H04L63/168

Phishing Mitigation Service
20230021885 · 2023-01-26 · ·

There is disclosed a method of providing passive phishing remediation for an enterprise, including: displaying, to a user of a mobile device, an email; receiving from the user a one-click request to perform additional analysis of the email; providing the email to a phishing mitigation service; assigning the email a reputation score, generating a human-readable reputation display for the email, wherein the human-readable reputation display includes at least three grades comprising safe, unknown or unreliable, and unsafe or malicious; and providing the human-readable reputation display as a push notification to the mobile device.

Network Attack Detection Method and Apparatus
20230025946 · 2023-01-26 ·

A network attack detection method and apparatus is provided. The network protection device obtains first key data from received first network traffic, and matches the first key data with an attack signature in a signature database to obtain a first matching result; if the network protection device determines, based on the first matching result, that the first network traffic is aggressive, the network protection device obtains a target attack detection model based on the first network traffic, where the target attack detection model is used to identify one or more attack signatures that are different from the attack signature in the signature database; and when the network protection device receives second network traffic, the network protection device determines, based on the target attack detection model, whether the second network traffic is aggressive.

COMPUTING CONNECTION CREDENTIAL VERIFICATION

A computing device may include a memory and a processor configured to cooperate with the memory to establish a connection with a client device, with the client device having a first credential to connect the client device to a computing service, and the first credential being provided by a proxy. The processor may further receive a request from the client device via the connection to validate the first credential before use of the first credential by the client device, and validate the first credential with use of a second credential for the computing service obtained independent of the proxy.

SYSTEMS AND METHODS FOR APPLICATION SECURITY UTILIZING CENTRALIZED SECURITY MANAGEMENT
20230028642 · 2023-01-26 ·

One or more computing devices, systems, and/or methods for managing security associated with applications are provided. In an example, a central security gateway may determine first security policy information associated with a first application. The central security gateway may establish a first encrypted connection with a first device of the first application. The central security gateway may manage, based upon the first security policy information and using the first encrypted connection, security associated with the first application. The central security gateway may determine second security policy information associated with a second application. The central security gateway may establish a second encrypted connection with a second device of the second application. The central security gateway may manage, based upon the second security policy information and using the second encrypted connection, security associated with the second application.

Using keyboard app to encrypt e-mail and other digital data
11563725 · 2023-01-24 ·

A system uses a keyboard application to encrypt and decrypt e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.

Semi-automatic rule generator

A computer-implemented method for generating a first set of longest common sequences from a plurality of known malicious webpages, the first set of longest common sequences representing input data from which a human generates a set of regular expressions for detecting phishing webpages. There is included obtaining HTML source strings from the plurality of known malicious webpages and transforming the HTML source strings to reduce the number of at least one of stop words and repeated tags, thereby obtaining a set of transformed source strings. There is further included performing string alignment on the set of transformed source strings, thereby obtaining at least a scoring matrix. There is additionally included obtaining a second set of longest common sequences responsive to the performing the string alignment. There is further included filtering the second set of longest common sequences, thereby obtaining the first set of longest common sequences.

GLOBAL LINK PROVIDING MODIFICATION RIGHTS TO A SHARED FOLDER
20230016343 · 2023-01-19 ·

A computer-implemented system and method of sharing files between a link sharer and a link recipient over a network. A folder sharing link is generated in response to a request by a link sharer, where the link provides a link recipient the ability to modify the contents of the folder. In response to receiving an indication that the generated link has been activated by a link recipient, the system either automatically grants modification rights to the folder or requests manual approval from the link sharer to grant modification rights to the link recipient. Once modification rights have been granted, the system adds the shared folder to the link recipient's account within the context of a document management system.

MANAGING L4 PORTS
20230021019 · 2023-01-19 ·

Some embodiments of the invention provide a novel method for managing layer four (L4) ports associated with a machine executing on a host computer. The method collects a set of contextual attributes relating to applications executing on the machine. It then analyzes the collected contextual attributes to identify at least one L4 port that has to have its status modified. Next, it modifies the status of the identified L4 port. In some embodiments, the status of an L4 port can be either open or closed, and the modification can open a closed port or close an open port. In some embodiments, the method is performed when the machine starts up on the host computer, performed each time a new application is installed on the machine, performed periodically to close unused L4 ports, and/or performed periodically to close L4 ports that should not be open based on a set of L4-port control policies.

MANAGING L4 PORTS
20230013489 · 2023-01-19 ·

Some embodiments of the invention provide a novel method for managing layer four (L4) ports associated with a machine executing on a host computer. The method collects a set of contextual attributes relating to applications executing on the machine. It then analyzes the collected contextual attributes to identify at least one L4 port that has to have its status modified. Next, it modifies the status of the identified L4 port. In some embodiments, the status of an L4 port can be either open or closed, and the modification can open a closed port or close an open port. In some embodiments, the method is performed when the machine starts up on the host computer, performed each time a new application is installed on the machine, performed periodically to close unused L4 ports, and/or performed periodically to close L4 ports that should not be open based on a set of L4-port control policies.

Computing connection credential verification

A computing device may include a memory and a processor configured to cooperate with the memory to establish a connection with a client device, with the client device having a first credential to connect the client device to a computing service, and the first credential being provided by a proxy. The processor may further receive a request from the client device via the connection to validate the first credential before use of the first credential by the client device, and validate the first credential with use of a second credential for the computing service obtained independent of the proxy.