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/60 - Protection de données
  1     2        Prochaine page