UAB 360 IT

Lituanie

Retour au propriétaire

1-100 de 421 pour UAB 360 IT Trier par
Recheche Texte
Affiner par
Date
Nouveautés (dernières 4 semaines) 1
2025 juillet (MACJ) 1
2025 juin 2
2025 mai 2
2025 avril 3
Voir plus
Classe IPC
H04L 9/40 - Protocoles réseaux de sécurité 232
H04L 9/08 - Répartition de clés 85
H04L 12/46 - Interconnexion de réseaux 68
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système 51
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 38
Voir plus
Statut
En Instance 62
Enregistré / En vigueur 359
Résultats pour  brevets
  1     2     3     ...     5        Prochaine page

1.

PROVIDING A SPLIT-CONFIGURATION VIRTUAL PRIVATE NETWORK

      
Numéro d'application 19084927
Statut En instance
Date de dépôt 2025-03-20
Date de la première publication 2025-07-03
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Celiesius, Kazimieras

Abrégé

A method in a virtual private network (VPN) environment is disclosed. A user device transmits, to a VPN server before establishment of a VPN connection between the user device and the VPN server, an initiation request to establish the VPN connection. The initiation request includes remote content information indicating remote content that is unavailable in a geographic location of the user device. The user device receives, from the VPN server after establishment of the VPN connection, the remote content based at least in part on a configuration of domain name services (DNS) settings associated with the VPN connection to utilize a remote DNS server that is capable of obtaining the remote content. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

2.

VPN SERVER SELECTION BASED ON INTENDED NETWORK USAGE

      
Numéro d'application 19068833
Statut En instance
Date de dépôt 2025-03-03
Date de la première publication 2025-06-19
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Mineikis, Karolis
  • Naujokas, Ugnius

Abrégé

A request for a virtual private network (VPN) server is received at a central server from a user device. The request includes an intended network usage. A list of VPN servers is transmitted to the user device. Network test results that include network statistics measured between the user device and the VPN servers of the list of VPN servers are received from the user device. VPN server scores for the VPN servers are updated based on the network test results, the intended network usage, and at least one network condition associated with the intended network usage. An updated list of VPN servers ordered based on the updated VPN server scores is generated. The updated list of VPN servers is transmitted to the user device.

Classes IPC  ?

3.

Enhanced Privacy Preserving Access To A VPN Service

      
Numéro d'application 19048178
Statut En instance
Date de dépôt 2025-02-07
Date de la première publication 2025-06-05
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Nagrockas, Povilas
  • Norbutas, Emanuelis

Abrégé

A VPN service assigns a first private IP address for a VPN concentrator and a second private IP address for a user device. Packets originating from the user device are modified by translating the second private IP address to a unique private IP address managed by the VPN concentrator, and translating the unique private IP address to a public IP address of the VPN concentrator. VPN session data, including the unique private IP address and an identifier associated with the user device, is registered in a peer hashtable. Inbound packets received from an external network are modified by translating the public IP address to the unique private IP address using the stored VPN session data, and then translating the unique private IP address to the second private IP address associated with the user device. The modified inbound packets are sent to the user device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/7453 - Recherche de table d'adressesFiltrage d'adresses en utilisant le hachage
  • H04L 61/2539 - Traduction d'adresses de protocole Internet [IP] en masquant les adressesTraduction d'adresses de protocole Internet [IP] en gardant les adresses anonymes
  • H04L 61/2592 - Traduction d'adresses de protocole Internet [IP] en utilisant la tunnelisation ou l'encapsulation

4.

SYSTEM AND METHOD FOR DECENTRALIZED INTERNET TRAFFIC FILTERING POLICY REPORTING

      
Numéro d'application 18965378
Statut En instance
Date de dépôt 2024-12-02
Date de la première publication 2025-05-15
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Celiesius, Kazimieras

Abrégé

A system and method to filter potentially unwanted traffic from trackers, third-party cookies, malicious websites or other sources and present the aggregated results of said filtering to the VPN user. One of the embodiments enables a VPN user to opt-in or opt-out from the filtering activities while being able to access the aggregated information about filtering. In another embodiment, the user can choose to customize the filtering parameters to add or remove specific targets from the filtering policies.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

5.

MANAGING ACCESS TO DATA

      
Numéro d'application 19017402
Statut En instance
Date de dépôt 2025-01-10
Date de la première publication 2025-05-08
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method including configuring a user device to receive encrypted content and an encrypted assigned private key associated with the encrypted content; configuring the user device to decrypt the encrypted assigned private key based on utilizing a master key to determine a decrypted assigned private key; configuring the user device to determine a combination decryption key based on utilizing the decrypted assigned private key and an access public key associated with the encrypted content; configuring the user device to decrypt an encrypted access private key associated with the access public key to determine a decrypted access private key; and configuring the user device to decrypt the encrypted content based on utilizing the decrypted access private key is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes

6.

Augmenting web servers with endpoints

      
Numéro d'application 18631343
Numéro de brevet 12278876
Statut Délivré - en vigueur
Date de dépôt 2024-04-10
Date de la première publication 2025-04-15
Date d'octroi 2025-04-15
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Stanga, Vilius

Abrégé

An intermediary between a client and a target receives response data from the target based on a first request from the client to the target. The intermediary includes in the response data an endpoint interpretable by the client as being available at the target. The intermediary receives a second request from the client directed to the target at the endpoint. The intermediary processes the second request directed to the target without forwarding the second request to the target.

Classes IPC  ?

  • H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
  • H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande

7.

IDENTITY-BASED DISTRIBUTED CLOUD FIREWALL FOR ACCESS AND NETWORK SEGMENTATION

      
Numéro d'application 18662783
Statut En instance
Date de dépôt 2024-05-13
Date de la première publication 2025-04-10
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Salas Lumbreras, Carlos Eliseo
  • Gurinaviciute, Juta

Abrégé

According to some embodiments, a method of controlling access to network resources includes: receiving an authentication request from a user device to a core security service; if the user is authenticated, authorizing the user device to connect to a private cloud, and connecting the user device with the private cloud and retrieving user-specific segmented firewall rules stored in the private cloud; routing, through the firewall rules, a request by the user device to access an outer resource; evaluating the request against the firewall rules; if the request meets the firewall rules, routing the request through security measures of the firewall; and if the request does not meet the firewall rules, denying the user device access to the outer resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

8.

OPTIMIZED UTILIZATION OF INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK

      
Numéro d'application 18977846
Statut En instance
Date de dépôt 2024-12-11
Date de la première publication 2025-04-03
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Funka, Zenonas

Abrégé

A method for configuring a VPN server to receive a first data request to retrieve first data of interest from a first host device; configuring the VPN server to utilize a first exit IP address to transmit a first query for retrieving the first data of interest from the first host device; configuring the VPN server to determine, based on transmitting the first query, that the first exit IP address is blocked by the first host device; configuring the VPN server to suspend, based on determining that the first exit IP address is blocked, utilization of the first exit IP address for retrieving the first data of interest from the first host device; and configuring the VPN server to utilize the first exit IP address to transmit a second query for retrieving second data of interest from a second host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

9.

VIRTUAL PRIVATE NETWORK CONNECTION STATUS MONITORING

      
Numéro d'application 18977310
Statut En instance
Date de dépôt 2024-12-11
Date de la première publication 2025-03-27
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Mineikis, Karolis
  • Baltrenas, Lukas
  • Neznanovas, Edvardas

Abrégé

A computing device receives, based on a request to connect to a virtual private network (VPN), a signal that the computing device has been connected to the VPN. The computing device receives handshake data from a server of the VPN. The computing device determines that a threshold time period has passed since a latest-in-time handshake notification of the handshake data, wherein the threshold time period is determined according to a schedule selected based on a connection status between the computing device and the VPN. The computing device provides, based on determining that the threshold time period has passed since the latest-in-time handshake notification of the handshake data, an indicator that the computing device is no longer connected to the VPN.

Classes IPC  ?

  • H04L 67/141 - Configuration des sessions d'application
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 67/145 - Interruption ou inactivation de sessions, p. ex. fin de session contrôlée par un événement en évitant la fin de session, p. ex. maintien en vie, battements de cœur, message de reprise ou réveil pour une session inactive ou interrompue

10.

ENABLING SECURE AUTO-FILLING OF INFORMATION

      
Numéro d'application 18967564
Statut En instance
Date de dépôt 2024-12-03
Date de la première publication 2025-03-20
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Reigis, Justinas

Abrégé

The present disclosure discloses an infrastructure device that configures a user device to: receive a trained machine learning (ML) model to enable the user device to determine a given type of input information to be auto-fill in an observed field portion in an observed network element; analyze an observed source code associated with the observed network element to determine an observed characteristic associated with the observed field portion that is configured to accept the given type of input information; calculate an observed signature associated with the observed field portion based on the observed characteristic; utilize the trained ML model to evaluate the observed signature to determine the given type of input information; and to auto-fill, in the observed field portion, input information in accordance with the given type of input information. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 40/174 - Remplissage de formulairesFusion
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes

11.

ORGANIZED DATA STORAGE SYSTEM

      
Numéro d'application 18957630
Statut En instance
Date de dépôt 2024-11-22
Date de la première publication 2025-03-13
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

The present disclosure discloses configuring a device to determine an assigned public key and an assigned private key; configuring the device to determine a content access public key and a content access private key; configuring the device to determine, for a folder, a folder access public key and a folder access private key; configuring the device to encrypt the content access private key by utilizing the assigned public key; configuring the device to encrypt the content access private key by utilizing the folder access public key; configuring the device to transmit the encrypted content, the first encrypted content access private key, and the second encrypted content access private key to a server for storage; and configuring the device to access, from the server, the encrypted content by decrypting the first encrypted content access private key or by decrypting the second encrypted content access private key. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]

12.

IDENTIFYING VIRTUAL PRIVATE NETWORK SERVERS FOR USER DEVICES

      
Numéro d'application 18887818
Statut En instance
Date de dépôt 2024-09-17
Date de la première publication 2025-03-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Kolaitis, Tomas
  • Neubauer, Vytautas

Abrégé

An Internet Service Provider (ISP) of a user device is identified. At least one VPN server of available VPN servers is identified based on data indicative of respective histories of successful connections from devices in a location of the user device to the available VPN servers via the ISP, The at least one VPN server is then transmitted to the user device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/1021 - Sélection du serveur pour la répartition de charge basée sur la localisation du client ou du serveur

13.

ACCESS CONTROL FOR NETWORK SERVICES

      
Numéro d'application 18950814
Statut En instance
Date de dépôt 2024-11-18
Date de la première publication 2025-03-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method including receiving, by a manager device from an infrastructure device, seed information including unique information associated with manager device to enable the manager device to determine authorization information; determining, by the manager device, the authorization information based at least in part on utilizing the unique information; transmitting, by the manager device to the infrastructure device, a manager request related to an action to be performed regarding the network services, the manager request being signed based at least in part on utilizing a portion of the authorization information; and performing, by the manager device based at least in part on authorization of the manager request by the infrastructure device, the action regarding the network services is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 41/28 - Restriction de l’accès aux systèmes ou aux fonctions de gestion de réseau, p. ex. en utilisant la fonction d’autorisation pour accéder à la configuration du réseau
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/146 - Marqueurs pour l'identification sans ambiguïté d'une session particulière, p. ex. mouchard de session ou encodage d'URL

14.

SECURE CONFIGURATION OF A VIRTUAL PRIVATE NETWORK SERVER

      
Numéro d'application 18947748
Statut En instance
Date de dépôt 2024-11-14
Date de la première publication 2025-02-27
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Pabijanskas, Karolis

Abrégé

A method including storing, by a virtual private network (VPN) server, an initial operating system in a memory associated with the VPN server; transmitting, by the VPN server while executing the initial operating system, a request to obtain a VPN operating system to enable the VPN server to provide VPN services; receiving, by the VPN server based at least in part on transmitting the request, the VPN operating system; storing, by the VPN server, the VPN operating system in the memory associated with the VPN server; and executing, by the VPN server, the VPN operating system to provide the VPN services based at least in part on storing the VPN operating system is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/4401 - Amorçage
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]

15.

SYSTEM AND METHOD FOR BINARY CODE DECOMPILATION USING MACHINE LEARNING

      
Numéro d'application 18948201
Statut En instance
Date de dépôt 2024-11-14
Date de la première publication 2025-02-27
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Ševcenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

Systems and methods for decompiling binary code or executables are provided herein. In some embodiments, a method of training a machine learning algorithm for decompiling binary code into readable source code includes collecting a data set of source code and at least one element associated with the source code; providing binary code using the data set; training a model configured to decompile the binary code into source code using the data set by: decompiling the collected binary code into intermediate source code; comparing the source code in the data set with the intermediate source code; and updating the model and repeating the training if the source code in the data set differs from the intermediate source code by more than a threshold amount.

Classes IPC  ?

16.

DOMAIN NAME SYSTEM CONFIGURATION DURING VIRTUAL PRIVATE NETWORK CONNECTION

      
Numéro d'application 18887795
Statut En instance
Date de dépôt 2024-09-17
Date de la première publication 2025-02-20
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Baltrenas, Lukas

Abrégé

Domain name system (DNS) configuration during virtual private network (VPN) connection includes, by a VPN entry server, receiving from a client device, via a VPN tunnel between the entry server and the client device, a first request for first content that identifies a first external source for the first content, receiving, from an operative DNS server configured for the tunnel, an Internet Protocol (IP) address of a first VPN system exit server, in response to determining that the first content is unavailable via the first system exit server, identifying a second DNS server, such that a second VPN system exit server for obtaining the first content is available using the second DNS server, obtaining, from the second system exit server, the first content, wherein the second system exit server obtained the first content from the first external source, and transmitting, to the client device, via the tunnel, the first content.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 12/46 - Interconnexion de réseaux

17.

System and method for reestablishing VPN connections

      
Numéro d'application 18584549
Numéro de brevet 12231504
Statut Délivré - en vigueur
Date de dépôt 2024-02-22
Date de la première publication 2025-02-18
Date d'octroi 2025-02-18
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Kalvaitis, Evaldas
  • Vienažindys, Ignas
  • Martišius, Paulius

Abrégé

Disclosed herein are an exemplary system and method for recurring VPN connections. The exemplary system and method are used for detecting the situations in which a user device is not able to establish VPN, detecting the situations in which the user device with active VPN connections is/are not able to reach resources on a network. The exemplary system and method also provide user device protected data transmission without data leakage during attempts at recurring VPN connections. The exemplary system and method include retry flow strategies, along with in-application enabled user decisions, and user-specific dataset flows.

Classes IPC  ?

18.

OPTIMIZED ACCESS CONTROL SYSTEM

      
Numéro d'application 18920962
Statut En instance
Date de dépôt 2024-10-20
Date de la première publication 2025-02-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

The present disclosure discloses configuring a user device to receive an invitation link to enable the user device to receive network services from an infrastructure device; configuring the user device to receive, based on the user device activating the invitation link, seed information to be utilized by the user device to determine authentication information; configuring the user device to transmit, during an active communication session and based on determining the authentication information, a user request related to an action to be performed regarding receiving the network services, a portion of the user request being signed based on utilizing a first portion of the authentication information; and configuring the user device to perform the action regarding receiving the network services based on a verification that the communication session is currently active. Various other aspects are contemplated.

Classes IPC  ?

19.

OPTIMIZED AUTHENTICATION SYSTEM

      
Numéro d'application 18923975
Statut En instance
Date de dépôt 2024-10-23
Date de la première publication 2025-02-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

The present disclosure discloses detecting, by a user device, an attempt by an installed application to access a service to be provided by a service provider to the user device; determining, by the user device based at least in part on detecting the attempt, a first authentication factor based at least in part on decrypting encrypted first factor authentication information; determining, by the user device, a second authentication factor based at least in part on enabling decryption of encrypted second factor authentication information; and enabling, by the user device, authentication with the service provider based at least in part on utilizing the first authentication factor and the second authentication factor. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/40 - Protocoles réseaux de sécurité

20.

Session data integrity verification

      
Numéro d'application 18429670
Numéro de brevet 12204661
Statut Délivré - en vigueur
Date de dépôt 2024-02-01
Date de la première publication 2025-01-21
Date d'octroi 2025-01-21
Propriétaire
  • NETFLOW, UAB (Lituanie)
  • 360 IT, UAB (Lituanie)
  • UAB 360 IT (Lituanie)
Inventeur(s)
  • Virbickas, Domininkas
  • Danek, Kamil
  • Noreika, Vakaris

Abrégé

A validation software obtains a session datum from a request initiating at a device. The validation software hashes the session datum to obtain a hashed session datum. The validation software transmits a validation request that includes a portion of the hashed session datum to a validation server. The portion of the hashed session datum may have a length that is less than a length of the hashed session datum. The validation software determines, and based on a response received from the validation server, that the session datum is likely compromised. In response to determining that the session datum is likely compromised, a notification is output at the device.

Classes IPC  ?

  • G06F 21/60 - Protection de données
  • G06F 21/33 - Authentification de l’utilisateur par certificats
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

21.

Stateless system to enable data breach lookup

      
Numéro d'application 18634920
Numéro de brevet 12197614
Statut Délivré - en vigueur
Date de dépôt 2024-04-13
Date de la première publication 2025-01-14
Date d'octroi 2025-01-14
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Noreika, Vakaris
  • Garbereder, Gerrit Stefan

Abrégé

The present disclosure is directed to a stateless system to enable data breach lookup. The stateless system may include an infrastructure device and a user device. In some aspects, the infrastructure device and the user device may determine whether the private data associated with the user device has been compromised due to a breach. The infrastructure device and/or the user device may utilize a critical combination of one or more of fast hashing algorithms, slow hashing algorithms, secret keys, and salt values to conduct the data breach lookup. In this way, the data breach lookup may be conducted without the user device communicating the private data externally. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

22.

SYSTEM AND METHOD FOR MULTI-LAYERED RULE LEARNING IN URL FILTERING

      
Numéro d'application 18417367
Statut En instance
Date de dépôt 2024-01-19
Date de la première publication 2024-12-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Briliauskas, Mantas
  • Maknickas, Vykintas

Abrégé

A system for URL filtering includes a processor and a memory having stored therein at least programs or instructions executable by the processor to cause the system to filter a received URL by comparing the URL to a blocklist to predict if a resource associated with the URL is malicious, if the URL does not match a URL on the blocklist, filter the URL by applying an ML algorithm to predict whether a resource associated with the URL is malicious, if the resource is not malicious, filter the URL by comparing a visual feature of a resource with a respective visual feature of known non-malicious webpages to identify similarities and/or differences to determine if a resource is malicious, and if the resource is malicious, generate and transmit a URL filter determination that the resource associated with the URL is malicious and update the blocklist to include the URL.

Classes IPC  ?

23.

PROTECTED CONFIGURATION OF A VIRTUAL PRIVATE NETWORK SERVER

      
Numéro d'application 18813241
Statut En instance
Date de dépôt 2024-08-23
Date de la première publication 2024-12-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Liumparas, Petras

Abrégé

A method including transmitting, by virtual private network (VPN) server to an infrastructure device while executing a primary VPN operating system, a request for a custom parameter file to enable the VPN server to provide VPN services; authenticating, by the infrastructure device, the VPN server as an authorized recipient of the custom parameter file; transmitting, by the infrastructure device to the VPN server, the custom parameter file based at least in part on authenticating the VPN server as the authorized recipient of the custom parameter file; and configuring, by the VPN server, the primary VPN operating system to utilize the custom parameter file to enable the VPN server to provide the VPN services is disclosed. Various other aspects are contemplated.

Classes IPC  ?

24.

ACCESSING LOCAL NETWORK DEVICES VIA MESH NETWORK DEVICES

      
Numéro d'application 18201464
Statut En instance
Date de dépôt 2023-05-24
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including receiving, by a first device from a second device in a mesh network, connection information indicating a DNS server associated with a LAN to which the second device is connected; transmitting, by the first device to the DNS server based on the connection information, a query to receive a subnet IP address assigned to a LAN device; receiving, by the first device from the DNS server, the subnet IP address assigned to the LAN device; determining, by the first device based on receiving the subnet IP address from the DNS server, that the LAN device is connected to the LAN; and transmitting, by the first device to the second device, a meshnet packet including data to be transmitted by the second device to the LAN device based on the subnet IP address assigned to the LAN device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie

25.

ACCESSING LOCAL NETWORK DEVICES VIA MESH NETWORK DEVICES

      
Numéro d'application 18201472
Statut En instance
Date de dépôt 2023-05-24
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including configuring a first device to receive, from a second device in a mesh network, connection information indicating a DNS server associated with a LAN to which the second device is connected; configuring the first device to transmit, to the DNS server, a query to receive a subnet IP address assigned to a LAN device; configuring the first device to receive, from the DNS server based on transmitting the query, the subnet IP address assigned to the LAN device; configuring the first device to determine, based on receiving the subnet IP address from the DNS server, that the LAN device is connected to the LAN; and configuring the first device to transmit, to the second device, a meshnet packet including data to be transmitted by the second device to the LAN device based on utilizing the subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie

26.

Optimizing communication between meshnet devices in a mesh network

      
Numéro d'application 18202262
Numéro de brevet 12184605
Statut Délivré - en vigueur
Date de dépôt 2023-05-25
Date de la première publication 2024-11-28
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method in a mesh network including configuring a first device to transmit, to a third-party application installed on the first device, an association between a second device and a unique identifier that identifies the second device; configuring the first device to receive, from the third-party application, a query for a meshnet IP address assigned to the second device, the query including the unique identifier; configuring the first device to transmit, to the third-party application based on receiving the query, the meshnet IP address assigned to the second device; configuring the first device to receive, from the third-party application based on transmitting the meshnet IP address, a communication packet to be transmitted to the second device, the communication packet indicating the meshnet IP address as a destination address; and configuring the first device to transmit the communication packet to the second device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services

27.

Enabling secure auto-filling of information

      
Numéro d'application 18206050
Numéro de brevet 12197848
Statut Délivré - en vigueur
Date de dépôt 2023-06-05
Date de la première publication 2024-11-28
Date d'octroi 2025-01-14
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Reigis, Justinas

Abrégé

A user device to receive, from an infrastructure device, a trained machine learning (ML) model to enable the user device to determine a given type of input information to be auto-fill in an observed field portion in an observed network element; analyze an observed source code associated with the observed network element to determine an observed characteristic associated with the observed field portion that is configured to accept the given type of input information; calculate an observed signature associated with the observed field portion based at least in part on the observed characteristic; utilize the trained ML model to evaluate the observed signature to determine the given type of input information; and auto-fill, in the observed field portion, input information in accordance with the given type of input information is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 40/174 - Remplissage de formulairesFusion
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes

28.

SYSTEMS AND METHODS FOR REMOVING PERSONAL DATA

      
Numéro d'application 18322991
Statut En instance
Date de dépôt 2023-05-24
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Belejevas, Darius
  • Rudžiunas, Arnas

Abrégé

A service that allows user to request personal data be removed from multiple data brokers or people search providers and tracks the requests is provided. A user provides identifying data that can be used to verify their identify to the service. The identifying data may include information such as name, current and/or previous addresses, email address, telephone number, sex, birthdate, etc. With respect to data brokers, the service retrieves information retrieves requirements for each of a plurality of data brokers. Based on the identifying data and the requirements, the service sends an instruction to the data broker to delete the private data. As responses are received from the data brokers, the service updates a report where the user can view information about each data broker and whether or not each data broker has deleted the user's private data.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

29.

OPTIMIZING ACCESS TO LOCAL NETWORK DEVICES VIA MESH NETWORK DEVICES

      
Numéro d'application 18782021
Statut En instance
Date de dépôt 2024-07-23
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method, in an external meshnet device in communication with a first meshnet device and a second meshnet device, includes determining, based on comparing (i) a first range of first subnet IP addresses associated with a first LAN connected to the first meshnet device and (ii) a second range of second subnet IP addresses associated with a second LAN connected to the second meshnet device, a conflict that a first subnet IP address assigned to a first LAN device in the first LAN is the same as a second subnet IP address assigned to a second LAN device in the second LAN; mapping, based on determining the conflict, an alternate IP address to correspond with the first subnet IP address; and communicating with the first LAN device based on utilizing the alternate IP address instead of the first subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 61/2521 - Architectures de traduction autres que les serveurs de traduction d’adresses de réseau [NAT] pour réseau unique
  • H04L 45/7452 - Opérations multiples parallèles ou consécutives de recherche
  • H04L 49/00 - Éléments de commutation de paquets

30.

SYSTEMS AND METHODS FOR REMOVING PERSONAL DATA

      
Numéro d'application 18323512
Statut En instance
Date de dépôt 2023-05-25
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Belejevas, Darius
  • Butkus, Martynas

Abrégé

A service that allows user to request personal data be removed from multiple data brokers or people search providers and tracks the requests is provided. A user provides identifying data that can be used to verify their identify to the service. The identifying data may include information such as name, current and/or previous addresses, email address, telephone number, sex, birthdate, etc. With respect to data brokers, the service retrieves information retrieves requirements for each of a plurality of data brokers. Based on the identifying data and the requirements, the service sends an instruction to the data broker to delete the private data. As responses are received from the data brokers, the service updates a report where the user can view information about each data broker and whether or not each data broker has deleted the user's private data.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation

31.

Performance-based parallel tunneling of virtual private network servers

      
Numéro d'application 18200952
Numéro de brevet 12184613
Statut Délivré - en vigueur
Date de dépôt 2023-05-23
Date de la première publication 2024-11-28
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Murauskas, Gytis
  • Funka, Zenonas

Abrégé

A method in a VPN environment, including determining, by a VPN infrastructure device, first and second VPN protocols that are available for providing VPN services to a user device, the first VPN protocol being different from the second VPN protocol; transmitting, by the VPN infrastructure device to the user device, a list indicating first VPN servers that utilize the first VPN protocol and second VPN servers that utilize the second VPN protocol; and establishing, by the user device at substantially the same time, a first parallel VPN connection with a first VPN server from among the first plurality of VPN servers, the first VPN connection configured to utilize the first VPN protocol, and a second parallel VPN connection with a second VPN server from among the second plurality of VPN servers, the second VPN connection configured to utilize the second VPN protocol is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

32.

ACCESSING LOCAL NETWORK DEVICES VIA MESH NETWORK DEVICES

      
Numéro d'application 18201468
Statut En instance
Date de dépôt 2023-05-24
Date de la première publication 2024-11-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including configuring a first device to receive, from a second device in a mesh network, connection information associated with a LAN to which the second device is connected; configuring the first device to calculate, based on utilizing the connection information, a range of subnet IP addresses associated with the LAN; configuring the first device to determine that a LAN device is connected to the LAN based on determining that a sample subnet IP address associated with the LAN device falls within the range of subnet IP addresses associated with the LAN; and configuring the first device to transmit, to the second device via the meshnet connection in the mesh network, an initiation meshnet packet including information to be transmitted by the second device to the LAN device via a LAN connection between the second meshnet device and the LAN device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie

33.

Optimizing communication between meshnet devices in a mesh network

      
Numéro d'application 18202258
Numéro de brevet 12273319
Statut Délivré - en vigueur
Date de dépôt 2023-05-25
Date de la première publication 2024-11-28
Date d'octroi 2025-04-08
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method in a mesh network including a first device and a second device, the method including receiving, by the first device from a third-party application installed on the first device, an initiation packet including information to be received by the second device, the initiation packet indicating a meshnet IP address assigned to the second device as a destination address; transmitting, by the first device via a meshnet connection between the first device and the second device, the initiation packet to the second device; receiving, by the first device via the meshnet connection and based at least in part on transmitting the initiation packet, a response packet from the second device, the response packet including information to be received by the third-party application; and transmitting, by the first device, the response packet to the third-party application is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 12/70 - Systèmes de commutation par paquets
  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]
  • H04L 61/5038 - Allocation d'adresse pour une utilisation locale, p. ex. dans des réseaux LAN ou USB, ou dans un réseau de contrôle [CAN]
  • H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
  • H04W 48/08 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration

34.

Performance-based parallel tunneling of virtual private network servers

      
Numéro d'application 18206047
Numéro de brevet 12184614
Statut Délivré - en vigueur
Date de dépôt 2023-06-05
Date de la première publication 2024-11-28
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Murauskas, Gytis
  • Funka, Zenonas

Abrégé

A VPN infrastructure device, configured to receive a connection request for requesting VPN services; determine first and second VPN protocols that are available for providing the VPN services, the first VPN protocol being different from the second VPN protocol; determine a list indicating a first plurality of VPN servers configured to utilize the first VPN protocol and a second plurality of VPN servers configured to utilize the second VPN protocol; transmit the list indicating the first and second plurality of VPN servers; and enable a first VPN server from among the first plurality of VPN servers and a second VPN server from among the second plurality of VPN servers to provide, at substantially the same time, the VPN services to the user device, the first VPN server utilizing the first VPN protocol and the second VPN server utilizing the second VPN protocol is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

35.

Performance-based parallel tunneling of virtual private network servers

      
Numéro d'application 18206048
Numéro de brevet 12184615
Statut Délivré - en vigueur
Date de dépôt 2023-06-05
Date de la première publication 2024-11-28
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Murauskas, Gytis
  • Funka, Zenonas

Abrégé

A user device, configured to transmit a connection request for requesting VPN services; receive, based on transmitting the connection request, a list indicating a first plurality of VPN servers configured to utilize a first VPN protocol and a second plurality of VPN servers configured to utilize a second VPN protocol, the first VPN protocol being different from the second VPN protocol; transmit, at substantially the same time, a first initiation request to request establishment of a first parallel VPN connection with a first VPN server, and a second initiation request to request establishment of a second parallel VPN connection with a second VPN server; and establish, based on transmitting the first and second initiation requests, the first parallel VPN connection with the first VPN server and the second parallel VPN connection with the second VPN server is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

36.

Conflict resolution to enable access to local network devices via mesh network devices

      
Numéro d'application 18201491
Numéro de brevet 12155623
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-11-26
Date d'octroi 2024-11-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method in a mesh network including a first device connected to a first LAN and a second device connected to a second LAN, comprising: determining that a first subnet IP address assigned to a first LAN device connected to the first LAN matches a second subnet IP address assigned to a second LAN device connected to the second LAN; mapping an association between an alternate IP address and the first subnet IP address; transmitting the association between the alternate IP address and the first subnet IP address; receiving an initiation network packet to be transmitted by the first device to the first LAN device, the initiation network packet indicating the alternate IP address as a destination address; and transmitting the initiation network packet to the first LAN device over a first LAN connection between the first device and the first LAN device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
  • H04L 61/5038 - Allocation d'adresse pour une utilisation locale, p. ex. dans des réseaux LAN ou USB, ou dans un réseau de contrôle [CAN]
  • H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

37.

Enabling partial access to a local area network via a meshnet device

      
Numéro d'application 18202256
Numéro de brevet 12155726
Statut Délivré - en vigueur
Date de dépôt 2023-05-25
Date de la première publication 2024-11-26
Date d'octroi 2024-11-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

An infrastructure device associated with a first device and a second device in a mesh network, the first device being connected to a LAN, the infrastructure device configured to: configure the first device to receive, from the second device, an initiation network packet to be transmitted by the first device to a first LAN device connected to the LAN, the initiation network packet indicating a first subnet IP address as a destination address; configure the first device to compare the first subnet IP address with a stored subnet IP address that is stored in the memory in correlation with the second device; and configure the first device to selectively transmit the initiation network packet to the first LAN device based on a result of comparing the first subnet IP address with the stored subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]
  • H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance

38.

Conflict resolution to enable access to local network devices via mesh network devices

      
Numéro d'application 18201493
Numéro de brevet 12156070
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-11-26
Date d'octroi 2024-11-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method in a mesh network including a first device connected to a first LAN and a second device connected to a second LAN, comprising: configuring the first device to determine a first range of first subnet IP addresses and a second range of second subnet IP addresses; configuring the first device to determine, based on comparing the first range with the second range, a conflict that a first subnet IP address in the first range matches a second subnet IP address in the second range; configuring the first device to map an association between an alternate IP address and the first subnet IP address; and configuring the first device to receive an initiation network packet to be transmitted by the first device to the first LAN device, the initiation network packet indicating the alternate IP address as a destination address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
  • H04W 28/02 - Gestion du trafic, p. ex. régulation de flux ou d'encombrement
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]
  • H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]

39.

Conflict resolution to enable access to local network devices via mesh network devices

      
Numéro d'application 18201497
Numéro de brevet 12143356
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-11-12
Date d'octroi 2024-11-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method in a mesh network including a first device connected to a first LAN and a second device connected to a second LAN, comprising: configuring the first device to determine that a first subnet IP address assigned to a first LAN device matches a second subnet IP address assigned to a second LAN device; configuring the first device to map an association between an alternate IP address and the first subnet IP address; configuring the first device to receive an initiation network packet to be transmitted by the first device to the first LAN device, the initiation network packet indicating the alternate IP address as a destination address; and configuring the first device to transmit the initiation network packet to the first LAN device over a first LAN connection is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
  • H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

40.

REASSIGNING EXIT INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK SERVER

      
Numéro d'application 18778201
Statut En instance
Date de dépôt 2024-07-19
Date de la première publication 2024-11-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Mikulskij, Kiril

Abrégé

A method including activating, by a virtual private network (VPN) server, a first exit internet protocol (IP) address for communicating data associated with a user device having an established VPN connection with the VPN server; deactivating, by a VPN server, the first exit IP address from communicating the data associated with the user device based at least in part on determining that an amount of data communicated utilizing the first exit IP address satisfies a data threshold; and reactivating, by the VPN server at a later time, the first exit IP address for communicating the data associated with the user device based at least in part on determining that the amount of data communicated utilizing the first exit IP address fails to satisfy the data threshold is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 47/11 - Identification de la congestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 61/50 - Allocation d'adresse
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 61/5061 - Réservoir d'adresses
  • H04L 61/5084 - Allocation d'adresse en assurant la mobilité des appareils
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
  • H04L 67/55 - Services réseau par poussée

41.

DYNAMIC MANAGEMENT OF SERVERS BASED ON ENVIRONMENTAL EVENTS

      
Numéro d'application 18778242
Statut En instance
Date de dépôt 2024-07-19
Date de la première publication 2024-11-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Januskevicius, Jovaldas
  • Pabijanskas, Karolis

Abrégé

The present disclosure discloses utilizing, by a VPN server during an established VPN connection between the VPN server and a user device, a first exit IP address for communication of data associated with the user device; determining, by the VPN server during the established VPN connection, potential overloading of the VPN server based on determining a potential breach of a critical threshold associated with the VPN server; establishing, by the VPN server during the established VPN connection and based on determining the potential breach, a secure connection with a secondary server to enable communication of encrypted information between the VPN server and the secondary server; and modifying, by the VPN server based on determining the potential overloading, a configuration of an associated DNS server such that the DNS server returns communication information associated with the secondary server. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués

42.

Organized data storage system

      
Numéro d'application 18407834
Numéro de brevet 12192335
Statut Délivré - en vigueur
Date de dépôt 2024-01-09
Date de la première publication 2024-10-24
Date d'octroi 2025-01-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

The present disclosure discloses configuring a device to determine, for encrypted content, a content access key pair including a content access public key and a content access private key, the encrypted content being determined by encrypting content utilizing a symmetric key; configuring the device to determine, for a folder, a folder access key pair including a folder access public key and a folder access private key; configuring the device to encrypt the content access private key by utilizing the folder access public key; configuring the device to encrypt the symmetric key by utilizing the content access public key; configuring the device to transmit the encrypted content, the encrypted content access private key and the encrypted symmetric key to a stateless server for storage; and configuring the device to access the encrypted content by decrypting the encrypted content access private key and the encrypted symmetric key. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]

43.

Sharing domain name service resources in a mesh network

      
Numéro d'application 18202355
Numéro de brevet 12126591
Statut Délivré - en vigueur
Date de dépôt 2023-05-26
Date de la première publication 2024-10-22
Date d'octroi 2024-10-22
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

The disclosure describes a mesh network including a first device and a second device, which acts as an exit device with respect to the first device such that communication between the first device and an external device, outside the mesh network, is communicated via the second device. The first device receives access information utilized by the second device to access a DNS server in a LAN that includes the second device, and transmits a meshnet query packet that includes a DNS query for domain information associated with the external device. The first device receives, based on transmitting the meshnet query packet, the domain information associated with the external device, and transmits a meshnet initiation packet that includes a network communication for communicating with the external device, the network communication including the domain information. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

44.

Enabling secure auto-filling of information

      
Numéro d'application 18206049
Numéro de brevet 12118298
Statut Délivré - en vigueur
Date de dépôt 2023-06-05
Date de la première publication 2024-10-15
Date d'octroi 2024-10-15
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Reigis, Justinas

Abrégé

An infrastructure device to analyze a source code associated with a known network element to determine a characteristic associated with an included field portion that is configured to accept a known type of input information; determine a correlation between the determined characteristic and the known type of input information; calculate, based on the correlation, a training signature that uniquely indicates a classification of the field portion as a field portion that accepts the known type of input information; train a machine learning (ML) model based on utilizing the training signature as training data; and transmit, to a user device, a trained ML model to enable the user device to utilize the trained ML model to determine, during an operation period, a given type of input information to be auto-filled in an observed field portion in an observed network element is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 40/174 - Remplissage de formulairesFusion
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes

45.

OPTIMIZED ACCESS IN A SERVICE ENVIRONMENT

      
Numéro d'application 18744591
Statut En instance
Date de dépôt 2024-06-14
Date de la première publication 2024-10-10
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method including configuring, by an infrastructure device, a user device to receive validation data based at least in part on transmitting a first service request to receive a first network service; configuring, by the infrastructure device, the user device to receive the first network service based at least in part on signing the validation data using a signature key and on authenticating first biometric information; configuring, by the infrastructure device, the user device to transmit, while receiving the first service, a second service request to receive encrypted content; and configuring, by the infrastructure device, the user device to decrypt the encrypted content based at least in part on utilizing a master key and on authenticating second biometric information is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04L 9/40 - Protocoles réseaux de sécurité

46.

OPTIMIZED HEADER INFORMATION TO ENABLE ACCESS CONTROL

      
Numéro d'application 18740973
Statut En instance
Date de dépôt 2024-06-12
Date de la première publication 2024-10-03
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method configuring a manager device, responsible for managing network services provided by an infrastructure device, to determine a manager request including a signature header signed by utilizing a manager private key associated with the manager device and a timestamp header identifying a point in time when the signature header was signed; configuring the manager device to transmit, to the infrastructure device, the manager request to request performance of an action associated with managing the network services; and configuring the manager device to receive, from the infrastructure device based on transmitting the manager request, an authorization message indicating successful authorization of the manager request, the successful authorization being based on a verification that a time difference between the point in time when the signature header was signed and a current time satisfies a predetermined duration of time is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]

47.

AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK

      
Numéro d'application 18666254
Statut En instance
Date de dépôt 2024-05-16
Date de la première publication 2024-09-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Valcik, Andžej
  • Keliuotis, Ramunas

Abrégé

The disclosure discloses a first server determining an encrypted authentication packet including (i) a crypted code field that indicates a type of the encryption authentication packet, (ii) a crypted payload field that includes an encrypted initial authentication packet, determined by utilizing a nonce, an encryption key, and an encryption algorithm, and (iii) a data length field that indicates a length of the encrypted authentication packet, the length including a sum of a length of the crypted code field, a length of the crypted payload field, and a length of the data length field. The method may also include transmitting, by the first server to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

48.

PARALLEL TUNNELING WITH VIRTUAL PRIVATE NETWORK SERVERS

      
Numéro d'application 18668071
Statut En instance
Date de dépôt 2024-05-17
Date de la première publication 2024-09-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Funka, Zenonas
  • Murauskas, Gytis

Abrégé

The disclosure discloses an infrastructure device configuring a user device to establish respective parallel virtual private network (VPN) connections with respective VPN servers; configuring the user device to determine, based at least in part on establishing the respective parallel VPN connections, a default VPN server from among the respective VPN servers; configuring the user device to select, based at least in part on determining the default VPN server, the default VPN server as a VPN server from which the user device is to receive a VPN service; and configuring the user device to transmit, based at least in part on selecting the default VPN server, a request to the default VPN server to receive the VPN service. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
  • H04L 67/14 - Gestion de session

49.

AUTHENTICATION SYSTEM FOR A MULTIUSER DEVICE

      
Numéro d'application 18668572
Statut En instance
Date de dépôt 2024-05-20
Date de la première publication 2024-09-12
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method for configuring a multiuser device to (i) encrypt a first folder based on utilizing a first symmetric key and a second folder based on utilizing a second symmetric key, the first folder and the second folder being stored on the multiuser device; (ii) encrypt the first symmetric key based on utilizing a first trusted key and the second symmetric key based on utilizing a second trusted key; and (iii) provide access to the encrypted first folder by decrypting the encrypted first symmetric key based on verifying first biometric information and to the encrypted second folder by decrypting the encrypted second symmetric key based on verifying second biometric information, the first biometric information being different from the second biometric information is disclosed. Various other aspects and techniques are contemplated.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité

50.

Optimizing access to local network devices via mesh network devices

      
Numéro d'application 18201485
Numéro de brevet 12081510
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-09-03
Date d'octroi 2024-09-03
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including receiving first connection information associated with a first LAN from a first meshnet device and second connection information associated with a second LAN from a second meshnet device; calculating a first range of first subnet IP addresses associated with the first LAN, and a second range of second subnet IP addresses associated with the second LAN; determining, based on comparing the first range and the second range, a conflict that a first subnet IP address assigned to a first LAN device is the same as a second subnet IP address assigned to a second LAN device; mapping, based on determining the conflict, an alternate IP address to correspond with the first subnet IP address; and communicating with the first LAN device based at least in part on utilizing the alternate IP address instead of utilizing the first subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 61/2521 - Architectures de traduction autres que les serveurs de traduction d’adresses de réseau [NAT] pour réseau unique
  • H04L 45/7452 - Opérations multiples parallèles ou consécutives de recherche
  • H04L 49/00 - Éléments de commutation de paquets

51.

Sharing data in an organized storage system

      
Numéro d'application 18627058
Numéro de brevet 12293091
Statut Délivré - en vigueur
Date de dépôt 2024-04-04
Date de la première publication 2024-08-15
Date d'octroi 2025-05-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method for configuring a first user device to generate a sharing encryption key based at least in part on combining a folder access private key associated with a folder and an assigned public key associated with a second user device; configuring the first user device to encrypt the folder access private key associated with the folder utilizing the sharing encryption key; and configuring the first user device to transmit the encrypted folder access private key to enable the second user device to access the folder is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/08 - Répartition de clés

52.

Enabling partial access to a local area network via a meshnet device

      
Numéro d'application 18202255
Numéro de brevet 12063201
Statut Délivré - en vigueur
Date de dépôt 2023-05-25
Date de la première publication 2024-08-13
Date d'octroi 2024-08-13
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A first device in a mesh network and connected to a LAN being configured to: receive, from the second device, a first network packet to be transmitted by the first device to a first LAN device connected to the LAN, the first network packet indicating a first subnet IP address as a first destination address; select to transmit the first network packet to the first LAN device; receive, from the second device, a second network packet to be transmitted by the first device to a second LAN device connected to the LAN, the second network packet indicating a second subnet IP address as a second destination address; and select to refrain from transmitting the second network packet to the second LAN device based at least in part on the second packet indicating the second subnet IP address as the second destination address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/46 - Interconnexion de réseaux

53.

Secure connections between servers in a virtual private network

      
Numéro d'application 18625948
Numéro de brevet 12294567
Statut Délivré - en vigueur
Date de dépôt 2024-04-03
Date de la première publication 2024-08-08
Date d'octroi 2025-05-06
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Simanel, Darius

Abrégé

A method for utilizing, by a VPN server, a first exit IP address to transmit a first query to a host device for retrieving data of interest requested by the user device; determining, by the VPN server based at least in part on transmitting the first query, that the host device has blocked the first exit IP address; establishing, by the VPN server based at least in part on determining that the host device has blocked the first exit IP address, a connection with a secondary server to enable communication of information between the VPN server and the secondary server; and transmitting, by the VPN server to the secondary server, a message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to utilize a second exit IP address to transmit a second query to request the data of interest is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

54.

Optimizing access to local network devices via mesh network devices

      
Numéro d'application 18201480
Numéro de brevet 12040951
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-07-16
Date d'octroi 2024-07-16
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including receiving first connection information associated with a first LAN from a first meshnet device and second connection information associated with a second LAN from a second meshnet device; calculating a first range of first subnet IP addresses associated with the first LAN, and a second range of second subnet IP addresses associated with the second LAN; determining, based on comparing the first range and the second range, a conflict that a first subnet IP address assigned to a first LAN device is the same as a second subnet IP address assigned to a second LAN device; mapping, based on determining the conflict, an alternate IP address to correspond with the first subnet IP address; and communicating with the first LAN device based at least in part on utilizing the alternate IP address instead of utilizing the first subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 61/25 - Correspondance entre adresses du même type
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

55.

Optimizing access to local network devices via mesh network devices

      
Numéro d'application 18201488
Numéro de brevet 12041029
Statut Délivré - en vigueur
Date de dépôt 2023-05-24
Date de la première publication 2024-07-16
Date d'octroi 2024-07-16
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A method including receiving first connection information associated with a first LAN from a first meshnet device and second connection information associated with a second LAN from a second meshnet device; calculating a first range of first subnet IP addresses associated with the first LAN, and a second range of second subnet IP addresses associated with the second LAN; determining, based on comparing the first range and the second range, a conflict that a first subnet IP address assigned to a first LAN device is the same as a second subnet IP address assigned to a second LAN device; mapping, based on determining the conflict, an alternate IP address to correspond with the first subnet IP address; and communicating with the first LAN device based at least in part on utilizing the alternate IP address instead of utilizing the first subnet IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 61/5038 - Allocation d'adresse pour une utilisation locale, p. ex. dans des réseaux LAN ou USB, ou dans un réseau de contrôle [CAN]
  • H04L 61/5061 - Réservoir d'adresses

56.

METHOD AND APPARATUS FOR CREATING A DATASET USING FILE CREATION DATES

      
Numéro d'application 17970677
Statut En instance
Date de dépôt 2022-10-21
Date de la première publication 2024-07-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Sevcenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

A method and apparatus for generating a content detection dataset using file creation dates. The method accesses a database comprising data files. The files are analyzed by a machine learning model to determine file creation dates. The creation dates are used to identify relevant content files. The most relevant files are included into a content detection dataset as content samples. The dataset may be used for training machine learning based content detectors.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
  • G06N 20/00 - Apprentissage automatique

57.

MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM

      
Numéro d'application 18152476
Statut En instance
Date de dépôt 2023-01-10
Date de la première publication 2024-07-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Briliauskas, Mantas

Abrégé

A cyber security method and system for detecting malware via an anti-malware application employing a fast locality-sensitive hashing evaluation using a vantage-point tree (VPT) structure for the indication of malicious files and non-malicious files. The locality-sensitive hashing evaluation using the VPT structure can be performed prior to initiating the deeper, more computationally intensive evaluation and is used to identify with high confidence a scanned file or data object being (i) a malicious file, (ii) a non-malicious file, or a low confidence measure of the two.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

58.

MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM

      
Numéro d'application 18366875
Statut En instance
Date de dépôt 2023-08-08
Date de la première publication 2024-07-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Briliauskas, Mantas

Abrégé

A cyber security method and system for detecting malware via an anti-malware application employing a fast locality-sensitive hashing evaluation using a vantage-point tree (VPT) structure for the indication of malicious files and non-malicious files. The locality-sensitive hashing evaluation using the VPT structure can be performed prior to initiating the deeper, more computationally intensive evaluation and is used to identify with high confidence a scanned file or data object being (i) a malicious file, (ii) a non-malicious file, or a low confidence measure of the two.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

59.

MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM

      
Numéro d'application 18448466
Statut En instance
Date de dépôt 2023-08-11
Date de la première publication 2024-07-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Briliauskas, Mantas

Abrégé

A cyber security method and system for detecting malware via an anti-malware application employing a fast locality-sensitive hashing evaluation using a vantage-point tree (VPT) structure for the indication of malicious files and non-malicious files. The locality-sensitive hashing evaluation using the VPT structure can be performed prior to initiating the deeper, more computationally intensive evaluation and is used to identify with high confidence a scanned file or data object being a malicious file, a non-malicious file, or a low confidence measure of the two.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06N 7/02 - Agencements informatiques fondés sur des modèles mathématiques spécifiques utilisant la logique floue

60.

System and method for queuing node load in data preprocessing

      
Numéro d'application 18613571
Numéro de brevet 12288102
Statut Délivré - en vigueur
Date de dépôt 2024-03-22
Date de la première publication 2024-07-11
Date d'octroi 2025-04-29
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Briliauskas, Mantas

Abrégé

Systems and methods for optimal load distribution and data processing of a plurality of files in anti-malware solutions are provided herein. In some embodiments, the system includes: a plurality of node processors; a control processor programmed to: receiving a plurality of files used for malware analysis and training of anti-malware ML models; separating the plurality of files into a plurality of subsets of files based on byte size of each of the files, such that processing of each subset of files produces similar workloads amongst all available node processors; distributing the plurality of subsets of files amongst all available node processors such that each node processor processes its respective subset of files in parallel and within a similar timeframe as the other node processors; and receiving, by the control processor, a report of performance and/or anti-malware processing results of the subset of files performed from each node processor.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

61.

METHOD AND APPARATUS FOR GENERATING A DATASET FOR TRAINING A CONTENT DETECTION MACHINE LEARNING MODEL

      
Numéro d'application 17969168
Statut En instance
Date de dépôt 2022-10-19
Date de la première publication 2024-07-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Sevcenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

A method and apparatus for generating a dataset for training a content detection machine learning model. The method applies one or more transforms to a content containing bitstream that produce feature tensors representing the content, labels the feature tensors by type of content, stores feature tensors and labels in a dataset. The dataset my be used to train a content detection machine learning model. The model may be exported to content detectors to identify and classify bitstream content contained in other bitstreams.

Classes IPC  ?

62.

Enabling secure auto-filling of information

      
Numéro d'application 18200533
Numéro de brevet 12032901
Statut Délivré - en vigueur
Date de dépôt 2023-05-22
Date de la première publication 2024-07-09
Date d'octroi 2024-07-09
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Reigis, Justinas

Abrégé

A system is disclosed in which an infrastructure device analyzes a source code associated with a known network element to determine a characteristic associated with a field portion that is configured to accept a known type of input information; determines a correlation between the characteristic and the known type of input information; calculates a training signature to classify the field portion; trains an ML model based on the training signature; and transmits a trained ML model to a user device. The user device analyzes an observed source code associated with an observed network element to determine an observed characteristic associated with an observed field portion that is configured to accept a given type of input information; calculates an observed signature; utilizes the trained ML model to determine the given type of input information; and auto-fills, in the observed field portion, input information according to the given type of input information.

Classes IPC  ?

  • G06F 40/174 - Remplissage de formulairesFusion
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes

63.

Group verification of a transmission source

      
Numéro d'application 18599025
Numéro de brevet 12184665
Statut Délivré - en vigueur
Date de dépôt 2024-03-07
Date de la première publication 2024-06-27
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Elgaafary, Mohamed Adly Amer

Abrégé

The present disclosure discloses configuring a transmitting device to determine verification information including a current fingerprint associated with a first instance of a source application stored on the transmitting device, the current fingerprint (i) being determined based on utilizing one or more connection parameters associated with an external device communicating with the first instance of the source application, and (ii) uniquely identifying the first instance of the source application; configuring the transmitting device to transmit verification information including the current fingerprint; configuring the transmitting device to receive a determination result determined by the receiving device based on a comparison of the current fingerprint with a verification fingerprint that uniquely identifies a second instance of the source application stored on another device; and configuring the transmitting device to selectively transmit transmission data utilizing the first instance of the source application based on the determination result. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/40 - Protocoles réseaux de sécurité

64.

System and method for binary code decompilation using machine learning

      
Numéro d'application 18087379
Numéro de brevet 12175225
Statut Délivré - en vigueur
Date de dépôt 2022-12-22
Date de la première publication 2024-06-27
Date d'octroi 2024-12-24
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Ševčenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

Systems and methods for decompiling binary code or executables are provided herein. In some embodiments, a method of training a machine learning algorithm for decompiling binary code into readable source code includes collecting a data set of source code and at least one element associated with the source code; providing binary code using the data set; training a model configured to decompile the binary code into source code using the data set by: decompiling the collected binary code into intermediate source code; comparing the source code in the data set with the intermediate source code; and updating the model and repeating the training if the source code in the data set differs from the intermediate source code by more than a threshold amount.

Classes IPC  ?

  • G06F 8/41 - Compilation
  • G06F 8/51 - Source à source
  • G06F 8/53 - DécompilationDésassemblage
  • G06F 8/74 - Ingénierie inverseExtraction d’informations sur la conception à partir du code source
  • G06N 3/02 - Réseaux neuronaux
  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 20/00 - Apprentissage automatique
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

65.

OPTIMIZED AUTHENTICATION SYSTEM FOR A MULTIUSER DEVICE

      
Numéro d'application 18581988
Statut En instance
Date de dépôt 2024-02-20
Date de la première publication 2024-06-13
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

The present disclosure discloses encrypting a folder stored on a user device based on utilizing a symmetric key; encrypting, based on utilizing a public key associated with the user device, the symmetric key to determine a single-encrypted symmetric key; transmitting, to a biometric unit available to the user device, a request to capture biometric information; verifying the biometric information based on a comparison of the biometric information with stored biometric information; selectively transmitting, to a trusted device located on the user device and based on successful verification of the biometric information, an encryption request to encrypt the single-encrypted symmetric key based on utilizing a trusted key that is generated by the trusted device, thereby determining a double-encrypted symmetric key; and storing the single-encrypted symmetric key and the double-encrypted symmetric key in a memory. Various other aspects and techniques are contemplated.

Classes IPC  ?

  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/08 - Répartition de clés
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

66.

Identity-based distributed cloud firewall for access and network segmentation

      
Numéro d'application 18378370
Numéro de brevet 12010099
Statut Délivré - en vigueur
Date de dépôt 2023-10-10
Date de la première publication 2024-06-11
Date d'octroi 2024-06-11
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Salas Lumbreras, Carlos Eliseo
  • Gurinaviciute, Juta

Abrégé

According to some embodiments, a method of controlling access to network resources includes: receiving an authentication request from a user device to a core security service; if the user is authenticated, authorizing the user device to connect to a private cloud, and connecting the user device with the private cloud and retrieving user-specific segmented firewall rules stored in the private cloud; routing, through the firewall rules, a request by the user device to access an outer resource; evaluating the request against the firewall rules; if the request meets the firewall rules, routing the request through security measures of the firewall; and if the request does not meet the firewall rules, denying the user device access to the outer resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

67.

Parallel tunneling with virtual private network servers

      
Numéro d'application 18074493
Numéro de brevet 12021839
Statut Délivré - en vigueur
Date de dépôt 2022-12-04
Date de la première publication 2024-06-06
Date d'octroi 2024-06-25
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Funka, Zenonas
  • Murauskas, Gytis

Abrégé

A method including establishing parallel VPN connections including a first respective VPN connection with a first VPN server and a second respective VPN connection with a second VPN server; verifying connectivity of the first respective VPN connection with the first VPN server and of the second respective VPN connection with the second VPN server; determining that the first respective VPN connection is terminated; transmitting an initiation request to a third VPN server to establish a third respective VPN connection with the third VPN server; and establishing the third respective VPN connection with the third VPN server such that the parallel VPN connections include the second respective VPN connection with a second VPN server and the third respective VPN connection with the third VPN server is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
  • H04L 67/14 - Gestion de session

68.

Sharing domain name service resources in a mesh network

      
Numéro d'application 18202320
Numéro de brevet 12003478
Statut Délivré - en vigueur
Date de dépôt 2023-05-26
Date de la première publication 2024-06-04
Date d'octroi 2024-06-04
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A mesh network wherein a first device selects a second device as an exit device with respect to the first device such that communication between the first device and an external device is communicated via the second device; receives a message indicating that the second device has selected a third device as an exit device with respect to the second device such that communication between the second device and the external device is communicated via the third device; transmits a meshnet query packet that includes a DNS query for domain information associated with the external device; receives the domain information associated with the external device; and transmits a meshnet initiation packet that includes a network communication for communicating with the external device, the network communication including the domain information to indicate that the third device is to utilize the domain information to transmit the network communication to the external device.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

69.

Conflict resolution to enable access to local network devices via mesh network devices

      
Numéro d'application 18200505
Numéro de brevet 12003479
Statut Délivré - en vigueur
Date de dépôt 2023-05-22
Date de la première publication 2024-06-04
Date d'octroi 2024-06-04
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

A first meshnet device in a mesh network, the first meshnet device configured to: determine a first range of first subnet IP addresses associated with a first LAN and a second range of second subnet IP addresses associated with a second LAN; determine a conflict that a first subnet IP address assigned to a first LAN device in the first LAN matches a second subnet IP address assigned to a second LAN device in the second LAN; map an association between an alternate IP address and the first subnet IP address; transmit, to a second meshnet device, the association between the alternate IP address and the first subnet IP address; and receive, from the second meshnet device, an initiation network packet to be transmitted to the first LAN device, the initiation network packet indicating the alternate IP address as a destination address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
  • H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
  • H04L 101/668 - Adresses de sous-réseaux du protocole Internet [IP]

70.

Dynamic management of servers based on environmental events

      
Numéro d'application 17994317
Numéro de brevet 12069030
Statut Délivré - en vigueur
Date de dépôt 2022-11-26
Date de la première publication 2024-05-30
Date d'octroi 2024-08-20
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Januskevicius, Jovaldas
  • Pabijanskas, Karolis

Abrégé

A method including predicting or determining, by a VPN server, potential overloading of the VPN server based on predicting or determining a breach of a critical threshold associated with the VPN server; verifying, by the VPN server based on predicting or determining the potential overloading, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; establishing, by the VPN server based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information between the VPN server and the secondary server; and transmitting, by the VPN server to the secondary server, an encrypted message identifying a host device and data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués

71.

Dynamic management of servers based on environmental events

      
Numéro d'application 17994318
Numéro de brevet 12074851
Statut Délivré - en vigueur
Date de dépôt 2022-11-26
Date de la première publication 2024-05-30
Date d'octroi 2024-08-27
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Januskevicius, Jovaldas
  • Pabijanskas, Karolis

Abrégé

A method including configuring a VPN server to utilize, during an established VPN connection between the VPN server and a user device, a first exit IP address to transmit a first query to a host device for retrieving data of interest; configuring the VPN server to predict or determine potential overloading of the VPN server based on a breach of a critical threshold; configuring the VPN server to establish, based on predicting or determining the breach, a secure connection with a secondary server; and configuring the VPN server to transmit, to the secondary server over the secure connection, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to request the data of interest based on utilizing a second exit IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués

72.

Dynamic management of servers based on environmental events

      
Numéro d'application 17994320
Numéro de brevet 12081525
Statut Délivré - en vigueur
Date de dépôt 2022-11-26
Date de la première publication 2024-05-30
Date d'octroi 2024-09-03
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Januskevicius, Jovaldas
  • Pabijanskas, Karolis

Abrégé

A method including configuring a VPN server to predict or determine potential overloading of the VPN server based on predicting or determining a breach of a critical threshold; configuring the VPN server to verify, based on predicting or determining the potential overloading, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; configuring the VPN server to establish, based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information between the VPN server and the secondary server; and configuring the VPN server to transmit, to the secondary server, an encrypted message identifying a host device and data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués

73.

Sharing access to data

      
Numéro d'application 18412798
Numéro de brevet 12273441
Statut Délivré - en vigueur
Date de dépôt 2024-01-15
Date de la première publication 2024-05-23
Date d'octroi 2025-04-08
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

The present disclosure discloses determining, by a first device, an access key pair associated with encrypted content, the access key pair including a content access public key and a content access private key; receiving, by the first device, a public key associated with a second device; encrypting, by the first device, the content access private key based at least in part on utilizing the content access private key and the public key associated with the second device; and transmitting, by the first device, the encrypted content access private key to enable the second device to access the encrypted content. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/40 - Protocoles réseaux de sécurité

74.

Secure cross-device authentication system

      
Numéro d'application 18412808
Numéro de brevet 12189747
Statut Délivré - en vigueur
Date de dépôt 2024-01-15
Date de la première publication 2024-05-23
Date d'octroi 2025-01-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method including determining, by a first user device, unavailability of a first biometric unit for verification of first biometric information; transmitting, by the first user device to an infrastructure device based on determining unavailability of the first biometric unit, a request for information regarding one or more second user devices available to assist with authenticating the first user device; receiving, by the first user device from the infrastructure device, the information regarding the one or more second user devices based on a determination that the one or more second user devices has a second biometric unit available for verification of second biometric information; and transmitting, by the first user device to the infrastructure device, a selection message for selecting a second user device from among the one or more second user devices to assist with authenticating the first user device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
  • G06F 21/60 - Protection de données
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

75.

Optimized access control system

      
Numéro d'application 17994256
Numéro de brevet 12155648
Statut Délivré - en vigueur
Date de dépôt 2022-11-25
Date de la première publication 2024-05-23
Date d'octroi 2024-11-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method including transmitting, by an infrastructure device to a user device, an invitation link to enable the user device to receive network services from the infrastructure device; transmitting, by the infrastructure device to the user device based at least in part on the user device activating the invitation link, seed information to be utilized by the user device to determine authentication information; receiving, by the infrastructure device from the user device during an active communication session, a user request related to an action to be performed regarding receiving the network services, the user request being signed based at least in part on utilizing a first portion of the authentication information; and enabling, by the infrastructure device, performance of the action regarding receiving the network services based at least in part on verifying that the communication session is currently active is disclosed. Various other aspects are contemplated.

Classes IPC  ?

76.

Optimized access control system

      
Numéro d'application 17994257
Numéro de brevet 12155649
Statut Délivré - en vigueur
Date de dépôt 2022-11-25
Date de la première publication 2024-05-23
Date d'octroi 2024-11-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method including receiving, by a user device from an infrastructure device, an invitation link to enable the user device to receive network services from the infrastructure device; receiving, by the user device from the infrastructure device based on the user device activating the invitation link, seed information to be utilized by the user device to determine authentication information; transmitting, by the user device to the infrastructure device during an active communication session and based on determining the authentication information, a user request related to an action to be performed regarding receiving the network services, a portion of the user request being signed based on utilizing a first portion of the authentication information; and performing, by the user device, the action regarding receiving the network services based on a verification that the communication session is currently active is disclosed. Various other aspects are contemplated.

Classes IPC  ?

77.

Enabling partial access to a local area network via a meshnet device

      
Numéro d'application 18202257
Numéro de brevet 11979321
Statut Délivré - en vigueur
Date de dépôt 2023-05-25
Date de la première publication 2024-05-07
Date d'octroi 2024-05-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Karpuska, Rytis

Abrégé

An infrastructure device configured to: configure a first device to receive, from a second device, a first network packet to be transmitted by the first device to a first LAN device, the first network packet indicating a first subnet IP address as a destination address; configure the first device to select to transmit the first network packet to the first LAN device; configure the first device to receive, from the second device, a second network packet to be transmitted by the first device to a second LAN device, the second network packet indicating a second subnet IP address as a destination address; and configure the first device to select to refrain from transmitting the second network packet to the second LAN device based at least in part on the second packet indicating the second subnet IP address as the destination address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/46 - Interconnexion de réseaux

78.

SYSTEM AND METHOD FOR AUTOMATIC BINARY SEGMENTATION

      
Numéro d'application 17977000
Statut En instance
Date de dépôt 2022-10-31
Date de la première publication 2024-05-02
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Sevcenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

Methods, apparatuses and systems for automatic binary file segmentation include receiving binary content, applying a first machine learning process to the binary content to determine data segments in the binary content by identifying at least one of a respective starting point or end point of different data types in the binary content, examining the determined data segments of the binary content to identify data segments that are resistant to analysis, and applying respective techniques to the identified, analysis-resistant data segments to render the content of the identified, analysis-resistant data segments. In some embodiments, the rendering of the content of the identified, analysis-resistant data segments enables the identified, analysis-resistant segments to be analyzed, for example, to determine if the identified, analysis-resistant segments contain malicious content.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06N 20/00 - Apprentissage automatique

79.

Verifying identity of a source of a transmission

      
Numéro d'application 18406854
Numéro de brevet 12273355
Statut Délivré - en vigueur
Date de dépôt 2024-01-08
Date de la première publication 2024-05-02
Date d'octroi 2025-04-08
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Elgaafary, Mohamed Adly Amer

Abrégé

The present disclosure discloses configuring a device to receive, from a transmitting source application, a transmission packet to be transmitted to a destination application; configuring the device to determine connection information included in the transmission packet, the connection information indicating one or more parameters to be utilized by the destination application to connect with the transmitting source application; configuring the device to determine a fingerprint based at least in part on the connection information; configuring the device to compare the determined fingerprint with a trusted fingerprint stored in correlation with an identity of a trusted source application that is known to be unaffected by malware; and configuring the device to process the transmission packet based at least in part on a result of comparing the determined fingerprint with the stored fingerprint is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 16/435 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d'utilisateurs ou de groupes
  • G06V 40/12 - Empreintes digitales ou palmaires
  • H04L 9/40 - Protocoles réseaux de sécurité

80.

Method and apparatus for testing a malware detection machine learning model

      
Numéro d'application 17968637
Numéro de brevet 12278833
Statut Délivré - en vigueur
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Date d'octroi 2025-04-15
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Rafanavičius, Justas
  • Ševčenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

A method and apparatus for testing a malware detection machine learning model. The method trains a malware detection model using a first dataset containing malware samples from a particular time period. The trained model is then tested using a second dataset that is a time shifted version of the first dataset.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06N 20/00 - Apprentissage automatique
  • H04L 9/40 - Protocoles réseaux de sécurité

81.

Optimized authentication system for a multiuser device

      
Numéro d'application 17887441
Numéro de brevet 11962704
Statut Délivré - en vigueur
Date de dépôt 2022-08-13
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

A method including encrypting, by a user device based at least in part on utilizing a symmetric key, a folder stored on the user device; encrypting, by the user device based at least in part on utilizing an assigned public key specific to the folder, the symmetric key to determine a single-encrypted symmetric key; encrypting, by the user device based at least in part on utilizing a trusted device key specific to the user device, the single-encrypted symmetric key to determine a double-encrypted symmetric key; encrypting, by the user device based at least in part on utilizing a trusted user key specific to the folder, an assigned private key that is associated with the assigned public key; and storing, by user device, the double-encrypted symmetric key and the encrypted assigned private key in an associated memory is disclosed. Various other aspects and techniques are contemplated.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret

82.

Stateless system to enable data breach notification

      
Numéro d'application 18501410
Numéro de brevet 12267340
Statut Délivré - en vigueur
Date de dépôt 2023-11-03
Date de la première publication 2024-04-11
Date d'octroi 2025-04-01
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Tamosiunas, Edvinas

Abrégé

The disclosure describes transmitting, by a user device to an infrastructure device, access information to enable authentication of the user device; calculating, by the user device, a hash of private data, the hash of the private data to be utilized for comparison with a hash of breached data that is compromised due to a data breach, the private data being different from the access information; verifying, by the user device based at least in part on communicating verification information with the infrastructure device, that the user device is authorized to have access to a plaintext version of the private data; transmitting, by the user device to the infrastructure device, the hash of the private data; and receiving, by the user device from the infrastructure device, a notification indicating a result of a comparison of the hash of the private data with the hash of the breached data.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

83.

Optimized header information to enable access control

      
Numéro d'application 17964875
Numéro de brevet 12069135
Statut Délivré - en vigueur
Date de dépôt 2022-10-12
Date de la première publication 2024-04-11
Date d'octroi 2024-08-20
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method including receiving, by an infrastructure device from a manager device configured to manage network services provided by the infrastructure device, a manager request for requesting performance of an action associated with managing the network services, the manager request including a signature header signed by utilizing a manager private key associated with the manager device and a timestamp header identifying a point in time when the signature header was signed; determining, by the infrastructure device, a time difference between the point in time when the signature header was signed and a current time; authorizing, by the infrastructure device, the manager request based on determining that the determined time difference satisfies a predetermined duration of time; and enabling, by the infrastructure device, performance of the action associated with managing the network services based on authorizing the manager request is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]

84.

Optimized header information to enable access control

      
Numéro d'application 17964877
Numéro de brevet 12041183
Statut Délivré - en vigueur
Date de dépôt 2022-10-12
Date de la première publication 2024-04-11
Date d'octroi 2024-07-16
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Bespalovas, Dovydas
  • Valkaitis, Mindaugas

Abrégé

A method including determining, by a manager device configured to manage network services provided by an infrastructure device, a manager request including a signature header signed by utilizing a manager private key associated with the manager device and a timestamp header identifying a point in time when the signature header was signed; transmitting, by the manager device to the infrastructure device, the manager request to request performance of an action associated with managing the network services; and receiving, by the manager device from the infrastructure device based at least in part on transmitting the manager request, an authorization message indicating successful authorization of the manager request, the successful authorization being based at least in part on a verification that a time difference between the point in time when the signature header was signed and a current time satisfies a predetermined duration of time is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

85.

Secure connections between servers in a virtual private network

      
Numéro d'application 17960713
Numéro de brevet 11979380
Statut Délivré - en vigueur
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Date d'octroi 2024-05-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Simanel, Darius

Abrégé

A method including determining, by a VPN server based on requesting data of interest from a host device, that the host device has declined to provide the data of interest to the VPN server; verifying, by the VPN server, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; establishing, by the VPN server based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information between the VPN server and the secondary server; and transmitting, by the VPN server to the secondary server over the secure connection, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

86.

Secure connections between servers in a virtual private network

      
Numéro d'application 17960765
Numéro de brevet 11979382
Statut Délivré - en vigueur
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Date d'octroi 2024-05-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Simanel, Darius

Abrégé

A method including configuring a VPN server to utilize a first exit IP address to transmit a query to a host device for requesting data of interest; configuring the VPN server to determine that the host device has blocked the first exit IP address; configuring the VPN server to establish, based on determining that the host device has blocked the first exit IP address, a secure connection with a secondary server to enable communication of encrypted information; and configuring the VPN server to transmit, to the secondary server over the secure connection, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to transmit a second query to request the data of interest based on utilizing a second exit IP address, different from the first exit IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

87.

OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS

      
Numéro d'application 17960773
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Pabijanskas, Karolis

Abrégé

A method including receiving, by a VPN server from a user device during an established VPN connection, a first data request for the VPN server to retrieve first information from a first host device; transmitting, by the VPN server during the established VPN connection, the first information to the user device based on utilizing a first exit IP address to retrieve the first information from the first host device; receiving, by the VPN server from the user device during the established VPN connection, a second data request for the VPN server to retrieve second information from a second host device; and transmitting, by the VPN server during the established VPN connection, the second information to the user device based on utilizing a second exit IP address, associated with a secondary server, to retrieve the second information from the second host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

88.

OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS

      
Numéro d'application 17960781
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Pabijanskas, Karolis

Abrégé

A method including configuring a VPN server to assign, based on establishing a VPN connection, a first exit IP address to be utilized for retrieving information during the VPN connection; configuring the VPN server to determine, during the established VPN connection, a host device that is likely to block communication from the first exit IP address; configuring the VPN server to modify associated DNS settings to return communication information associated with the VPN server itself when the information is to be retrieved from the host device; configuring the VPN server to receive, during the established VPN connection, the information retrieved from the host device based on utilizing a second exit IP address associated with a secondary server; and configuring the VPN server to transmit, during the established VPN connection, the information to a user device in accordance with the modified DNS settings is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

89.

OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS

      
Numéro d'application 17960782
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Pabijanskas, Karolis

Abrégé

A method including configuring a VPN server to receive, from a user device during an established VPN connection, a first data request to retrieve first information from a first host device; configuring the VPN server to transmit, during the established VPN connection, the first information to the user device based on utilizing a first exit IP address to retrieve the first information from the first host device; configuring the VPN server to receive, from the user device during the established VPN connection, a second data request to retrieve second information from a second host device; and configuring the VPN server to transmit, during the established VPN connection, the second information to the user device based on utilizing a second exit IP address, associated with a secondary server, to retrieve the second information from the second host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

90.

System and method for differential malware scanner

      
Numéro d'application 18529702
Numéro de brevet 12235958
Statut Délivré - en vigueur
Date de dépôt 2023-12-05
Date de la première publication 2024-04-04
Date d'octroi 2025-02-25
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Ševčenko, Aleksandr
  • Briliauskas, Mantas

Abrégé

Systems and methods for malware filtering are provided herein. In some embodiments, a system having one or more processors is configured to: retrieve a file downloaded to a user device; break the downloaded file into a plurality of chunks; scan the plurality of chunks to identify potentially malicious chunks; predict whether the downloaded file is malicious based on the scan of the plurality of chunks; and determine whether the downloaded file is malicious based on the prediction.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

91.

Secure connections between servers in a virtual private network

      
Numéro d'application 17960740
Numéro de brevet 11979381
Statut Délivré - en vigueur
Date de dépôt 2022-10-05
Date de la première publication 2024-04-04
Date d'octroi 2024-05-07
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Simanel, Darius

Abrégé

A method including configuring a VPN server to determine, based on requesting data of interest from a host device, that the host device has declined to provide the data of interest; configuring the VPN server to verify, based on determining that the host device has declined to provide the data of interest, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; configuring the VPN server to establish, based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information; and configuring the VPN server to transmit, to the secondary server, an encrypted message identifying the host device and the data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

92.

CUSTOMIZED FILTERING OF TRANSMISSIONS FROM A DEVICE

      
Numéro d'application 18377072
Statut En instance
Date de dépôt 2023-10-05
Date de la première publication 2024-03-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Gurinaviciute, Juta
  • Lumbreras, Carlos Eliseo Salas

Abrégé

A method including receiving, by a security device from a user device that is in a private network, a transmission packet for communication to a destination device over an open network; determining, by the security device based on receiving the transmission packet, whether the user device is permitted to transmit the transmission packet to the destination device over the open network; determining, by the security device based on determining that the user device is permitted to transmit the transmission packet to the destination device, whether the user device is permitted to utilize a protocol utilized by the user device to transmit the transmission packet; and determining, by the security device based on determining that the user device is permitted to utilize the protocol, whether the user device is permitted to utilize a transmission web application utilized by the user device to transmit the transmission packet is disclosed.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

93.

SECURE AUTHENTICATION SYSTEM

      
Numéro d'application 18526136
Statut En instance
Date de dépôt 2023-12-01
Date de la première publication 2024-03-28
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s) Valkaitis, Mindaugas

Abrégé

Disclosed are systems and methods for determining, by a processor associated with a user device, encrypted authentication information by encrypting authentication information that is associated with authenticating the user device with a service provider, the encrypting utilizing one or more encryption keys; detecting, by the processor, an attempt to access a service to be provided by the service provider based on detecting transmission of a request for the service from the user device to the service provider; determining, by the processor, one or more authentication factors to be utilized to authenticate the user device with the service provider based on decrypting the encrypted authentication information by utilizing one or more decryption keys; and enabling, by the processor, authentication of the user device with the service provider based on enabling transmission of the one or more authentication factors to the service provider. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes

94.

Utilization of multiple exit internet protocol addresses in a virtual private network

      
Numéro d'application 17947982
Numéro de brevet 12184612
Statut Délivré - en vigueur
Date de dépôt 2022-09-19
Date de la première publication 2024-03-21
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Tubis, Justinas

Abrégé

A method including configuring a VPN server to receive, from a user device during an established VPN connection between the VPN server and the user device, a data request for the VPN server to retrieve data of interest from a host device; configuring the VPN server to utilize, during the established VPN connection, a first exit IP address to transmit a query to the host device for retrieving the data of interest; configuring the VPN server to determine, based on transmitting the query, that the first exit IP address is blocked by the host device; and configuring the VPN server to transmit, during the established VPN connection and based on determining that the first exit IP address is blocked, the data request to a secondary server to enable retransmission of the query to the host device by utilizing a second exit IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/141 - Configuration des sessions d'application
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

95.

Utilization of multiple exit internet protocol addresses in a virtual private network

      
Numéro d'application 17946008
Numéro de brevet 11943202
Statut Délivré - en vigueur
Date de dépôt 2022-09-15
Date de la première publication 2024-03-21
Date d'octroi 2024-03-26
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Tubis, Justinas

Abrégé

A method including receiving, at a VPN server from a user device during an established VPN connection between the VPN server and the user device, a data request for the VPN server to retrieve data of interest from a host device; utilizing, by the VPN server during the established VPN connection, a first exit IP address to transmit a query to the host device for retrieving the data of interest; determining, by the VPN server based on transmitting the query, that the first exit IP address is blocked by the host device; and transmitting, by the VPN server during the established VPN connection and based on determining that the first exit IP address is blocked, the data request to a secondary server to enable retransmission of the query to the host device by utilizing a second exit IP address is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 67/141 - Configuration des sessions d'application

96.

Utilization of multiple exit internet protocol addresses in a virtual private network

      
Numéro d'application 17947979
Numéro de brevet 12184611
Statut Délivré - en vigueur
Date de dépôt 2022-09-19
Date de la première publication 2024-03-21
Date d'octroi 2024-12-31
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Tubis, Justinas

Abrégé

A method including receiving, at a VPN server from a user device, a data request for the VPN server to retrieve data of interest from a host device; transmitting, by the VPN server to the host device during the established VPN connection, a query to retrieve the data of interest based on utilizing a first exit IP address; and determining, by the VPN server based on transmitting the query, that the first exit IP address is blocked by the host device; retrieving, by the VPN server during the established VPN connection and based on determining that the first exit IP address is blocked by the host device, the data of interest based on utilizing a second exit IP address; and transmitting, by the VPN server to the user device during the established VPN connection, the data of interest retrieved based on utilizing the second exit IP address is disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/141 - Configuration des sessions d'application
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

97.

Utilization of multiple exit internet protocol addresses in a virtual private network

      
Numéro d'application 17947983
Numéro de brevet 12149505
Statut Délivré - en vigueur
Date de dépôt 2022-09-19
Date de la première publication 2024-03-21
Date d'octroi 2024-11-19
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Pabijanskas, Karolis
  • Tubis, Justinas

Abrégé

A method including configuring a VPN server to receive, from a user device during an established VPN connection between the VPN server and the user device, a data request for the VPN server to retrieve data of interest; configuring the VPN server to transmit, during the established VPN connection, a query to retrieve the data of interest based on utilizing a first exit IP address; configuring the VPN server to determine, based on transmitting the query, that the first exit IP address is blocked; configuring the VPN server to retrieve, during the established VPN connection and based on determining that the first exit IP address is blocked by the host device, the data of interest based on utilizing a second exit IP address; and configuring the VPN server to transmit, to the user device during the established VPN connection, the data of interest is disclosed. Various other aspects are contemplated.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/141 - Configuration des sessions d'application
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

98.

DETECTING MALICIOUS BEHAVIOR FROM HANDSHAKE PROTOCOLS USING MACHINE LEARNING

      
Numéro d'application 17932012
Statut En instance
Date de dépôt 2022-09-14
Date de la première publication 2024-03-14
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Razinskas, Dainius
  • Briliauskas, Mantas

Abrégé

A method for identifying a malicious connection between a client device and a server includes obtaining handshake parameters for the client device and the server responsive to the client device initiating a connection with the server, generating a feature set by extracting features from the handshake parameters, predicting a maliciousness of the connection using a machine learning model, where the extracted features are provided as inputs to the machine learning model, and automatically initiating a corrective action if the connection is predicted to be malicious.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

99.

Detecting malicious behavior from handshake protocols using machine learning

      
Numéro d'application 17931931
Numéro de brevet 12278824
Statut Délivré - en vigueur
Date de dépôt 2022-09-14
Date de la première publication 2024-03-14
Date d'octroi 2025-04-15
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Ražinskas, Dainius
  • Briliauskas, Mantas

Abrégé

A method for identifying a malicious connection between a client device and a server includes obtaining handshake parameters for the client device and the server responsive to the client device initiating a connection with the server, generating a feature set by extracting features from the handshake parameters, predicting a maliciousness of the connection using a machine learning model, where the extracted features are provided as inputs to the machine learning model, and automatically initiating a corrective action if the connection is predicted to be malicious.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

100.

DETECTING MALICIOUS BEHAVIOR FROM HANDSHAKE PROTOCOLS USING MACHINE LEARNING

      
Numéro d'application 17932008
Statut En instance
Date de dépôt 2022-09-14
Date de la première publication 2024-03-14
Propriétaire UAB 360 IT (Lituanie)
Inventeur(s)
  • Razinskas, Dainius
  • Briliauskas, Mantas

Abrégé

A method of generating a machine learning model for detecting malicious connections between two or more computing devices includes executing, within a secure operating environment, a plurality of known malicious software applications and a plurality of known non-malicious software applications, generating a dataset of known handshake parameters by monitoring connections between the plurality of known malicious software applications and one or more target servers, and the plurality of known non-malicious software applications and the one or more target servers, training a machine learning model using the dataset of known handshake parameters to predict a maliciousness of a connection between two or more computing devices based on handshake parameters between the two or more computing devices, and distributing the machine learning model to one or more client devices.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  1     2     3     ...     5        Prochaine page