Patent classifications
H04W12/128
ENFORCING JAVASCRIPT FOR MITB DETECTION
A request for a confidential web page, and in response, can transmit an HTML code snippet to a browser running on a network device coupled to the data communication network to determine whether JavaScript is enabled locally at the network device. The confidential web page can be, for example, a log in, or other sensitive or personal data, vulnerable to browser-based intrusions. Responsive to detecting that JavaScript has been disabled, restricts subsequent communication by the network device, wherein the application firewall requires enabling of JavaScript to continue to the confidential web page. On the other hand, responsive to detecting that JavaScript has not been disabled, allowing the request for the confidential web page to proceed.
Application download monitoring method and device
This application provides an application download monitoring method and a device. A mobile terminal detects whether access URL information requested by a plurality of first applications includes an application download request; when detecting that access URL information requested by any one of the plurality of first applications includes an application download request, the mobile terminal blocks the application download request, and sends the URL information to a server; the server queries, based on the application download request in the URL information, whether a security analysis result of a second application corresponding to the application download request exists, and if finding the security analysis result, the server sends the security analysis result to the mobile terminal; and the mobile terminal determines, based on the security analysis result, whether to download the second application.
Application download monitoring method and device
This application provides an application download monitoring method and a device. A mobile terminal detects whether access URL information requested by a plurality of first applications includes an application download request; when detecting that access URL information requested by any one of the plurality of first applications includes an application download request, the mobile terminal blocks the application download request, and sends the URL information to a server; the server queries, based on the application download request in the URL information, whether a security analysis result of a second application corresponding to the application download request exists, and if finding the security analysis result, the server sends the security analysis result to the mobile terminal; and the mobile terminal determines, based on the security analysis result, whether to download the second application.
NGFW (next generation firewall) security inspection over multiple sessions of message session relay protocol (MSRP) on a data communication network
One or more MSRP data packets are received from a first MSRP session and creates a first log entry. One or more MSRP data packets are also received from a second MSRP session and create a second log entry. A correlation between the first and second MSRP sessions based on MDNs can be detected, and mapped correlating information to malicious activity. The mapping includes reconstructing MSRP messages sent from a source and encapsulated in a data field of the packets, including MDNs, and matching to at least one threat from a malicious activity database. In response to the threat matching, to conduct a security action on the first and second MSRP sessions.
NGFW (next generation firewall) security inspection over multiple sessions of message session relay protocol (MSRP) on a data communication network
One or more MSRP data packets are received from a first MSRP session and creates a first log entry. One or more MSRP data packets are also received from a second MSRP session and create a second log entry. A correlation between the first and second MSRP sessions based on MDNs can be detected, and mapped correlating information to malicious activity. The mapping includes reconstructing MSRP messages sent from a source and encapsulated in a data field of the packets, including MDNs, and matching to at least one threat from a malicious activity database. In response to the threat matching, to conduct a security action on the first and second MSRP sessions.
Method for providing an elastic content filtering security service in a mesh network
The present disclosure is directed to distributing processing capabilities throughout different nodes in a wireless mesh network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless mesh network because they help minimize the need to forward communications to other nodes in the wireless mesh network such that an evaluation can be performed. Apparatus and methods consistent with the present disclosure may distribute ratings or verdicts associated with previous requests to access data to different nodes in a wireless mesh network without generating additional wireless communications through the wireless mesh network. Apparatus and methods consistent with the present disclosure distribute content ratings to different nodes in a wireless network such that different wireless nodes may block redundant requests to undesired content without increasing messaging traffic.
Systems and methods for proactive call spam/scam protection using network extensions
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.
Quarantining fake, counterfeit, jailbroke, or rooted mobile devices in the cloud
Systems and methods include, in a cloud node executing a security service, causing a mobile device to perform a validation check to determine if the mobile device is any of fake, counterfeit, jailbroken, and rooted; responsive to successful validation, allowing traffic to and from the mobile device through the security service; and responsive to unsuccessful validation, preventing traffic to and from the mobile device through the security service. The systems and methods can further include, prior to the causing, requiring the mobile device to install and launch an application, wherein registration with the security service requires the application; and performing the validation check via the application and a fake check service.
METHOD FOR PARTITIONING A PLURALITY OF DEVICES IN A COMMUNICATIONS SYSTEM AND A DEVICE THEREFOR
A method is provided for partitioning a plurality of devices in a communications system. The method includes providing the communications system with a central server that communicates with each of the plurality of devices. The communications system communicates in a plurality of time periods. The plurality of devices is partitioned into two or more groups of devices. Time periods of the plurality of time periods are assigned for communications of the two or more groups of devices. Time intervals between the time periods for the two or more groups are determined to be co-prime time intervals greater than one, and each of the two or more groups is assigned a different time interval of the co-prime time intervals. The two or more groups are active for communications only during the assigned time periods determined by the co-prime time intervals. A device is also provided for operating in the communications system.
Ransomware protection for cloud storage systems
Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.