CA, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 2 293 pour CA, Inc. et 5 filiales Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 2 102
        Marque 191
Juridiction
        États-Unis 2 147
        Canada 70
        Europe 49
        International 27
Propriétaire / Filiale
[Owner] CA, Inc. 2 203
Veracode, Inc. 78
Base Technologies, Inc. 5
Sterling Software, Inc., a Delaware Corporation, 4
NetQoS, Inc. (a Texas corporation) 2
Voir plus
Date
Nouveautés (dernières 4 semaines) 1
2026 mars (MACJ) 1
2026 (AACJ) 1
2025 12
2024 10
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 656
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet 231
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 201
G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement 183
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes 164
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 157
42 - Services scientifiques, technologiques et industriels, recherche et conception 73
16 - Papier, carton et produits en ces matières 35
38 - Services de télécommunications 16
35 - Publicité; Affaires commerciales 12
Voir plus
Statut
En Instance 20
Enregistré / En vigueur 2 273
  1     2     3     ...     23        Prochaine page

1.

AI CONVERSATION DRIVEN LOGIN

      
Numéro d'application 18822601
Statut En instance
Date de dépôt 2024-09-03
Date de la première publication 2026-03-05
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Schmid, Johannes
  • Milzarek, René Fred

Abrégé

A login agent interacts with a foundation model(s) until successful login to an application or an assessment of a failed login can be obtained. Initially, a web page corresponding to login for a web application will be indicated to the login agent. The login agent captures interactive elements of the web page. The login agent prompts a foundation model(s) to select which of the captured interactive elements to interact with and how to interact with the selected elements. The login agent determines commands based on the response(s) and, with the commands, uses a tool to automatically interact with the web page via a browser. The login agent captures a web page resulting from the user emulated interaction and prompts the foundation model(s) to determine whether log in was successful or failed. The response from the foundation model(s) guides the login agent to either retry login or report results.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

2.

DEVELOPMENT PIPELINE INTEGRATED ONGOING LEARNING FOR ASSISTED CODE REMEDIATION

      
Numéro d'application 19193769
Statut En instance
Date de dépôt 2025-04-29
Date de la première publication 2025-08-14
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Xiao, Hao
  • Chua, Hendy Heng Lee
  • Foo, Darius Tsien Wei

Abrégé

With invocations of a software development pipeline, organization specific remediations/fixes for a software project can be learned from scanning results of code submissions (e.g., commits or merges) across an organization for a software project(s). Fixes of detected program code flaws can be detected and/or specified across scans and associated with flaw identifiers and used for training machine learning models to identify candidate fixes for detected flaws. This ongoing learning during development propagates fixes created or chosen by experts (e.g., software engineers working on the software project) relevant to the software project. The experts can choose from suggestions mined from the learned fixes of the organization and suggestions generated from a pipeline created with the trained machine learning models. The selections are then used for further training of the machine learning models that form the pipeline.

Classes IPC  ?

  • G06F 11/362 - Débogage de logiciel
  • G06F 8/30 - Création ou génération de code source
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 3/0464 - Réseaux convolutifs [CNN, ConvNet]
  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 3/09 - Apprentissage supervisé
  • G06N 20/00 - Apprentissage automatique

3.

SOFTWARE DEFINED WIDE AREA NETWORK MANAGEMENT WITHIN APPLICATION PROGRAMMING INTERFACE RATE LIMITS

      
Numéro d'application 18428848
Statut En instance
Date de dépôt 2024-01-31
Date de la première publication 2025-07-31
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Mortha, Srinivas
  • Chevendra, Naga Naveen
  • Kakani, Balram Reddy

Abrégé

The technical solutions can provide a timely and consistent monitoring of SD-WAN by combining network topology data acquired via API calls with SD-WAN performance data gathered from one or more network communication protocols. A solution can include a system, having one or more processors coupled with memory to receive, responsive to BFD monitoring, BFD session data in a first format. The BFD session data can correspond to a tunnel between devices of a SD-WAN. The one or more processors can receive, responsive to IPFIX monitoring, flow metrics in a second format, the flow metrics corresponding to one or more flows of a network traffic traversing the tunnel. The one or more processors can aggregate the BFD session data and the flow metrics into aggregated metrics according to a third format and determine an action to take based at least on the aggregated metrics in the third format.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route

4.

APPARATUS FOR SECURE NETWORK COMMUNICATIONS

      
Numéro d'application 18944252
Statut En instance
Date de dépôt 2024-11-12
Date de la première publication 2025-07-24
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Du Toit, Roelof
  • Tomic, Gary
  • Taft, James

Abrégé

An embodiment of the present invention describes means by which a proxy can maintain visibility between a client and a server when the client initiates a Transport Layer Security connection with Encrypted Client Hello (ECH). The proxy uses intelligence data has the ability to identify connections between clients and servers that are utilizing the Encrypted Client Hello extension to Transport Layer Security (TLS) Protocol Version 1.3 and triggers the client to fallback to utilizing a new connection that does not utilize ECH. This preserves the proxy's ability to determine the true destination of the client and identify the risks and characteristics of the request and response and act based on the administrator's authored policy.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

5.

GENERATING AN EFFICIENT GRAPH DATABASE FOR RELATIONSHIP QUERYING AND CYBERSECURITY ANALYSIS

      
Numéro d'application 19012397
Statut En instance
Date de dépôt 2025-01-07
Date de la première publication 2025-07-10
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Clements, Cody Allan
  • Lang, Louis
  • Freitag, Eric
  • Donoughe, Matthew

Abrégé

In an embodiment, a method for generating a graph database includes identifying at least one new package in at least one source database and generating a download request associated with the at least one new package. The method includes, based on the download request, downloading the at least one new package from the at least one source database associated with the at least one new package. The method includes preprocessing the at least one new package to define at least one text representation of the at least one new package. The method includes cataloging the at least one new package based on the at least one text representation and generating a graph database based on the cataloged at least one package.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage

6.

Unified topology across domains

      
Numéro d'application 18497503
Numéro de brevet 12413478
Statut Délivré - en vigueur
Date de dépôt 2023-10-30
Date de la première publication 2025-05-01
Date d'octroi 2025-09-09
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Mortha, Srinivas
  • Chevendra, Naga Naveen

Abrégé

A device to detect a first piece of equipment of a plurality of pieces of equipment, identify a first node of a plurality of nodes that represents the first piece of equipment of the plurality of pieces of equipment, receive an identification of the first piece of equipment of the plurality of pieces of equipment, update a record to include the identification of the first piece of equipment of the plurality of pieces of equipment and an indication that the first node of the plurality of nodes represents the first piece of equipment of the plurality of pieces of equipment, determine that a second piece of equipment of the plurality of pieces of equipment is absent from a first section of the plurality of sections, and query one or more devices of a plurality of devices to identify the second piece of equipment of the plurality of pieces of equipment.

Classes IPC  ?

  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

7.

AUTO-FIXING CODE VULNERABILITIES WITH ARTIFICIAL INTELLIGENCE

      
Numéro d'application 18973698
Statut En instance
Date de dépôt 2024-12-09
Date de la première publication 2025-04-03
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rudenko, Roman
  • Bacher, Anna

Abrégé

A generative artificial intelligence (AI) driven code fixing pipeline has been created that uses a large language model (LLM) to recommend fixes for vulnerabilities detected in program code. A scanner generates indications of flaws in program code and weakness types for those flaws. One or more example code pairs are retrieved based on weakness type and programming language, an example code pair including an example flaw and an example fix of that flaw. The LLM is then prompted with a code fragment corresponding to a detected vulnerability, context for the code fragment, and the one or more example code pairs to generate a modification of existing program code that fixes the vulnerability.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06F 8/35 - Création ou génération de code source fondée sur un modèle
  • G06F 8/36 - Réutilisation de logiciel
  • G06N 20/00 - Apprentissage automatique

8.

SYSTEM AND METHOD FOR CANVAS SANITIZATION

      
Numéro d'application 18479358
Statut En instance
Date de dépôt 2023-10-02
Date de la première publication 2025-04-03
Propriétaire CA, Inc. (USA)
Inventeur(s) Back, Ophir

Abrégé

Novel systems and methods for canvas sanitization are provided. In various embodiments, a system and method include: receiving a request to open a web page from a client device; replacing, via an agent, a first function with a second function, the agent being loaded to a browser; loading the web page from a web server to the browser; in response to an attempt to perform the first function on the web page, performing, via the browser, the second function corresponding to the first function to generate a drawing for a predetermined period of time; converting, via the agent, the drawing to an image; and transmitting the image to the client device. Other aspects, embodiments, and features are also claimed and described.

Classes IPC  ?

  • G06F 40/14 - Documents en configuration arborescente
  • G06T 11/00 - Génération d'images bidimensionnelles [2D]

9.

PROVIDING ENCRYPTED END-TO-END EMAIL DELIVERY BETWEEN SECURE EMAIL CLUSTERS

      
Numéro d'application 18465285
Statut En instance
Date de dépôt 2023-09-12
Date de la première publication 2025-03-13
Propriétaire CA, Inc. (USA)
Inventeur(s) Biswas, Dhrubojyoti

Abrégé

The systems and methods described provide a seamless end-to-end email delivery between secure email clusters without reliance on prior sharing of encryption keys or protocol configurations. The solution can receive a request to transmit an email to a recipient identified by a domain of the recipient. The solution can transmit a first query to a domain name service (DNS) to fetch one or more records corresponding to the domain of the recipient. The one or more records can identify a key service. The solution can receive, from the key service responsive to a second query to the key service, a key for encrypting the email. The solution can encrypt at least a portion of the email based at least on the key and transmit the encrypted email to the recipient.

Classes IPC  ?

  • G06F 21/60 - Protection de données
  • H04L 51/48 - Adressage des messages, p. ex. format des adresses ou messages anonymes, alias

10.

Network security device

      
Numéro d'application 18362881
Numéro de brevet 12407653
Statut Délivré - en vigueur
Date de dépôt 2023-07-31
Date de la première publication 2025-02-06
Date d'octroi 2025-09-02
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Du Toit, Roelof Nico
  • Tomic, Gary
  • Zuercher, Chris
  • Elkadri, Nour Alhouda

Abrégé

Operations of a security device are provided herein. The operations may include receiving, via a first network interface, a network packet, and evaluating attributes of the received network packet against a ruleset to identify a first rule match, wherein the attributes comprise an identifier of the first network interface, a source address, and a destination address. The operations may further include comparing the attributes of the received network packet against a table listing one or more network devices associated with the first network interface or a second network interface. The operations may further include switching the attributes of the received network packet by changing the identifier of the first network interface to an identifier of the second network interface and swapping the source address and the destination address, and evaluating the switched attributes of the received network packet against the ruleset to identify a second rule match. The switched attributes of the received network packet may be compared against the table, and one of the first rule match or the second rule match may be selected based on the comparisons of the network packet attributes and the switched network packet attributes against the table. The received network packet may be processed according to the selected one of the first rule match or the second rule match.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

11.

Monitoring network volatility

      
Numéro d'application 18362920
Numéro de brevet 12192083
Statut Délivré - en vigueur
Date de dépôt 2023-07-31
Date de la première publication 2025-01-07
Date d'octroi 2025-01-07
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Cosgrove, David
  • Murdough, John
  • Normandin, Jason
  • Diep, Tim

Abrégé

Novel solutions for monitoring and analyzing networks in terms of the volatility of various devices. Some solutions consider a weighted set of metrics in determining such volatility. Evaluation of devices against peers in view of these factors can produce insight about network conditions.

Classes IPC  ?

  • H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
  • H04L 43/062 - Génération de rapports liés au trafic du réseau

12.

Generative artificial intelligence driven software fixing

      
Numéro d'application 18464436
Numéro de brevet 12229040
Statut Délivré - en vigueur
Date de dépôt 2023-09-11
Date de la première publication 2025-01-02
Date d'octroi 2025-02-18
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rudenko, Roman
  • Bacher, Anna

Abrégé

A generative artificial intelligence (AI) driven code fixing pipeline has been created that uses a transformer-based large language model (LLM) to patch flawed program code. A pre-trained LLM is fine-tuned to generate a response that is a modified version of a code fragment in a prompt to the pre-trained model. After fine-tuning, the pre-trained LLM (hereinafter “code fix model”) is integrated into a pipeline that includes a program code cybersecurity scanner and a prompt generator. The scanner generates indications of flaws in program code and weakness types for those flaws. These indications flow into the prompt generator. The prompt generator retrieves reference code pairs based on weakness type and programming language to generate a batch of prompts to run inference on with the code fix model. The responses generated by the code fix model are presented as patching alternatives.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06F 8/35 - Création ou génération de code source fondée sur un modèle
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 11/362 - Débogage de logiciel
  • G06N 20/00 - Apprentissage automatique

13.

Machine learning model based ranking of generated code

      
Numéro d'application 18464536
Numéro de brevet 12566593
Statut Délivré - en vigueur
Date de dépôt 2023-09-11
Date de la première publication 2025-01-02
Date d'octroi 2026-03-03
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rudenko, Roman
  • Bacher, Anna

Abrégé

A generative AI based pipeline has been created that ranks generated responses that are candidate software patches. The ranking is based on predicted quality measures of code fragments within a corresponding prompt to a generated AI model. The predicted quality measures are generated by a machine learning model that has been trained based on features that are values/measures of similarity metrics between code fragments, between code fragment changes, between code structures, and/or between changes of code structures.

Classes IPC  ?

14.

SYSTEMS AND METHODS FOR PRESERVING SYSTEM CONTEXTUAL INFORMATION IN AN ENCAPSULATED PACKET

      
Numéro d'application 18806063
Statut En instance
Date de dépôt 2024-08-15
Date de la première publication 2024-12-05
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Mcconnaughay, Mark
  • Tomic, Gary
  • Frederick, Ron

Abrégé

In some embodiments, a computing system includes a communication interface; and a processor that is coupled to the communication interface. In some embodiments, least one of the communication interface or the processor receives a network packet from the network via a network adapter port; encapsulates the received network packet with a tunnel header, wherein the tunnel header comprises network identifier information identifying the network adapter port; addresses, based on the network identifier information, an outer Internet protocol (IP) header of the encapsulated network packet with an outer IP address corresponding to a network function in a first computing device; and sends the encapsulated network packet toward the network function identified by the outer IP address.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/251 - Traduction d'adresses de protocole Internet [IP] entre versions IP différentes
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
  • H04L 69/167 - Adaptation pour la transition entre deux versions IP, p. ex. entre IPv4 et IPv6
  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes

15.

LANGUAGE-INDEPENDENT APPLICATION MONITORING THROUGH ASPECT-ORIENTED PROGRAMMING

      
Numéro d'application 18789231
Statut En instance
Date de dépôt 2024-07-30
Date de la première publication 2024-11-21
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rioux, Christien R.
  • Layzell, Robert Anthony

Abrégé

To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 8/30 - Création ou génération de code source
  • G06F 8/41 - Compilation
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

16.

RENAMING GLOBAL VARIABLES BASED ON INFERRED TYPES OF VARIABLES IN APPLICATION PROGRAM CODE

      
Numéro d'application 18194596
Statut En instance
Date de dépôt 2023-03-31
Date de la première publication 2024-10-03
Propriétaire Veracode, Inc. (USA)
Inventeur(s) Cockerham, Beth

Abrégé

After a first pass of type inferencing for application program code, global variables that share a name but correspond to different types and thus also correspond to different memory locations are identified and renamed. A static analyzer evaluates identified variables and their inferred types from the first pass of type inferencing and, if two global variables having a same name but different types are identified based on multiple disparate types being inferred for one global variable, the global variables are distinguished via renaming of at least one of the global variables before a second pass of type inferencing and data flow analysis are performed for the program code having the renaming incorporated. Renaming a global variable(s) in the case of same-named but differently typed global variables distinguishes the instances of the global variable to provide for correct propagation of type information and values without ambiguity for improved data flow analysis.

Classes IPC  ?

  • G06F 8/72 - Refonte de code
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes

17.

Inferring type definitions of user-defined types of variables in application program code

      
Numéro d'application 18194599
Numéro de brevet 12436749
Statut Délivré - en vigueur
Date de dépôt 2023-03-31
Date de la première publication 2024-10-03
Date d'octroi 2025-10-07
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Cockerham, Beth
  • Waddington, Trent Craig George

Abrégé

Type definitions of user-defined types in application program code for which definitions are absent (“unknown types”) are inferred. A static analyzer implements two passes of a fixed-point type inference algorithm. Each pass encompasses a plurality of traversals of the application's control flow to build inferred definitions of unknown types until the inferred definitions are maximally built. To build an inferred definition, based on inferring a variable is an unknown type, the static analyzer infers member variables/functions of the unknown type based on contextual information associated with the variable. Type information of unknown types is propagated along control flow paths. After the first pass terminates, unknown types can be assigned known types based on matching of inferred definitions. Inferred definitions of remaining unknown types are incorporated into the application program code. A second pass of type inferencing and data flow analysis are then performed with the inferred definitions incorporated therein.

Classes IPC  ?

  • G06F 8/41 - Compilation
  • G06F 11/3604 - Analyse de logiciel pour vérifier les propriétés des programmes

18.

Runtime application monitoring without modifying application program code

      
Numéro d'application 18680130
Numéro de brevet 12475232
Statut Délivré - en vigueur
Date de dépôt 2024-05-31
Date de la première publication 2024-09-26
Date d'octroi 2025-11-18
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rioux, Christien R.
  • Layzell, Robert Anthony

Abrégé

To facilitate runtime monitoring and analysis of an application without modifying the actual application code, an agent monitors and analyzes an application through detection and evaluation of invocations of an API of a runtime engine provided for execution of the application. The agent registers to receive events which are generated upon invocation of target functions of the runtime engine API based on its load. Once loaded, the agent initially determines the language and language version number of the runtime engine. The agent determines associations of events for which to monitor and corresponding analysis code to execute upon detection of the invocations based on the language and version number information. When the agent detects an event during execution of the application based on invocations of the runtime engine API, the agent can monitor and analyze execution of the application based on execution of analysis code corresponding to the detected event.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/30 - Surveillance du fonctionnement
  • G06F 11/3604 - Analyse de logiciel pour vérifier les propriétés des programmes
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

19.

AUTOMATED TRIAGE OF CODE FLAWS WITH MACHINE LEARNING

      
Numéro d'application 18181951
Statut En instance
Date de dépôt 2023-03-10
Date de la première publication 2024-09-12
Propriétaire Veracode, Inc. (USA)
Inventeur(s) Tahir, Humza

Abrégé

Flaws in a codebase for an organization are triaged with a naïve Bayes classifier that determines likelihoods of triage decisions corresponding to actions (e.g., remediating via code change, deferring to due network mitigation, labeling as false positive) given the context of the flaw, application, and organization. The naïve Bayes classifier is trained on the triage outcomes of previously detected flaw instances in the codebase and provides interpretable results including feature-level likelihood scores of each triage approach. In addition to recommending the highest likelihood triage outcome provided by the naïve Bayes model, a flaw similarity model identifies previously triaged flaw instances from the organization to recommend more granular triage instructions that have been documented alongside the previous flaw instances.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

20.

Systems of and methods for managing tenant and user identity information in a multi-tenant environment

      
Numéro d'application 18307305
Numéro de brevet 12493673
Statut Délivré - en vigueur
Date de dépôt 2023-04-26
Date de la première publication 2024-07-25
Date d'octroi 2025-12-09
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Yeh, Wei Jen
  • Tomic, Gary

Abrégé

A system and method for managing user identity information in a multi-tenant environment can perform operations including assigning a first address from an address pool for a first user session, storing first information for the first user session in the memory linked to the first address, and assigning a second address from the address pool for a second user session. The operations can also include storing second information for the second user session in the memory linked to the second address from the address pool for the second user session if the second address does not match a third address from the address pool for a third session in the memory, and forwarding communication data for the second user session after the second information has been stored.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur

21.

SECOND PARTY SOFTWARE COMPONENTS DISCOVERY

      
Numéro d'application 18153530
Statut En instance
Date de dépôt 2023-01-12
Date de la première publication 2024-07-18
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Trotter, William Alger
  • Fielding, Anthony Christopher

Abrégé

Identifying a second party reusable software component involves analyzing source code of applications to identify an external dependency that does not refer to third party software components and occurs in multiple applications. After identifying second party software components, the occurrence of the external dependencies corresponding to second party software components can be reported and can facilitate triage of flaws found for the second party software components, as well as other component management actions (e.g., increasing collaboration and communication among teams using and creating reusable software components, version awareness, flaw surface awareness, etc.).

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

22.

Virtual network interface management for network functions using network definitions

      
Numéro d'application 18081533
Numéro de brevet 11979292
Statut Délivré - en vigueur
Date de dépôt 2022-12-14
Date de la première publication 2024-05-07
Date d'octroi 2024-05-07
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Mcconnaughay, Mark
  • Frederick, Ronald Andrew
  • Szepesi, Szaniszlo Tyler

Abrégé

Network rules established on a device can establish communication protocol between applications running on the device and interfaces connected to the device. For example, a network rule can establish which application(s) can access which interface(s), and when an application is not assigned to an interface, the application is not granted network access to the interface(s). In some instances, interfaces can be aggregated together to create an aggregation (e.g., link aggregation or a bridge aggregation), thus allowing the network rule to use the aggregation for multiple applications. An aggregation, such as a link aggregation, can be established as a shared rule that allows access to the interface by multiple applications. Alternatively, an aggregation, such as a bridge aggregation, can be established as a reserve rule that permits only a particular application, and no other application(s), access to the interface.

Classes IPC  ?

23.

INTERCEPT FOR ENCRYPTED COMMUNICATIONS

      
Numéro d'application 18071435
Statut En instance
Date de dépôt 2022-11-29
Date de la première publication 2024-02-08
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Du Toit, Roelof Nico
  • Tomic, Gary
  • Frederick, Ronald Andrew

Abrégé

Aspects of the disclosure include replacing, by a DNS proxy in DNS responses, a cryptographic key associated with a client-facing server for an origin content server with another cryptographic key received from a TLS proxy. A device may encrypt an extension of a ClientHello message with the other cryptographic key, such that the encrypted ClientHello (ECH) extension can be decrypted by the TLS proxy. The TLS proxy can then allow or deny the connection using a TLS intercept policy and decrypted information in the ClientHello message, and if the TLS connection is allowed, re-encrypt the ECH with the cryptographic key in the DNS response for the client-facing server to decrypt for establishment of the TLS connection with the origin content server. To preserve selective intercept while using ECH, a TLS Intercept Policy may be used to decide whether the TLS proxy feeds an Application Layer Proxy.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

24.

Systems and methods for preparing a secure search index for securely detecting personally identifiable information

      
Numéro d'application 16427884
Numéro de brevet 11853454
Statut Délivré - en vigueur
Date de dépôt 2019-05-31
Date de la première publication 2023-12-26
Date d'octroi 2023-12-26
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Tarsi, Yuval
  • Emiliozzi, Stefano

Abrégé

The disclosed computer-implemented method for preparing a secure search index for securely detecting personally identifiable information may include (i) receiving, at a computing device, a dataset including a record, where the record has a field including a value describing personally identifiable information and (ii) performing, at the computing device, a security action. The security action may include (i) generating, using a perfect hash function, a respective hashed key from the value and (ii) adding, to the secure search index (a) the respective hashed key or (b) a subsequent hashed key created from the respective hashed key. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/60 - Protection de données

25.

Development pipeline integrated ongoing learning for assisted code remediation

      
Numéro d'application 18250794
Numéro de brevet 12306739
Statut Délivré - en vigueur
Date de dépôt 2020-10-29
Date de la première publication 2023-12-21
Date d'octroi 2025-05-20
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Xiao, Hao
  • Chua, Hendy Heng Lee
  • Foo, Darius Tsien Wei

Abrégé

With invocations of a software development pipeline, organization specific remediations/fixes for a software project can be learned from scanning results of code submissions (e.g., commits or merges) across an organization for a software project(s). Fixes of detected program code flaws can be detected and/or specified across scans and associated with flaw identifiers and used for training machine learning models to identify candidate fixes for detected flaws. This ongoing learning during development propagates fixes created or chosen by experts (e.g., software engineers working on the software project) relevant to the software project. The experts can choose from suggestions mined from the learned fixes of the organization and suggestions generated from a pipeline created with the trained machine learning models. The selections are then used for further training of the machine learning models that form the pipeline.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06F 8/30 - Création ou génération de code source
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 11/362 - Débogage de logiciel
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 3/0464 - Réseaux convolutifs [CNN, ConvNet]
  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 20/00 - Apprentissage automatique
  • G06N 3/09 - Apprentissage supervisé

26.

AP4z

      
Numéro d'application 018907863
Statut Enregistrée
Date de dépôt 2023-07-31
Date d'enregistrement 2023-11-11
Propriétaire CA, Inc. (USA)
Classes de Nice  ? 09 - Appareils et instruments scientifiques et électriques

Produits et services

Software; Server software; Downloadable software.

27.

O1

      
Numéro d'application 1742432
Statut Enregistrée
Date de dépôt 2023-06-26
Date d'enregistrement 2023-06-26
Propriétaire Veracode, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software risk assessment services; computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and/or penetration testing; computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software.

28.

AP4Z

      
Numéro de série 98084095
Statut En instance
Date de dépôt 2023-07-13
Propriétaire CA, INC. ()
Classes de Nice  ? 09 - Appareils et instruments scientifiques et électriques

Produits et services

Computer software, namely, downloadable computer utility program for analyzing function and performance of other computer programs; server software, namely, downloadable computer utility program for analyzing function and performance of other computer programs

29.

O1

      
Numéro d'application 227193900
Statut Enregistrée
Date de dépôt 2023-06-26
Date d'enregistrement 2025-11-07
Propriétaire Veracode, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software risk assessment services; computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based security software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and/or penetration testing; computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software.

30.

O1

      
Numéro d'application 1734410
Statut Enregistrée
Date de dépôt 2023-04-25
Date d'enregistrement 2023-04-25
Propriétaire Veracode, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software risk assessment services; Computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing; Computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software.

31.

DEIDENTIFYING CODE FOR CROSS-ORGANIZATION REMEDIATION KNOWLEDGE

      
Numéro d'application 17754194
Statut En instance
Date de dépôt 2020-11-10
Date de la première publication 2023-05-18
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Xiao, Hao
  • Chua, Hendy Heng Lee
  • Foo, Darius Tsien Wei

Abrégé

To preserve privacy when leveraging organization-specific remediation knowledge for flaw remediation across organizations, program code is deidentified to remove code which potentially identifies its source/origin. Deidentification operates based on structure of flaws and fixes at the level of source code constructs based on an abstract syntax tree (AST) or other structural context representation of a fix and corresponding flaw. Potentially identifying portions of a fix indicated in its AST are determined and modified (e.g., removed or obfuscated) without impacting AST structure. Deidentified remediation knowledge originating from different organizations is used to train a fix suggestion model(s) which learns structural context of fixes and corresponding flaws and, once trained, generates predictions indicating suggested fixes to flaws based on structural contexts of the flaws. Deidentification can occur before training of the fix suggestion model(s) or during prediction so potentially identifying program code is removed before suggested fixes are consumed by different organizations.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 8/40 - Transformation de programme

32.

01 O1

      
Numéro d'application 226262200
Statut Enregistrée
Date de dépôt 2023-04-25
Date d'enregistrement 2025-11-07
Propriétaire Veracode, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software risk assessment services; Computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based security software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing; Computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software.

33.

Securing cloud applications via isolation

      
Numéro d'application 16354751
Numéro de brevet 11558383
Statut Délivré - en vigueur
Date de dépôt 2019-03-15
Date de la première publication 2023-01-17
Date d'octroi 2023-01-17
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Au Yeung, Alex
  • Kanfer, Amit
  • Saha, Arunabha
  • Sharma, Manoj Kumar
  • Kao, Paul
  • Prabhu, Prashanth
  • Daigle, Russell
  • Pischl, Tobias
  • Chen, Yehoshua

Abrégé

A method for securing cloud applications is described. The method may include establishing a connection between a cloud application isolation portal, a cloud access security broker, and a cloud application based on an indication of the cloud application and a set of credentials associated with an end user of the cloud application, and managing, via the cloud application isolation portal and the cloud access security broker, a session between the cloud application and a computing device associated with the end user based on the connection between the cloud application isolation portal with the cloud access security broker and the cloud application.

Classes IPC  ?

  • H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
  • H04L 9/40 - Protocoles réseaux de sécurité

34.

Machine learning adversarial campaign mitigation on a computing device

      
Numéro d'application 16399725
Numéro de brevet 11551137
Statut Délivré - en vigueur
Date de dépôt 2019-04-30
Date de la première publication 2023-01-10
Date d'octroi 2023-01-10
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Echauz, Javier
  • Gardner, Andrew B.
  • Kenemer, John Keith
  • Dhaliwal, Jasjeet
  • Shintre, Saurabh

Abrégé

Machine learning adversarial campaign mitigation on a computing device. The method may include deploying an original machine learning model in a model environment associated with a client device; deploying a classification monitor in the model environment to monitor classification decision outputs in the machine learning model; detecting, by the classification monitor, a campaign of adversarial classification decision outputs in the machine learning model; applying a transformation function to the machine learning model in the model environment to transform the adversarial classification decision outputs to thwart the campaign of adversarial classification decision outputs; determining a malicious attack on the client device based in part on detecting the campaign of adversarial classification decision outputs; and implementing a security action to protect the computing device against the malicious attack.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06N 20/00 - Apprentissage automatique
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

35.

O1

      
Numéro de série 97735311
Statut En instance
Date de dépôt 2022-12-29
Propriétaire Veracode, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software cybersecurity vulnerabilities risk assessment services; Computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and application security penetration testing; Computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software

36.

Knowledge-aware detection of attacks on a client device conducted with dual-use tools

      
Numéro d'application 16367599
Numéro de brevet 11496489
Statut Délivré - en vigueur
Date de dépôt 2019-03-28
Date de la première publication 2022-11-08
Date d'octroi 2022-11-08
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Grzonkowski, Slawomir
  • Roturier, Johann
  • Banerjee, Pratyush
  • Silva, David L.

Abrégé

Knowledge-aware detection of attacks on a client device conducted with dual-use tools. A method may include obtaining dual-use tool data related to a plurality of dual-use tools; collecting from a client device, by the computing device, user input related to the use of a dual-use tool of the plurality of dual-use tools; determining that the user input contains a feature of the dual-use tool data; creating a behavioral index of the user input, the behavioral index stored on the client device; detecting new input on the client device; determining a similarity level between the user input and the new input; flagging a malicious attack on the client device based on determining that the similarity level does not satisfy a pre-determined threshold; and implementing a security action on the client device based on flagging the malicious attack.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 20/00 - Apprentissage automatique
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

37.

O1

      
Numéro de série 97652623
Statut En instance
Date de dépôt 2022-10-28
Propriétaire Veracode, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software cybersecurity vulnerabilities risk assessment services; Computer security services in the nature of network security assessments; providing temporary use of non-downloadable cloud-based software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and application security penetration testing; Computer software consultation, namely, providing an online, automated, on-demand service for identifying exploitable vulnerabilities in software

38.

Secure access to a corporate web application with translation between an internal address and an external address

      
Numéro d'application 17863998
Numéro de brevet 11665171
Statut Délivré - en vigueur
Date de dépôt 2022-07-13
Date de la première publication 2022-10-27
Date d'octroi 2023-05-30
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Patimer, David
  • Lev-Tov, Lior
  • Rudich, Eldad
  • Belkind, Leonid

Abrégé

Secure access to a corporate application with translation between an internal address and an external address. In some embodiments, a method may include receiving, at a secure access cloud point of delivery (PoD), from a client application on a client device, a request to access a corporate web application that is deployed in a corporate datacenter. The method may also include forwarding, from the secure access cloud PoD, to a connector that is also deployed in the corporate datacenter, the request to access the corporate web application. The method may further include brokering, by the connector and the secure access cloud PoD, authentication of a user, authorization of access by the user, and a secure communication session between the client application and the corporate web application by translating between an internal address of the corporate web application and an external address of the corporate web application.

Classes IPC  ?

  • G06F 21/33 - Authentification de l’utilisateur par certificats
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité

39.

CLARITY

      
Numéro d'application 221805100
Statut En instance
Date de dépôt 2022-10-26
Propriétaire CA, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Downloadable computer programs for project management, digital product management, work collaboration, information technology portfolio management, and business process management (1) Software as a service (SaaS) services featuring non-downloadable, cloud-based computer programs for project management, digital product management, work collaboration, information technology portfolio management, and business process management

40.

VALUEOPS

      
Numéro d'application 221804700
Statut Enregistrée
Date de dépôt 2022-10-26
Date d'enregistrement 2026-03-02
Propriétaire CA, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Software as a service (SAAS) services featuring software for project management, digital product management, work collaboration, and computer software development and implementation

41.

CLARITY

      
Numéro d'application 018783571
Statut Enregistrée
Date de dépôt 2022-10-25
Date d'enregistrement 2025-06-14
Propriétaire CA, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Downloadable computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management, all aforementioned goods only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software; none of the aforementioned goods in the context of energy production and distribution; none of the aforementioned goods in the context of chemistry for health sciences, biomedicine, biology, biotechnology, clinical biochemistry, pharmaceutical and pharmacology chemistry. Providing online, non-downloadable, cloud-based computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management, all aforementioned services only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software; none of the aforementioned services in the context of energy production and distribution; none of the aforementioned services in the context of chemistry for health sciences, biomedicine, biology, biotechnology, clinical biochemistry, pharmaceutical and pharmacology chemistry.

42.

VALUEOPS

      
Numéro d'application 018783575
Statut Enregistrée
Date de dépôt 2022-10-25
Date d'enregistrement 2023-04-18
Propriétaire CA, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Software as a service (SAAS) services featuring software for project management, product management, work collaboration, and software development and implementation.

43.

Open source vulnerability prediction with machine learning ensemble

      
Numéro d'application 17809425
Numéro de brevet 11899800
Statut Délivré - en vigueur
Date de dépôt 2022-06-28
Date de la première publication 2022-10-13
Date d'octroi 2024-02-13
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Zhou, Yaqin

Abrégé

A system to create a stacked classifier model combination or classifier ensemble has been designed for identification of undisclosed flaws in software components on a large-scale. This classifier ensemble is capable of at least a 54.55% improvement in precision. The system uses a K-folding cross validation algorithm to partition a sample dataset and then train and test a set of N classifiers with the dataset folds. At each test iteration, trained models of the set of classifiers generate probabilities that a sample has a flaw, resulting in a set of N probabilities or predictions for each sample in the test data. With a sample size of S, the system passes the S sets of N predictions to a logistic regressor along with “ground truth” for the sample dataset to train a logistic regression model. The trained classifiers and the logistic regression model are stored as the classifier ensemble.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes

44.

CLARITY

      
Numéro de série 97619256
Statut Enregistrée
Date de dépôt 2022-10-04
Date d'enregistrement 2024-06-18
Propriétaire CA, Inc. ()
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Downloadable computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management; all aforementioned goods/services only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software Non-downloadable, cloud-based computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management; all aforementioned goods/services only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software

45.

VALUEOPS

      
Numéro de série 97619268
Statut Enregistrée
Date de dépôt 2022-10-04
Date d'enregistrement 2024-01-16
Propriétaire CA, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Software as a service (SAAS) services featuring software for project management, product management, work collaboration, and software development and implementation

46.

Systems and methods for producing adjustments to malware-detecting services

      
Numéro d'application 16138939
Numéro de brevet 11461462
Statut Délivré - en vigueur
Date de dépôt 2018-09-21
Date de la première publication 2022-10-04
Date d'octroi 2022-10-04
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Lan, Qichao
  • Zhu, Junda
  • Shu, Shaolong
  • Cheng, Tao
  • Senstad, Rudy

Abrégé

The disclosed computer-implemented method for producing adjustments to malware-detecting services may include (1) receiving, from a plurality of malware-detecting services executing on a plurality of client computing devices, a respective plurality of probability scores with corresponding model identifiers for an analyzed file and a plurality of respective identifiers describing the malware-detecting services, (2) building a training dataset from at least a portion of the received plurality of probability scores with corresponding model identifiers, and (3) performing a security action including (A) training, with the training dataset, a malware-detecting linear regression ensemble machine learning model that is specific to an identifier in the plurality of identifiers and (B) sending the trained linear regression ensemble machine learning model to one of the plurality of malware-detecting services executing on one of the client computing devices. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique
  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

47.

Amplification of initial training data

      
Numéro d'application 17840291
Numéro de brevet 11900251
Statut Délivré - en vigueur
Date de dépôt 2022-06-14
Date de la première publication 2022-09-29
Date d'octroi 2024-02-13
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Cohen, Michael J.
  • Sill, Daniel David

Abrégé

Techniques are disclosed relating to increasing the amount of training data available to machine learning algorithms. A computer system may access an initial set of training data that specifies a plurality of sequences, each of which may define a set of data values. The computer system may amplify the initial set of training data to create a revised set of training data. The amplifying may include identifying sub-sequences of data values in ones of the plurality of sequences in the initial set of training data and using an inheritance algorithm to create a set of additional sequences of data values, where each one of the set of additional sequences may include sub-sequences of data values from at least two different sequences in the initial set of training data. The computer system may process the set of additional sequences using the machine learning algorithm to train a machine learning model.

Classes IPC  ?

  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 20/00 - Apprentissage automatique
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux

48.

Secure access to a corporate application in an SSH session using a transparent SSH proxy

      
Numéro d'application 16591365
Numéro de brevet 11444925
Statut Délivré - en vigueur
Date de dépôt 2019-10-02
Date de la première publication 2022-09-13
Date d'octroi 2022-09-13
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Patimer, David
  • Lev-Tov, Lior
  • Rudich, Eldad
  • Belkind, Leonid

Abrégé

Secure access to a corporate application in an SSH session using a transparent SSH proxy. In some embodiments, a method may include receiving, at a secure access cloud point of delivery (PoD), from a client application on a client device, a request to access a corporate application that is deployed in a corporate datacenter. The method may also include forwarding, from the secure access cloud PoD, to a connector that is also deployed in the corporate datacenter, the request. The method may further include brokering, by the connector and the secure access cloud PoD, authentication of a user, authorization of access by the user, and an SSH session between the client application and the corporate application using a transparent SSH proxy, with the client application being unaware that the SSH session is brokered by the connector and the secure access cloud PoD.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

49.

Secure access to a corporate application using a facade

      
Numéro d'application 16591335
Numéro de brevet 11442755
Statut Délivré - en vigueur
Date de dépôt 2019-10-02
Date de la première publication 2022-09-13
Date d'octroi 2022-09-13
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Patimer, David
  • Lev-Tov, Lior
  • Rudich, Eldad
  • Belkind, Leonid

Abrégé

Secure access to a corporate application using a facade. In some embodiments, a method may include receiving, at a secure access cloud point of delivery (PoD), from a client application on a client device, a request to access a corporate application that is deployed in a corporate datacenter. The method may also include creating, at the secure access cloud PoD, a facade representing the corporate application. The method may further include forwarding, from the facade, to a connector that is also deployed in the corporate datacenter, the request. The method may also include brokering, by the connector and the facade, authentication of a user, authorization of access by the user, and a secure communication session between the client application and the corporate application via the facade, with the client application being unaware that the secure communication session is brokered by the connector and the facade.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
  • G06F 21/33 - Authentification de l’utilisateur par certificats

50.

Systems and methods for dynamically augmenting machine learning models based on contextual factors associated with execution environments

      
Numéro d'application 15922280
Numéro de brevet 11429823
Statut Délivré - en vigueur
Date de dépôt 2018-03-15
Date de la première publication 2022-08-30
Date d'octroi 2022-08-30
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Lan, Qichao
  • Tian, Xuefeng
  • Cheng, Tao
  • Senstad, Rudy

Abrégé

The disclosed computer-implemented method for dynamically augmenting machine learning models based on contextual factors associated with execution environments may include (1) generating a base machine learning model and a supplemental set of machine learning models, (2) determining at least one contextual factor associated with an execution environment of a machine learning system that is configured to make predictions regarding a set of input data using at least the base machine learning model, (3) selecting, based on the contextual factor, a continuation set of machine learning models from the supplemental set of machine learning models, and (4) directing the machine learning system to utilize both the base machine learning model and the continuation set of machine learning models when making predictions regarding the set of input data. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique

51.

Secure access to a corporate web application with translation between an internal address and an external address

      
Numéro d'application 16591347
Numéro de brevet 11425134
Statut Délivré - en vigueur
Date de dépôt 2019-10-02
Date de la première publication 2022-08-23
Date d'octroi 2022-08-23
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Patimer, David
  • Lev-Tov, Lior
  • Rudich, Eldad
  • Belkind, Leonid

Abrégé

Secure access to a corporate application with translation between an internal address and an external address. In some embodiments, a method may include receiving, at a secure access cloud point of delivery (PoD), from a client application on a client device, a request to access a corporate web application that is deployed in a corporate datacenter. The method may also include forwarding, from the secure access cloud PoD, to a connector that is also deployed in the corporate datacenter, the request to access the corporate web application. The method may further include brokering, by the connector and the secure access cloud PoD, authentication of a user, authorization of access by the user, and a secure communication session between the client application and the corporate web application by translating between an internal address of the corporate web application and an external address of the corporate web application.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 9/40 - Protocoles réseaux de sécurité

52.

Systems and methods for protecting a cloud computing device from malware

      
Numéro d'application 16574755
Numéro de brevet 11411968
Statut Délivré - en vigueur
Date de dépôt 2019-09-18
Date de la première publication 2022-08-09
Date d'octroi 2022-08-09
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Banerjee, Ashok
  • Hassall, Susan

Abrégé

The disclosed computer-implemented method for protecting a cloud computing device from malware may include (i) intercepting, at a computing device, a malicious attempt by the malware to (A) access sensitive information in an encrypted file stored on the computing device and (B) send the sensitive information to the cloud computing device and (ii) performing, responsive to the attempt to access the encrypted file, a security action. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

53.

Universal tracing of side-channel processes in computing environments

      
Numéro d'application 16362009
Numéro de brevet 11409871
Statut Délivré - en vigueur
Date de dépôt 2019-03-22
Date de la première publication 2022-08-09
Date d'octroi 2022-08-09
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Naamneh, Bahaa
  • Leder, Felix

Abrégé

A method for identifying suspicious activity on a monitored computing device is described. In one embodiment, the method may include monitoring a local procedure call interface of the monitored computing device, identifying, based at least in part on the monitoring, a remote procedure call (RPC) of a suspicious process, the RPC being transmitted over a local procedure call message of the local procedure call interface, analyzing the RPC of the suspicious process, and performing a security action based at least in part on the analyzing.

Classes IPC  ?

  • G06F 16/903 - Requêtes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 9/54 - Communication interprogramme

54.

Systems and methods for detecting code implanted into a published application

      
Numéro d'application 16368565
Numéro de brevet 11392696
Statut Délivré - en vigueur
Date de dépôt 2019-03-28
Date de la première publication 2022-07-19
Date d'octroi 2022-07-19
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Umland, Torrey
  • Theis, Nathaniel

Abrégé

The disclosed computer-implemented method for detecting code implanted into a published application may include retrieving a published version of an application and a source version of the application, and determining, based on an analysis of the source version and the published version, a transformation process for transforming from the source version to the published version. The method may also include performing the transformation process on the source version to produce a build version, comparing the build version with the published version, and identifying, based on the comparison, implanted code in the published version. The method may further include performing, in response to identifying the implanted code, a security action. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 8/40 - Transformation de programme

55.

Systems and methods for malware detection using localized machine learning

      
Numéro d'application 16414341
Numéro de brevet 11386208
Statut Délivré - en vigueur
Date de dépôt 2019-05-16
Date de la première publication 2022-07-12
Date d'octroi 2022-07-12
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Lan, Qichao
  • Cheng, Tao

Abrégé

The disclosed computer-implemented method for malware detection using localized machine learning may include (i) generating a global score for a file using a global machine learning model, (ii) generating a localized score for the file using a localized machine learning model, (iii) determining that the file is malware using the global score, the localized score, and the local conviction threshold, and (iv) in response to determining that the file is malware, performing a security action to protect the computing device against malware. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06N 20/00 - Apprentissage automatique

56.

DEIDENTIFYING CODE FOR CROSS-ORGANIZATION REMEDIATION KNOWLEDGE

      
Numéro d'application US2020059775
Numéro de publication 2022/103382
Statut Délivré - en vigueur
Date de dépôt 2020-11-10
Date de publication 2022-05-19
Propriétaire VERACODE, INC. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Xiao, Hao
  • Chua, Hendy Heng Lee
  • Foo, Darius Tsien Wei

Abrégé

e.ge.g., removed or obfuscated) without impacting AST structure. Deidentified remediation knowledge originating from different organizations is used to train a fix suggestion model(s) which learns structural context of fixes and corresponding flaws and, once trained, generates predictions indicating suggested fixes to flaws based on structural contexts of the flaws. Deidentification can occur before training of the fix suggestion model(s) or during prediction so potentially identifying program code is removed before suggested fixes are consumed by different organizations.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06F 9/45 - Compilation ou interprétation de langages de programmation évolués

57.

Systems and methods for managing a need-to-know domain name system

      
Numéro d'application 16576275
Numéro de brevet 11336639
Statut Délivré - en vigueur
Date de dépôt 2019-09-19
Date de la première publication 2022-05-17
Date d'octroi 2022-05-17
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Banerjee, Ashok
  • Belkind, Leonid
  • Daigle, Russell

Abrégé

The disclosed computer-implemented method for managing a need-to-know domain name system may include (i) intercepting, by an agent of the computing device, network traffic received on the computing device, (ii) generating, by the agent, a one-time password based on a unique identifier of the agent of the computing device, (iii) wrapping, by the agent, the network traffic with the one-time password, and (iv) pushing, by the agent, the wrapped network traffic to a cloud server using a local domain name system (DNS) of the agent of the computing device, wherein the local DNS comprises a private domain name unpublished in a global DNS. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 13/00 - Interconnexion ou transfert d'information ou d'autres signaux entre mémoires, dispositifs d'entrée/sortie ou unités de traitement
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 49/90 - Dispositions de mémoires tampon

58.

DEVELOPMENT PIPELINE INTEGRATED ONGOING LEARNING FOR ASSISTED CODE REMEDIATION

      
Numéro d'application US2020058067
Numéro de publication 2022/093250
Statut Délivré - en vigueur
Date de dépôt 2020-10-29
Date de publication 2022-05-05
Propriétaire VERACODE, INC. (USA)
Inventeur(s)
  • Sharma, Asankhaya
  • Xiao, Hao
  • Chua, Hendy Heng Lee
  • Foo, Darius Tsien Wei

Abrégé

With invocations of a software development pipeline, organization specific remediations/fixes for a software project can be learned from scanning results of code submissions (e.g., commits or merges) across an organization for a software project(s). Fixes of detected program code flaws can be detected and/or specified across scans and associated with flaw identifiers and used for training machine learning models to identify candidate fixes for detected flaws. This ongoing learning during development propagates fixes created or chosen by experts (e.g., software engineers working on the software project) relevant to the software project. The experts can choose from suggestions mined from the learned fixes of the organization and suggestions generated from a pipeline created with the trained machine learning models. The selections are then used for further training of the machine learning models that form the pipeline.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques

59.

Adjudicating files by classifying directories based on collected telemetry data

      
Numéro d'application 16453766
Numéro de brevet 11308212
Statut Délivré - en vigueur
Date de dépôt 2019-06-26
Date de la première publication 2022-04-19
Date d'octroi 2022-04-19
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Zhu, Qian
  • Lichstein, Alexander
  • Sosa, Daniel

Abrégé

Telemetry data from client file reputation queries is collected over time. Directories/sub-directories under which files of queries are located are identified. The files including the reputations for the files under a given directory/sub-directory are identified and used to calculate the reputation score for the directory/sub-directory. The directory/sub-directory is then classified based on the calculated score for the directory/sub-directory. After the classification of directories/sub-directories, reputation for a file with unknown reputation is then determined based on the classification of the directory/sub-directory under which the file is located.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/185 - Systèmes de gestion de stockage hiérarchisé, p. ex. migration de fichiers ou politiques de migration de fichiers

60.

Pre-filtering detection of an injected script on a webpage accessed by a computing device

      
Numéro d'application 16435179
Numéro de brevet 11303670
Statut Délivré - en vigueur
Date de dépôt 2019-06-07
Date de la première publication 2022-04-12
Date d'octroi 2022-04-12
Propriétaire CA, Inc. (USA)
Inventeur(s) Wueest, Candid Alex

Abrégé

Pre-filtering detection of an injected script on a webpage accessed by a computing device. The method may include receiving an indication of access to the webpage at a web browser of the computing device; identifying a web form associated with the webpage; determining that the webpage has been previously visited by the computing device; recording at least one current domain associated with at least one current object request made by the web form; determining a difference of a count of the at least one current domain associated with the at least one current object request and a count of at least one historical domain associated with at least one historical object request previously made by the webpage; identifying the webpage as suspicious based on determining that the difference is greater than zero and less than a domain threshold; and initiating a security action on the webpage based on the identifying.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 67/56 - Approvisionnement des services mandataires
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06N 20/00 - Apprentissage automatique
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

61.

Identifying and protecting against an attack against an anomaly detector machine learning classifier

      
Numéro d'application 16541442
Numéro de brevet 11297083
Statut Délivré - en vigueur
Date de dépôt 2019-08-15
Date de la première publication 2022-04-05
Date d'octroi 2022-04-05
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Kuppa, Aditya
  • Grzonkowski, Slawomir

Abrégé

Identifying and protecting against an attack against an anomaly detector machine learning classifier (ADMLC). In some embodiments, a method may include identifying training data points in a manifold space for an ADMLC, dividing the manifold space into multiple subspaces, merging each of the training data points into one of the multiple subspaces, training a subclassifier for each of the multiple subspaces to determine a decision boundary for each of the multiple subspaces between normal training data points and anomalous training data points, receiving an input data point into the ADMLC, determining whether the input data point is an attack on the ADMLC due to a threshold number of the subclassifiers classifying the input data point as an anomalous input data point, and, in response to identifying the attack against the ADMLC, protecting against the attack.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 20/00 - Apprentissage automatique
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

62.

Systems and methods for detecting and protecting against malicious use of legitimate computing-system tools

      
Numéro d'application 16368096
Numéro de brevet 11288369
Statut Délivré - en vigueur
Date de dépôt 2019-03-28
Date de la première publication 2022-03-29
Date d'octroi 2022-03-29
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Grzonkowski, Slawomir
  • Kuppa, Aditya

Abrégé

A computer-implemented method for detecting and protecting against malicious use of legitimate computing-system tools may include (i) identifying a computing-system tool that can perform benign actions and malicious actions on a computing system, (ii) creating a set of recorded actions by recording actions performed by the computing-system tool on the computing system over a predetermined period of time, (iii) analyzing the set of recorded actions via a machine learning method that, for each action in the set of recorded actions, determines whether the action is anomalous compared to other actions in the set, (iv) classifying an action in the set of recorded actions as malicious based at least in part on determining that the action is anomalous, and (v) initiating, in response to classifying the action as malicious, a security action related to the action. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/60 - Protection de données
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

63.

Identifying and mitigating harm from malicious network connections by a container

      
Numéro d'application 16450652
Numéro de brevet 11277436
Statut Délivré - en vigueur
Date de dépôt 2019-06-24
Date de la première publication 2022-03-15
Date d'octroi 2022-03-15
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Smith, Spencer Dale
  • Barajas, Frank X.
  • Hernandez, Paul D.

Abrégé

Identifying and mitigating harm from malicious network connections by a container. In some embodiments, a method may include receiving, from a shim, notifications of all network connections that a container has sought to establish through the shim. The method may also include monitoring all actual network connections established by the container. The method may further include comparing the notifications to the actual network connections to determine whether any actual network connection established by the container bypassed the shim. The method may also include, in response to determining that any actual network connection established by the container bypassed the shim, identifying the network connection established by the container that bypassed the shim as a malicious network connection, and performing a security action to mitigate harm from the malicious network connection.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

64.

Language-independent application monitoring through aspect-oriented programming

      
Numéro d'application 17287045
Numéro de brevet 12072983
Statut Délivré - en vigueur
Date de dépôt 2020-04-24
Date de la première publication 2022-03-10
Date d'octroi 2024-08-27
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rioux, Christien R.
  • Layzell, Robert Anthony

Abrégé

To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 8/30 - Création ou génération de code source
  • G06F 8/41 - Compilation
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

65.

Runtime application monitoring without modifying application program code

      
Numéro d'application 17287057
Numéro de brevet 12001564
Statut Délivré - en vigueur
Date de dépôt 2020-04-24
Date de la première publication 2022-03-10
Date d'octroi 2024-06-04
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Rioux, Christien R.
  • Layzell, Robert Anthony

Abrégé

To facilitate runtime monitoring and analysis of an application without modifying the actual application code, an agent monitors and analyzes an application through detection and evaluation of invocations of an API of a runtime engine provided for execution of the application. The agent registers to receive events which are generated upon invocation of target functions of the runtime engine API based on its load. Once loaded, the agent initially determines the language and language version number of the runtime engine. The agent determines associations of events for which to monitor and corresponding analysis code to execute upon detection of the invocations based on the language and version number information. When the agent detects an event during execution of the application based on invocations of the runtime engine API, the agent can monitor and analyze execution of the application based on execution of analysis code corresponding to the detected event.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/30 - Surveillance du fonctionnement
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

66.

Systems and methods for utilizing metadata for protecting against the sharing of images in a computing network

      
Numéro d'application 16433761
Numéro de brevet 11270014
Statut Délivré - en vigueur
Date de dépôt 2019-06-06
Date de la première publication 2022-03-08
Date d'octroi 2022-03-08
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Chen, Joseph
  • Song, Qubo
  • Houston, Chris

Abrégé

The disclosed computer-implemented method for utilizing metadata for protecting against the sharing of images in a computing network may include (i) identifying an image file stored in a public folder on a computing device, (ii) storing a copy of the image file within a secure data storage application, (iii) encoding metadata for revealing an image in the image file, (iv) performing a security action that protects against sharing the image file from the public folder by masking the image in the image file with the encoded metadata, and (v) rendering the image in the image file as an unmasked version of the image from the image file or the copy of the image file in the secure data storage application by decoding the metadata utilized to mask the image. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/176 - Support d’accès partagé aux fichiersSupport de partage de fichiers
  • G06T 11/60 - Édition de figures et de texteCombinaison de figures ou de texte
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau

67.

LONGBOW

      
Numéro de série 97285360
Statut Enregistrée
Date de dépôt 2022-02-25
Date d'enregistrement 2023-10-31
Propriétaire VERACODE, INC. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Software as a service (SAAS) services, namely, hosting software for use by others for security data analysis; Computer security consultancy in the field of cyber security

68.

Application behavioral fingerprints

      
Numéro d'application 16408800
Numéro de brevet 11256802
Statut Délivré - en vigueur
Date de dépôt 2019-05-10
Date de la première publication 2022-02-22
Date d'octroi 2022-02-22
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Forcada, Joao M.
  • Mesropian, Haik A.
  • Danileiko, Alexander
  • Peterson, Christopher J.
  • Chang, Charlotte
  • Xing, Huawei
  • Egoyan, Artem

Abrégé

Methods, systems, and devices for protecting against abnormal computer behavior are described. The method may include monitoring a computer process related to an application running on a computing device of one or more computing devices, analyzing a database including a set of digital fingerprints, where a digital fingerprint of the set of digital fingerprints relates to the application, the digital fingerprint including an indication of a set of computer processes related to the application that are classified as normal computer processes for the application, determining that the computer process related to the application is an abnormal computer process based on analyzing, and performing a security action on the computing device to protect the computing device against the abnormal computer process based on the determining.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

69.

Automatically generating malware definitions using word-level analysis

      
Numéro d'application 16363709
Numéro de brevet 11222113
Statut Délivré - en vigueur
Date de dépôt 2019-03-25
Date de la première publication 2022-01-11
Date d'octroi 2022-01-11
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Li, Weiliang
  • Zeng, Zhicheng

Abrégé

Methods and systems are provided for automatically generating malware definitions and using generated malware definitions. One example method generally includes receiving information associated with a malicious application and extracting malware strings from the malicious application. The method further includes filtering the malware strings using a set of safe strings to produce filtered strings and scoring the filtered strings to produce string scores by evaluating words of the filtered strings based on word statistics of a set of known malicious words. The method further includes selecting a set of candidate strings from the filtered strings based on the string scores and generating a malware definition for the malicious application based on the set of candidate strings. The method also includes performing one or more security actions to protect against the malicious application, using the malware definition.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

70.

Systems and methods for safely executing unreliable malware

      
Numéro d'application 16560273
Numéro de brevet 11204992
Statut Délivré - en vigueur
Date de dépôt 2019-09-04
Date de la première publication 2021-12-21
Date d'octroi 2021-12-21
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Naamneh, Bahaa
  • Leder, Felix

Abrégé

The disclosed computer-implemented method for safely executing unreliable malware may include (i) intercepting a call to an application programming interface (API) in a computing operating system, the API being utilized by malware for disseminating malicious code, (ii) determining an incompatibility between the API call and the computing operating system that prevents successful execution of the API call, (iii) creating a proxy container for receiving the API call, (iv) modifying, utilizing the proxy container, the API call to be compatible with the computing operating system, (v) sending the modified API call from the proxy container to the computing operating system for retrieving the API utilized by the malware, and (vi) performing a security action during a threat analysis of the malware by executing the API to disseminate the malicious code in a sandboxed environment. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 9/54 - Communication interprogramme
  • G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

71.

Systems and methods for protecting against malicious content

      
Numéro d'application 16452298
Numéro de brevet 11196754
Statut Délivré - en vigueur
Date de dépôt 2019-06-25
Date de la première publication 2021-12-07
Date d'octroi 2021-12-07
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Lai, Everett
  • Rudnai, Tamas

Abrégé

The disclosed computer-implemented method for protecting against malicious content may include intercepting, by a security application installed on the computing device, an original message intended for a target application installed on the same computing device. The original message may include potentially malicious content. The security application may forward the original message to a security service. The computing device may receive a clean message from the security service, wherein the clean message includes a safe representation of the potentially malicious content. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

72.

Systems and methods for managing endpoint security states using passive data integrity attestations

      
Numéro d'application 16420016
Numéro de brevet 11176276
Statut Délivré - en vigueur
Date de dépôt 2019-05-22
Date de la première publication 2021-11-16
Date d'octroi 2021-11-16
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Chen, Joseph
  • Song, Qubo
  • Smith, Spencer
  • Aimoto, Shaun
  • Mesropian, Haik
  • Kane, David
  • Ferrie, Peter
  • Saxonberg, Jordan
  • Ionescu, Costin

Abrégé

The disclosed computer-implemented method for managing endpoint security states using passive data integrity attestations may include (i) receiving passively collected network data from an endpoint device of a computing environment, (ii) determining a security state of the endpoint device using the passively collected network data from the endpoint device, (iii) determining that the security state of the endpoint device is below a threshold, and (iv) in response to determining that the security state of the endpoint device is below a threshold, performing a security action to protect the computing environment against malicious actions. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

73.

Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data

      
Numéro d'application 16362369
Numéro de brevet 11163875
Statut Délivré - en vigueur
Date de dépôt 2019-03-22
Date de la première publication 2021-11-02
Date d'octroi 2021-11-02
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Roundy, Kevin A.
  • Sharif, Mahmood
  • Dell'Amico, Matteo
  • Gates, Christopher
  • Kats, Daniel
  • Chung, Dong

Abrégé

The present disclosure relates to using correlations between support interaction data and telemetry data to discover emerging incidents for remediation. One example method generally includes receiving a corpus of support interaction data and a corpus of telemetry data. Topics indicative of underlying problems experienced by users of an application are extracted from the corpus of support interaction data. A topic having a rate of appearance in the support interaction data above a threshold value is identified. A set of telemetry data relevant to the topic is extracted from the corpus of telemetry data, and a subset of the relevant set of telemetry data having a frequency in the relevant set of telemetry data above a second threshold value is identified. The topic and the subset of telemetry data are correlated to an incident to be remediated, and one or more actions are taken to remedy the incident.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

74.

RUNTIME APPLICATION MONITORING WITHOUT MODIFYING APPLICATION PROGRAM CODE

      
Numéro d'application US2020029718
Numéro de publication 2021/216081
Statut Délivré - en vigueur
Date de dépôt 2020-04-24
Date de publication 2021-10-28
Propriétaire VERACODE, INC. (USA)
Inventeur(s)
  • Rioux, Christien R.
  • Layzell, Robert Anthony

Abrégé

To facilitate runtime monitoring and analysis of an application without modifying the actual application code, an agent monitors and analyzes an application through detection and evaluation of invocations of an API of a runtime engine provided for execution of the application. The agent registers to receive events which are generated upon invocation of target functions of the runtime engine API based on its load. Once loaded, the agent initially determines the language and language version number of the runtime engine. The agent determines associations of events for which to monitor and corresponding analysis code to execute upon detection of the invocations based on the language and version number information. When the agent detects an event during execution of the application based on invocations of the runtime engine API, the agent can monitor and analyze execution of the application based on execution of analysis code corresponding to the detected event.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 15/177 - Commande d'initialisation ou de configuration
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

75.

LANGUAGE-INDEPENDENT APPLICATION MONITORING THROUGH ASPECT-ORIENTED PROGRAMMING

      
Numéro d'application US2020029707
Numéro de publication 2021/216079
Statut Délivré - en vigueur
Date de dépôt 2020-04-24
Date de publication 2021-10-28
Propriétaire VERACODE, INC. (USA)
Inventeur(s)
  • Rioux, Christien, R.
  • Layzell, Robert, Anthony

Abrégé

To support adding functionality to applications at a layer of abstraction above language-specific implementations of AOP, a language for implementing AOP facilitates runtime monitoring and analysis of an application independent of the language of the application. Aspects can be created for applications written in any supported language. Program code underlying implementations of aspects can be executed based on detecting triggering events during execution of the application. Routines written with the AOP language comprise event-based aspect code triggers that indicate an event which may occur during execution of the application and the associated aspect code to be executed. An agent deployed to a runtime engine to monitor the application detects events and evaluates contextual information about the detected events against the aspect triggers to determine if aspect code should be executed to perform further monitoring and analysis of the executing application.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
  • G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation

76.

Systems and methods for executing decision trees

      
Numéro d'application 16111772
Numéro de brevet 11144637
Statut Délivré - en vigueur
Date de dépôt 2018-08-24
Date de la première publication 2021-10-12
Date d'octroi 2021-10-12
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Curtin, Ryan
  • Kenemer, Keith

Abrégé

The disclosed computer-implemented method for executing decision trees may include (i) executing a security classification decision tree that classifies an input data item, (ii) gathering, simultaneously using a gather instruction, values for both a current threshold at a parent node of the security classification decision tree and a subsequent threshold at a child node of the parent node, (iii) gathering, simultaneously using the gather instruction, values for both a current measurement at the parent node and a subsequent measurement at the child node, (iv) comparing, simultaneously using a comparison instruction, the current threshold at the parent node with the current measurement at the parent node and the subsequent threshold at the child node with the subsequent measurement at the child node, and (v) performing a security action to protect the computing device. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

77.

Systems and methods for protection of storage systems using decoy data

      
Numéro d'application 16362987
Numéro de brevet 11144656
Statut Délivré - en vigueur
Date de dépôt 2019-03-25
Date de la première publication 2021-10-12
Date d'octroi 2021-10-12
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Banerjee, Ashok
  • Porr, William
  • Hasan, Sahil

Abrégé

The disclosed computer-implemented method for protection of storage systems using decoy data may include identifying an original file comprising sensitive content to be protected against malicious access and protecting the sensitive content. Protecting the sensitive content may include (i) processing the original file to identify a structure of the original file and the sensitive content of the original file, (ii) generating a decoy file using the structure of the original file and using substitute content in a location corresponding to the sensitive content of the original file, and (iii) storing the decoy file with the original file. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/60 - Protection de données

78.

Systems and methods for preserving system contextual information in an encapsulated packet

      
Numéro d'application 17322045
Numéro de brevet 12088430
Statut Délivré - en vigueur
Date de dépôt 2021-05-17
Date de la première publication 2021-09-09
Date d'octroi 2024-09-10
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Mcconnaughay, Mark
  • Tomic, Gary
  • Frederick, Ron

Abrégé

In some embodiments, a computing system includes a communication interface; and a processor that is coupled to the communication interface. In some embodiments, least one of the communication interface or the processor receives a network packet from the network via a network adapter port; encapsulates the received network packet with a tunnel header, wherein the tunnel header comprises network identifier information identifying the network adapter port; addresses, based on the network identifier information, an outer Internet protocol (IP) header of the encapsulated network packet with an outer IP address corresponding to a network function in a first computing device; and sends the encapsulated network packet toward the network function identified by the outer IP address.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/251 - Traduction d'adresses de protocole Internet [IP] entre versions IP différentes
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
  • H04L 69/167 - Adaptation pour la transition entre deux versions IP, p. ex. entre IPv4 et IPv6
  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes

79.

Systems and methods for detecting covert channels structured in internet protocol transactions

      
Numéro d'application 16114732
Numéro de brevet 11095666
Statut Délivré - en vigueur
Date de dépôt 2018-08-28
Date de la première publication 2021-08-17
Date d'octroi 2021-08-17
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Li, Qing
  • Larsen, Chris
  • Dimaggio, Jon

Abrégé

The disclosed computer-implemented method for detecting covert channels structured in Internet Protocol (IP) transactions may include (1) intercepting an IP transaction including textual data and a corresponding address, (2) evaluating the textual data against a model to determine a difference score, (3) determining that the textual data is suspicious when the difference score exceeds a threshold value associated with the model, (4) examining, upon determining that the textual data is suspicious, the address in the transaction to determine whether the address is invalid, (5) analyzing the transaction to determine a frequency of address requests that have been initiated from a source address over a predetermined period, and (6) identifying the transaction as a covert data channel for initiating a malware attack when the address is determined to be invalid and the frequency of the address requests exceeds a threshold value. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

80.

Isolating an iframe of a webpage

      
Numéro d'application 16551440
Numéro de brevet 11089050
Statut Délivré - en vigueur
Date de dépôt 2019-08-26
Date de la première publication 2021-08-10
Date d'octroi 2021-08-10
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Horman, Yoav
  • Kasher, Roee
  • Solomon, Tal

Abrégé

Isolating an iframe of a webpage. In one embodiment, a method may include targeting an iframe in a webpage for isolation, executing, in a server browser, iframe code, sending, from the remote isolation server to the local client, the webpage with the iframe code of the iframe replaced with isolation code, executing, in a client browser, webpage code and the isolation code, intercepting, in the client browser, webpage messages sent from the webpage code and intended to be delivered to the iframe, sending, to the remote isolation server, the intercepted webpage messages to be injected into the iframe code executing at the server browser, intercepting, at the server browser, iframe messages sent from the iframe code and intended to be delivered to the webpage, and sending, to the local client, the intercepted iframe messages to be injected into the webpage code executing at the client browser.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 16/951 - IndexationTechniques d’exploration du Web

81.

Threat isolation for documents using distributed storage mechanisms

      
Numéro d'application 16368324
Numéro de brevet 11089061
Statut Délivré - en vigueur
Date de dépôt 2019-03-28
Date de la première publication 2021-08-10
Date d'octroi 2021-08-10
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Sinha, Nikhil
  • Harris, Alexander
  • Steenbruggen, John
  • Vadlamani, Ananta Krishna

Abrégé

A cloud device is configured in an email transmission pathway. The cloud device receives an email attachment whose maliciousness status is determined to be unknown. The cloud device encrypts the email attachment and delivers the encrypted attachment to the recipient. When the recipient attempts to access the encrypted attachment, the cloud device re-determines the maliciousness status of the attachment. If the re-determined maliciousness status is benign, the cloud device allows the encrypted attachment to be decrypted and opened locally on the recipient's device. If the re-determined maliciousness status is still unknown, the cloud device provides a cloud-based viewing solution to the recipient using an isolation service.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/58 - Systèmes de commutation de messages

82.

Abnormal user behavior detection

      
Numéro d'application 16366092
Numéro de brevet 11075933
Statut Délivré - en vigueur
Date de dépôt 2019-03-27
Date de la première publication 2021-07-27
Date d'octroi 2021-07-27
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Fetters, Brandon
  • Han, Yufei
  • Wang, Xiaolin

Abrégé

A method for detecting and protecting against abnormal user behavior is described. The method may include generating a tensor model based on a set of user information within a temporal period. The tensor model may include a behavioral profile associated with a user of a set of users. In some examples, the method may include determining that a behavior associated with the user of the set of users is abnormal based on the tensor model, adapting the tensor model based on feedback from an additional user of a set of additional users different from the set of users, and performing a security action on at least one computing device to protect against the abnormal user behavior based on the adapting.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

83.

Systems and methods for preventing data loss from data containers

      
Numéro d'application 16050211
Numéro de brevet 11068611
Statut Délivré - en vigueur
Date de dépôt 2018-07-31
Date de la première publication 2021-07-20
Date d'octroi 2021-07-20
Propriétaire CA, Inc. (USA)
Inventeur(s) Sarin, Sumit

Abrégé

The disclosed computer-implemented method for preventing data loss from data containers may include (1) identifying, at a computing device, a process running in a data container on the computing device, (2) intercepting an attempt by the process to exfiltrate information from the computing device via at least one of a file system operation or a network operation, and (3) performing a security action to prevent the intercepted attempt. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/60 - Protection de données
  • G06F 16/13 - Structures d’accès aux fichiers, p. ex. indices distribués

84.

Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise

      
Numéro d'application 16125397
Numéro de brevet 11030311
Statut Délivré - en vigueur
Date de dépôt 2018-09-07
Date de la première publication 2021-06-08
Date d'octroi 2021-06-08
Propriétaire CA, Inc. (USA)
Inventeur(s) Lopez, Alejandro Mosquera

Abrégé

Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise. A method may include obtaining data associated with an existence a computer file in a first computing device and a second computing device of an enterprise, detecting a pattern of lateral movement of the computer from the first computing device to the second computing device over a predetermined period of time, based on the data, calculating a likelihood score that the computer file is malicious based on the detected pattern, determining that the likelihood score satisfies a predetermined breach threshold, and in response to determining that the likelihood score satisfies the predetermined breach threshold, initiating remedial action on the computer file to protect the enterprise against the computer file.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06N 20/00 - Apprentissage automatique

85.

Systems and methods for preserving system contextual information in an encapsulated packet

      
Numéro d'application 16130977
Numéro de brevet 11012259
Statut Délivré - en vigueur
Date de dépôt 2018-09-13
Date de la première publication 2021-05-18
Date d'octroi 2021-05-18
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Mcconnaughay, Mark
  • Tomic, Gary
  • Frederick, Ron

Abrégé

The disclosed computer-implemented method for preserving system contextual information in an encapsulated packet may include (1) receiving, at a computing device, a network packet from the network via a network adapter port, (2) encapsulating the received network packet with a tunnel header, where a network identifier field in the tunnel header comprises information identifying the network adapter port, (3) determine an outer Internet protocol (IP) address for the encapsulated network packet, where the destination IP address corresponds to a destination on the network, (4) addressing an outer header of the encapsulated network packet with the IP address, and (5) sending the encapsulated network packet toward the destination identified by the destination IP address. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

86.

Systems and methods for tuning application network behavior

      
Numéro d'application 16009125
Numéro de brevet 11005867
Statut Délivré - en vigueur
Date de dépôt 2018-06-14
Date de la première publication 2021-05-11
Date d'octroi 2021-05-11
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Song, Qu Bo
  • Li, Weiliang

Abrégé

The disclosed computer-implemented method for tuning application network behavior may include identifying an application for a closed operating system. The closed operating system may prevent applications from implementing machine-level traffic control for network traffic. The method may include determining an expected network behavior of the application, intercepting network traffic of the application on the closed operating system, determining whether the intercepted network traffic conforms to the expected network behavior, and modifying, based on the determining whether the intercepted network traffic conforms to the expected network behavior, the network traffic. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 24/08 - Réalisation de tests en trafic réel

87.

Systems and methods for preventing electronic form data from being electronically transmitted to untrusted domains

      
Numéro d'application 16363936
Numéro de brevet 11003746
Statut Délivré - en vigueur
Date de dépôt 2019-03-25
Date de la première publication 2021-05-11
Date d'octroi 2021-05-11
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Vashishtha, Parveen
  • Chandrayan, Siddhesh
  • Kasiviswanathan, Karthikeyan

Abrégé

A computer-implemented method for preventing electronic form data from being electronically transmitted to untrusted domains may include (i) identifying a web page that includes an electronic form with field for data entry, (ii) detecting that the web page is electronically sending first and second messages that each include data from the field of the electronic form and that are directed to first and second destinations, respectively, (iii) determining that the first destination includes an untrusted destination, and (iv) blocking the web page from electronically sending the data from the field of the electronic form to the untrusted destination by blocking the first message from being electronically sent. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/106 - Intégrité des paquets ou des messages

88.

Systems and methods for providing an integrated cyber threat defense exchange platform

      
Numéro d'application 16147051
Numéro de brevet 10986117
Statut Délivré - en vigueur
Date de dépôt 2018-09-28
Date de la première publication 2021-04-20
Date d'octroi 2021-04-20
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Agbabian, Paul
  • Roupski, Roumen
  • Mulcahy, Lois

Abrégé

The disclosed computer-implemented method for providing an integrated cyber threat defense exchange platform may include (i) receiving unnormalized security data from a plurality of disparate security data sources that generate security data in differing formats, (ii) normalizing, using a security data schema, the unnormalized security data into normalized security data, (iii) identifying a security action that is responsive to at least one security event identified within the normalized security data, and (iv) coordinating performance of the security action within a plurality of networked computing devices. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

89.

Systems and methods for protecting website visitors

      
Numéro d'application 15919246
Numéro de brevet 10986100
Statut Délivré - en vigueur
Date de dépôt 2018-03-13
Date de la première publication 2021-04-20
Date d'octroi 2021-04-20
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Smith, Spencer
  • Viljoen, Petrus Johannes

Abrégé

The disclosed computer-implemented method for protecting website visitors may include (i) retrieving an instance of a website that was dynamically generated by aggregating multiple website subcomponents, (ii) decomposing the instance of the website into the multiple website subcomponents, (iii) checking whether a website subcomponent has been previously scanned by a security scanner, (iv) accelerating a review of the instance of the website by reusing results of a previous scan of the website subcomponent that was performed in response to retrieving a different instance of the website subcomponent rather than performing an original scan of the website subcomponent, and (v) protecting a visitor of the website by modifying a display of the instance of the website based on the accelerated review of the instance of the website that reused results of the previous scan of the website subcomponent. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
  • G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus

90.

Method to assess internal security posture of a computing system using external variables

      
Numéro d'application 16010121
Numéro de brevet 10977374
Statut Délivré - en vigueur
Date de dépôt 2018-06-15
Date de la première publication 2021-04-13
Date d'octroi 2021-04-13
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Kuppa, Aditya
  • Vervier, Pierre-Antoine
  • Grzonkowski, Slawomir
  • Shen, Yun

Abrégé

Methods and systems are provided for generating a security profile for a new computing system. One example method generally includes obtaining, over a network, information associated with a plurality of existing computing systems and generating, by a clustering algorithm, a set of clusters based on the information associated with the plurality of existing computing systems. The method further includes obtaining external data associated with the computing system and classifying the computing system into a cluster in the set of clusters based on the external data associated with the computing system. The method further includes determining the security profile based on statistics associated with the cluster and transmitting, over the network, an indication of the security profile.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

91.

Systems and methods for preventing sharing of sensitive content in image data on a closed computing platform

      
Numéro d'application 16433691
Numéro de brevet 10970532
Statut Délivré - en vigueur
Date de dépôt 2019-06-06
Date de la première publication 2021-04-06
Date d'octroi 2021-04-06
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Song, Qubo
  • Chen, Joseph
  • Jeong, Oksoon
  • Liu, Zhe
  • Houston, Chris

Abrégé

The disclosed computer-implemented method for preventing sharing of sensitive content in image data on a closed computing platform may include (i) detecting initiation of a network connection for sending network traffic data to a data storage service on the closed computing platform, (ii) monitoring the sending of the network traffic data to identify a target traffic indicator associated with image data, (iii) interrupting the sending of the network traffic data upon identifying the target traffic indicator, (iv) analyzing the image data to identify sensitive content, and (v) performing a security action that protects against the sensitive content being shared to the data storage service on the closed computing platform. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 20/00 - Apprentissage automatique

92.

Image quality optimization during remote isolated sessions

      
Numéro d'application 16024492
Numéro de brevet 10949488
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de la première publication 2021-03-16
Date d'octroi 2021-03-16
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Kanfer, Amit
  • Horman, Yoav

Abrégé

Image quality optimization during remote isolated sessions. In one embodiment, a method may include a remote isolation server receiving, at a remote isolation server, a request from a local browser on a local network device to obtain webpage data from a webserver, requesting, from the webserver, the webpage data, receiving, from the webserver, the requested webpage data, rendering a first image of the requested webpage data, storing a first copy of the first image of the requested webpage data in memory associated with the remote isolation server, compressing a first portion of the first image using a first compression method, sending, from the remote isolation server, the compressed first portion of the first image to the local browser, compressing a second portion of the first image using a second compression method, and sending the compressed second portion of the first image to the local browser.

Classes IPC  ?

  • G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus
  • G06F 40/197 - Gestion des versions
  • G06F 40/14 - Documents en configuration arborescente
  • G06F 40/146 - Codage ou compression de données en configuration arborescente
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

93.

Automated scoring of intra-sample sections for malware detection

      
Numéro d'application 16020632
Numéro de brevet 10929531
Statut Délivré - en vigueur
Date de dépôt 2018-06-27
Date de la première publication 2021-02-23
Date d'octroi 2021-02-23
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Kenemer, Keith
  • Curtin, Ryan

Abrégé

Methods and systems are provided for detecting malware. One example method generally includes receiving a reference dataset comprising an aggregation of probability distributions of a plurality of intra-file patterns for a plurality of files of at least a first class and applying a logical query to the reference dataset to generate a template distribution with probability distributions of the plurality of intra-file patterns calculated according to one or more logical operators in the logical query. The method further includes detecting a likely presence of malware in a computer file by indicating one or more areas in the computer file based on at least a portion of the calculated probability distributions of the plurality of intra-file patterns in the template distribution.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

94.

Secure quarantine of potentially malicious content

      
Numéro d'application 16143031
Numéro de brevet 10909245
Statut Délivré - en vigueur
Date de dépôt 2018-09-26
Date de la première publication 2021-02-02
Date d'octroi 2021-02-02
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Saxonberg, Jordan
  • Chen, Joe H.

Abrégé

Secure Quarantine of Potentially Malicious Content. In one embodiment, a method for secure quarantine of potentially malicious content may include receiving a computer file from a third party, preventing the computer file from initially being accessed by a user associated with the computing device, collecting metadata from the computer file, encrypting the file and the collected metadata using a first encryption key, creating an encrypted computer file, encrypting the first encryption key using an asymmetric key, embedding the encrypted computer file into a new computer file, wherein at least one file object that is in the encrypted computer file is removed from the new computer file, enabling user access to the new computer file and the embedded encrypted computer file.

Classes IPC  ?

  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/60 - Protection de données

95.

Document sanitization

      
Numéro d'application 16143019
Numéro de brevet 10904285
Statut Délivré - en vigueur
Date de dépôt 2018-09-26
Date de la première publication 2021-01-26
Date d'octroi 2021-01-26
Propriétaire CA, Inc. (USA)
Inventeur(s)
  • Saxonberg, Jordan
  • Chen, Joe H.

Abrégé

In one embodiment, a method for electronic document sanitization may include receiving a first request from a client device to send a first electronic document, the first request including a requested usability level of the first electronic document, removing at least one document object from the first electronic document, the document object having potentially malicious content, the removing based at least in part on receiving the first request, and transmitting the first electronic document to the client device after removing the at least one document object therefrom.

Classes IPC  ?

  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
  • G06F 40/166 - Édition, p. ex. insertion ou suppression

96.

Systems and methods for improving performance of cascade classifiers for protecting against computer malware

      
Numéro d'application 15938377
Numéro de brevet 10891374
Statut Délivré - en vigueur
Date de dépôt 2018-03-28
Date de la première publication 2021-01-12
Date d'octroi 2021-01-12
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Curtin, Ryan
  • Kenemer, Keith

Abrégé

The disclosed computer-implemented method for improving performance of cascade classifiers for protecting against computer malware may include receiving a training dataset usable to train a cascade classifier of a machine-learning classification system. A sample to add to the training dataset may be received. A weight for the sample may be calculated. The training dataset may be modified using the sample and the weight. A weighted training for the cascade classifier of the machine-learning classification system may be performed using the modified training dataset. Computer malware may be identified using the cascade classifier. In response to identifying the computer malware, a security action may be performed to protect the one or more computing devices from the computer malware. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique

97.

Detonate targeted malware using environment context information

      
Numéro d'application 16018340
Numéro de brevet 10885191
Statut Délivré - en vigueur
Date de dépôt 2018-06-26
Date de la première publication 2021-01-05
Date d'octroi 2021-01-05
Propriétaire CA, Inc. (USA)
Inventeur(s) Gupta, Prashant

Abrégé

In one embodiment, a computer-implemented method for using customer context to detonate malware may be performed by one or more computing devices, each comprising one or more processors. The method may include receiving an artefact associated with a first device being targeted by malware, simulating in a controlled environment attributes of the first device based at least in part on the artefact, executing the malware in the controlled environment while the attributes of the first device are being simulated, and performing a security action with respect to the malware based at least in part on the execution of the malware in the controlled environment.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

98.

Systems and methods for identifying users

      
Numéro d'application 16018044
Numéro de brevet 10887307
Statut Délivré - en vigueur
Date de dépôt 2018-06-25
Date de la première publication 2021-01-05
Date d'octroi 2021-01-05
Propriétaire CA, INC. (USA)
Inventeur(s)
  • Newstadt, Keith
  • Sokolov, Ilya

Abrégé

The disclosed computer-implemented method for identifying users may include (i) detecting that a user at an endpoint computing device is connecting to an identity provider, (ii) detecting, after detecting that the user at the endpoint computing device is connecting to the identity provider, that a mobile device has received a second-factor authentication message, (iii) discovering, by a security service, that the user at the endpoint computing device matches a known user profile registered to the mobile device by correlating the user at the endpoint computing device connecting to the identity provider with the mobile device receiving the second-factor authentication message, and (iv) applying a security policy to the user at the endpoint computing device based on the known user profile matched to the user by the security service. Various other methods, systems, and computer-readable media are also disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

99.

Deception service for email attacks

      
Numéro d'application 15940787
Numéro de brevet 10855722
Statut Délivré - en vigueur
Date de dépôt 2018-03-29
Date de la première publication 2020-12-01
Date d'octroi 2020-12-01
Propriétaire CA, Inc. (USA)
Inventeur(s) Vadlamani, Ananta Krishna

Abrégé

Systems, apparatuses, methods, and computer readable mediums for implementing an email deception service. A system includes one or more processors coupled to one or more memories storing program instructions. The program instructions are executable by the processor(s) to scan live emails for suspicious emails. The suspicious emails are emails with phishing links, business compromise emails, emails with malware attachments, and so on. When a suspicious email is detected, the processor(s) execute the program instructions to interact with the suspicious email in a way that mimics an end-user. A set of decoy credentials are provided to an attacker during the interaction, and then a decoy account is monitored for accesses by the attacker using the decoy credentials. Accesses to the decoy account are monitored and recorded to obtain intelligence on the attacker.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/58 - Systèmes de commutation de messages
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

100.

Peer-to-peer network for blockchain security

      
Numéro d'application 16418475
Numéro de brevet 11526610
Statut Délivré - en vigueur
Date de dépôt 2019-05-21
Date de la première publication 2020-11-26
Date d'octroi 2022-12-13
Propriétaire Veracode, Inc. (USA)
Inventeur(s)
  • Bacher, Anna
  • Gstrein, Erich

Abrégé

A method and apparatus utilize a peer-to-peer network of security nodes collectively adhering to a protocol for inter-node communication. The system is comprised a plurality of first security nodes, at least one second security node, and at least one third security node. The plurality of first security nodes receive at least one of pre-trained detection models and rules, monitor at least one of a blockchain and connected devices for malicious behavior based on the received at least one of pre-trained detection models and rules, and report the malicious behavior. The at least one second security node creates and communicates the at least one of pre-trained detection models and rules to the plurality of first security nodes. The at least one third security node is informed by the at least one second security node of the reported malicious behavior.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 20/00 - Apprentissage automatique
  • H04L 41/0681 - Configuration des conditions de déclenchement
  • G06F 16/182 - Systèmes de fichiers distribués
  1     2     3     ...     23        Prochaine page