Bitdefender IPR Management Ltd.

Cyprus

Back to Profile

1-42 of 42 for Bitdefender IPR Management Ltd. Sort by
Query
Patent
Canada - CIPO
Aggregations Reset Report
Date
2023 1
2022 4
2021 1
2020 8
2019 1
See more
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 16
G06F 21/55 - Detecting local intrusion or implementing counter-measures 11
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine 5
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 5
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking 5
See more
Status
Pending 15
Registered / In Force 27
Found results for  patents

1.

PRIVACY-PRESERVING DOMAIN NAME SERVICE (DNS)

      
Document Number 03229354
Status Pending
Filing Date 2021-11-02
Open to Public Date 2023-05-11
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, M?d?lina
  • Haller, Emanuela
  • Ro?ca, Georgiana Miruna
  • Titiu, Radu
  • Cebere, Bogdan C.

Abstract

Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

2.

ANOMALY DETECTION SYSTEMS AND METHODS

      
Document Number 03212533
Status Pending
Filing Date 2022-03-28
Open to Public Date 2022-10-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Andrei M., Manolache
  • Florin M., Brad
  • Alexandru, Novac
  • Elena, Burceanu

Abstract

Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.

IPC Classes  ?

3.

SECURITY APPLIANCE FOR PROTECTING POWER-SAVING WIRELESS DEVICES AGAINST ATTACK

      
Document Number 03131255
Status Pending
Filing Date 2021-09-20
Open to Public Date 2022-08-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Munteanu, Cristian
  • Szente, Balint
  • Farkas, Gyula

Abstract

Described systems and methods allow protecting multiple wireless Internet-of- things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetootht Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.

IPC Classes  ?

4.

PRIVACY-PRESERVING IMAGE DISTRIBUTION

      
Document Number 03180722
Status Pending
Filing Date 2021-07-06
Open to Public Date 2022-01-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Cebere, Bogdan
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • H04L 9/16 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects

5.

IMAGE DISTRIBUTION USING COMPOSITE RE-ENCRYPTED IMAGES

      
Document Number 03184510
Status Pending
Filing Date 2021-07-06
Open to Public Date 2022-01-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Cebere, Bogdan
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

6.

MACHINE LEARNING SYSTEMS AND METHODS FOR REDUCING THE FALSE POSITIVE MALWARE DETECTION RATE

      
Document Number 03175387
Status Pending
Filing Date 2021-04-21
Open to Public Date 2021-10-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Dincu, Andreea
  • Botarleanu, Robert-Mihail
  • Zamfir, Sorina N.
  • Bosinceanu, Elena A.
  • Prejbeanu, Razvan

Abstract

In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

7.

SYSTEMS AND METHODS FOR USING DNS MESSAGES TO SELECTIVELY COLLECT COMPUTER FORENSIC DATA

      
Document Number 03139029
Status Pending
Filing Date 2020-07-02
Open to Public Date 2020-11-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Mircescu, Daniel-Alexandru

Abstract

Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.

IPC Classes  ?

8.

PARENTAL CONTROL SYSTEMS AND METHODS FOR DETECTING AN EXPOSURE OF CONFIDENTIAL INFORMATION

      
Document Number 03120424
Status Pending
Filing Date 2020-01-20
Open to Public Date 2020-07-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Minea, Cristian
  • Ion, Cristian
  • Miron, Adrian
  • Zavoiu, Viorel
  • Holban, Liviu A.
  • Bugoiu, Bogdan

Abstract

Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 51/046 - Interoperability with other network applications or services
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

9.

ANTI-CYBERBULLYING SYSTEMS AND METHODS

      
Document Number 03120334
Status Pending
Filing Date 2020-01-20
Open to Public Date 2020-07-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Miron, Adrian
  • Zavoiu, Viorel
  • Afloarei, Andrei M.
  • Patru, Elena M.
  • Botezatu, Loredana
  • Bugoiu, Bogdan
  • Holban, Liviu A.

Abstract

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 51/046 - Interoperability with other network applications or services
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

10.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTION

      
Document Number 03120423
Status Pending
Filing Date 2019-12-10
Open to Public Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

11.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTION

      
Document Number 03120156
Status Pending
Filing Date 2019-12-10
Open to Public Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

12.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTION

      
Document Number 03120373
Status Pending
Filing Date 2019-12-10
Open to Public Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

13.

SYSTEMS AND METHODS FOR REPORTING COMPUTER SECURITY INCIDENTS

      
Document Number 03104450
Status Pending
Filing Date 2019-07-18
Open to Public Date 2020-01-23
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Warmenhoven, Adrianus
  • Hofstede, Richard J.

Abstract

Alert manager software dynamically assembles a security alert as various security scenarios are tested to reach a verdict. Each executed scenario may contribute a scenario-specific message, so the resulting compound security alert indicates an actual line of reasoning used in reaching the respective verdict. The described systems and methods apply, inter alia, to the analysis of high-volume network flows in corporate networks. In some embodiments, flows are pre-tagged with extra metadata to facilitate detection of malware and/or intrusion.

IPC Classes  ?

  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 43/026 - Capturing of monitoring data using flow identification
  • H04L 51/23 - Reliability checks, e.g. acknowledgments or fault reporting
  • H04L 41/0686 - Additional information in the notification, e.g. enhancement of specific meta-data
  • G05B 23/02 - Electric testing or monitoring

14.

SYSTEMS AND METHODS FOR TRANSLATING NATURAL LANGUAGE SENTENCES INTO DATABASE QUERIES

      
Document Number 03099828
Status In Force
Filing Date 2019-06-25
Open to Public Date 2020-01-02
Grant Date 2023-10-31
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Traian, Rebedea
  • Elena, Burceanu
  • Florin, Brad

Abstract

Described systems and methods allow an automatic translation from a natural language (e.g., English) into an artificial language such as a structured query language (SQL). In some embodiments, a translator module includes an encoder component and a decoder component, both components comprising recurrent neural networks. Training the translator module comprises two stages. A first stage trains the translator module to produce artificial language (AL) output when presented with an AL input. For instance, the translator is first trained to reproduce an AL input. A second stage of training comprises training the translator to produce AL output when presented with a natural language (NL) input.

IPC Classes  ?

15.

SECURE STORAGE DEVICE

      
Document Number 03069053
Status Pending
Filing Date 2018-07-31
Open to Public Date 2019-02-07
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Turicu, Dan-Cristian

Abstract

Described systems and methods allow protecting a host system against computer security threats, and in particular against ransomware and unauthorized access to private data. In some embodiments, a conventional non-volatile storage unit (e.g., magnetic, optical, or solid state drive) is paired with a dedicated security processor, forming a secure storage device which may connect to the primary processor of the host system via a conventional storage interface, such as a SATA, PCI, or USB connector. The primary processor and the security processor exchange messages and data via the storage interface. The security processor controls access of the primary processor to the storage unit, and may execute security and data encryption operations.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 3/06 - Digital input from, or digital output to, record carriers

16.

EVENT FILTERING FOR VIRTUAL MACHINE SECURITY APPLICATIONS

      
Document Number 03037801
Status Pending
Filing Date 2017-12-19
Open to Public Date 2018-06-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a hardware virtualization system from malicious software. Some embodiments use a hybrid event notification/analysis system, wherein a first component executing within a protected virtual machine (VM) registers as a handler for processor exceptions triggered by violations of memory access permissions, and wherein a second component executing outside the respective VM registers as a handler for VM exit events. The first component filters permission violation events according to a set of rules and only notifies the second component about events which are deemed relevant to security. The second component analyzes notified events to detect malicious software.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

17.

DYNAMIC REPUTATION INDICATOR FOR OPTIMIZING COMPUTER SECURITY OPERATIONS

      
Document Number 03037453
Status In Force
Filing Date 2017-10-26
Open to Public Date 2018-05-03
Grant Date 2021-04-27
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Mondoc, Alexandra
  • Portase, Radu-Marian

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, worms, and spyware. A reputation manager executes on the computer system concurrently with an anti-malware engine. The reputation manager associates a dynamic reputation indicator to each executable entity seen as a unique combination of individual components (e.g., a main executable and a set of loaded libraries). The reputation indicator indicates a probability that the respective entity is malicious. The reputation of benign entities may increase in time. When an entity performs certain actions which may be indicative of malicious activity, the reputation of the respective entity may drop. The anti-malware engine uses an entity-specific protocol to scan and/or monitor each target entity for malice, the protocol varying according to the entity's reputation. Entities trusted to be non-malicious may be analyzed using a more relaxed protocol than unknown or untrusted entities.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

18.

SYSTEM AND METHODS FOR DETECTING ONLINE FRAUD

      
Document Number 03027470
Status In Force
Filing Date 2017-07-10
Open to Public Date 2018-01-18
Grant Date 2021-11-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Damian, Alin-Octavian

Abstract

Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

19.

SYSTEMS AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT

      
Document Number 03018021
Status In Force
Filing Date 2017-03-29
Open to Public Date 2017-10-12
Grant Date 2021-12-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Caragea, Radu

Abstract

Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among others. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

20.

SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION

      
Document Number 03018022
Status In Force
Filing Date 2017-03-29
Open to Public Date 2017-10-05
Grant Date 2020-12-22
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Cebere, Bogdan-Constantin

Abstract

Described systems and methods enable an automatic device detection/discovery, particularly of 'Internet of Things' client devices such as wearables, mobile communication devices, and smart home appliances, among others. Device detection comprises assigning a target device to a device category, such as "tablet computer from an unknown manufacturer, running Android®". Some embodiments determine multiple preliminary category assignments according to distinct inputs such as HTTP user agent data, DHCP data, mDNS data, and MAC data. Each preliminary category assignment may come with an associated score. A definitive category assignment may be made according to an aggregate score. Applications include computer security, software provisioning, and remote device management, among others.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

21.

SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE

      
Document Number 03008201
Status In Force
Filing Date 2017-01-04
Open to Public Date 2017-07-13
Grant Date 2023-01-17
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad
  • Anichitei, Ionel C.

Abstract

Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

22.

DUAL MEMORY INTROSPECTION FOR SECURING MULTIPLE NETWORK ENDPOINTS

      
Document Number 03006003
Status In Force
Filing Date 2016-12-19
Open to Public Date 2017-06-22
Grant Date 2021-11-23
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lutas, Dan-Horea
  • Lukacs, Sandor
  • Ticle, Daniel-Ioan
  • Ciocas, Radu-Ioan
  • Anichitei, Ionel-Cristinel

Abstract

Described systems and methods enable protecting multiple client systems (e.g., a corporate network) from computer security threats such as malicious software and intrusion. In some embodiments, each protected client operates a live introspection engine and an on-demand introspection engine. The live introspection engine detects the occurrence of certain events within a protected virtual machine exposed on the respective client system, and communicates the occurrence to a remote security server. In turn, the server may request a forensic analysis of the event from the client system, by indicating a forensic tool to be executed by the client. Forensic tools may be stored in a central repository accessible to the client. In response to receiving the analysis request, the on-demand introspection engine may retrieve and execute the forensic tool, and communicate a result of the forensic analysis to the security server. The server may use the information to determine whether the respective client is under attack by malicious software or an intruder.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

23.

SYSTEM AND METHODS FOR DETECTING DOMAIN GENERATION ALGORITHM (DGA) MALWARE

      
Document Number 03002605
Status In Force
Filing Date 2016-11-02
Open to Public Date 2017-05-11
Grant Date 2022-03-29
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Minea, Octavian Mihai
  • Vatamanu, Cristina
  • Benchea, Mihai-Razvan
  • Gavrilut, Dragos-Teodor

Abstract

Domain generation algorithm (DGA) malware is detected by intercepting an external time request sent by a potential DGA malware host, and replacing the received real time with an accelerated (future) real time designed to trigger time-dependent DGA activity. The interception and replacement are performed outside the physical or virtual DGA host, on a different physical or virtual system such as a distinct external physical server or router, or distinct hypervisor or virtual machine running on the same physical system, in order to reduce the risk that the DGA malware identifies the time substitution. Failed DGA malware external access requests triggered only at future times are then used to identify domain names generated by the DGA malware, allowing proactive count ermeasures.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

24.

SYSTEMS AND METHODS FOR TRACKING MALICIOUS BEHAVIOR ACROSS MULTIPLE SOFTWARE ENTITIES

      
Document Number 02990313
Status In Force
Filing Date 2016-07-04
Open to Public Date 2017-02-02
Grant Date 2021-10-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Portase, Radu-Marian

Abstract

Described systems and methods allow protecting a computer system from malicious software. In some embodiments, a security application divides a set of monitored executable entities (e.g., processes) into a plurality of groups, wherein all members of a group are related by filiation or code injection. The security application may further associate a set of scores with each entity group. Such group scores may be incremented when a member of the respective group performs certain actions. Thus, even though actions performed by individual members may not be malware-indicative per se, the group score may capture collective malicious behavior and trigger malware detection. In some embodiments, group membership rules vary according to whether an entity is part of a selected subset of entities including certain OS processes, browsers and file managers. When an entity is determined to be malicious, anti-malware measures may be taken against a whole group of related entities.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

25.

COMPUTER SECURITY SYSTEMS AND METHODS USING ASYNCHRONOUS INTROSPECTION EXCEPTIONS

      
Document Number 02990343
Status In Force
Filing Date 2016-07-14
Open to Public Date 2017-01-19
Grant Date 2021-09-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Sirb, Cristian-Bogdan
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods enable an efficient analysis of security-relevant events, especially in hardware virtualization platforms. In some embodiments, a notification handler detects the occurrence of an event within a virtual machine, and communicates the respective event to security software. The security software then attempts to match the respective event to a collection of behavioral and exception signatures. An exception comprises a set of conditions which, when satisfied by an tuple, indicates that the respective entity is not malicious. In some embodiments, a part of exception matching is performed synchronously (i.e., while execution of the entity that triggered the respective event is suspended), while another part of exception matching is performed asynchronously (i.e., after the triggering entity is allowed to resume execution).

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

26.

BEHAVIORAL MALWARE DETECTION USING AN INTERPRETER VIRTUAL MACHINE

      
Document Number 02986321
Status In Force
Filing Date 2016-06-07
Open to Public Date 2016-12-15
Grant Date 2021-09-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Lukacs, Sandor
  • Fulop, Botond

Abstract

Described systems and methods allow protecting a computer system from computer security threats such as malware and spyware. In some embodiments, a security application executes a set of detection routines to determine whether a set of monitored entities (processes, threads, etc.) executing on the computer system comprise malicious software. The detection routines are formulated in bytecode and executed within a bytecode translation virtual machine. Execution of a detection routine comprises translating bytecode instructions of the respective routine into native processor instructions, for instance via interpretation or just-in-time compilation. Execution of the respective routines is triggered selectively, due to the occurrence of specific events within the protected client system. Detection routines may output a set of scores, which may be further used by the security application to determine whether a monitored entity is malicious.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

27.

CASCADING CLASSIFIERS FOR COMPUTER SECURITY APPLICATIONS

      
Document Number 02984383
Status In Force
Filing Date 2016-05-07
Open to Public Date 2016-11-24
Grant Date 2023-08-15
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Gavrilut, Dragos-Teodor
  • Vatamanu, Cristina
  • Cosovan, Doina
  • Luchian, Henri

Abstract

Described systems and methods allow a computer security system to automatically classify target objects using a cascade of trained classifiers, for applications including malware, spam, and/or fraud detection. The cascade comprises several levels, each level including a set of classifiers. Classifiers are trained in the predetermined order of their respective levels. Each classifier is trained to divide a corpus of records into a plurality of record groups so that a substantial proportion (e.g., at least 95%, or all) of the records in one such group are members of the same class. Between training classifiers of consecutive levels of the cascade, a set of training records of the respective group is discarded from the training corpus. When used to classify an unknown target object, some embodiments employ the classifiers in the order of their respective levels.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

28.

SYSTEMS AND METHODS FOR EXPOSING A RESULT OF A CURRENT PROCESSOR INSTRUCTION UPON EXITING A VIRTUAL MACHINE

      
Document Number 02954604
Status In Force
Filing Date 2015-08-11
Open to Public Date 2016-07-28
Grant Date 2020-09-29
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when a guest instruction executing within a guest VM. performs a memory access violation. In some embodiments, the processor is further configured to delay generating the VM suspend event until the execution stage of the pipeline for the guest instruction is complete, and to save results of the execution stage to a specific location (e.g. a specific processor register readable by security-software) before generating the event.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/14 - Protection against unauthorised use of memory

29.

SYSTEMS AND METHODS FOR SECURING NETWORK ENDPOINTS

      
Document Number 02966723
Status In Force
Filing Date 2015-12-11
Open to Public Date 2016-06-16
Grant Date 2021-03-02
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Achim, Iona-Alexandru
  • Stan, Cosmin-Claudiu
  • Rusu, Andrei

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator automatically take over network services from an existing router, and install the network regulator as gateway to the local network. In response to taking over the network services, some embodiments redirect a request by a protected client system to access a remote resource to a security server configured to determine whether granting access to the resource constitutes a computer security threat to the client system.

IPC Classes  ?

  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 61/5061 - Pools of addresses
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

30.

SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION, DEVICE MANAGEMENT, AND REMOTE ASSISTANCE

      
Document Number 02966727
Status In Force
Filing Date 2015-12-11
Open to Public Date 2016-06-16
Grant Date 2023-06-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Mircescu, Daniel-Alexandru

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator set up a secure tunnel connecting the network regulator with a remote configuration server. The tunnel may be configured to redirect communications received via the tunnel to a router providing network services to client systems on the local network. In some embodiments, the tunnel is used by the configuration server to transmit a communication to the router, the communication configured to disrupt the operation of the router. In response to the disruption, the network regulator may take over the network services from the router, and automatically install the network regulator as gateway to the local network.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/0803 - Configuration setting
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]

31.

USER INTERFACE FOR SECURITY PROTECTION AND REMOTE MANAGEMENT OF NETWORK ENDPOINTS

      
Document Number 02966613
Status In Force
Filing Date 2015-12-11
Open to Public Date 2016-06-16
Grant Date 2021-01-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Achim, Ioan-Alexandru
  • Padina, Mirela-Luiza
  • Miron, Monica-Maria
  • Stan, Cosmin-Claudiu
  • Albisteanu, Catalina
  • Berte, Dan-Radu
  • Dumitrache, Bogdan-Teodor
  • Mircescu, Daniel-Alexandru
  • Novac, Alexandru

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. Various aspects of the operation of the network regulator may be managed remotely via a graphical user interface (GUI) executing on an administration device, such as a mobile phone. The GUI is further configured to display a security notification to a user of the administration device, the security notification indicating the occurrence of a security event caused by an action of a protected client system.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 41/0803 - Configuration setting
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 61/5061 - Pools of addresses
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play

32.

SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION, DEVICE MANAGEMENT, AND REMOTE ASSISTANCE

      
Document Number 02966725
Status In Force
Filing Date 2015-12-11
Open to Public Date 2016-06-16
Grant Date 2021-01-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Achim, Ioan-Alexandru
  • Stan, Cosmin-Claudiu
  • Rusu, Andrei

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.

IPC Classes  ?

  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 61/5061 - Pools of addresses
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

33.

SYSTEMS AND METHODS FOR USING A REPUTATION INDICATOR TO FACILITATE MALWARE SCANNING

      
Document Number 02915806
Status In Force
Filing Date 2014-09-25
Open to Public Date 2015-11-12
Grant Date 2020-08-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Mircescu, Daniel-Alexandru

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses, Trojans, and spyware. A reputation manager executes in conjunction with an anti- malware engine. The reputation manager determines a reputation of a target process executing on the computer system according to a reputation of a set of executable modules, such as shared libraries, loaded by the target process. The anti-malware engine may be configured to employ a process-specific protocol to scan the target process for malware, the protocol selected according to process reputation. Processes trusted to be non-malicious may thus be scanned using a more relaxed protocol than unknown or untrusted processes. The reputation of executable modules may be static; an indicator of module reputation may be stored and/or retrieved by a remote reputation server. Process reputation may be dynamically changeable, i.e. re-computed repeatedly by the reputation manager in response to process life-cycle and/or security events.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

34.

PAGE FAULT INJECTION IN VIRTUAL MACHINES TO CAUSE MAPPING OF SWAPPED-OUT MEMORY PAGES INTO (VM) VIRTUALIZED MEMORY

      
Document Number 02915646
Status In Force
Filing Date 2014-07-02
Open to Public Date 2015-10-08
Grant Date 2020-08-25
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a host system from malware using virtualization technology. In some embodiments, a memory introspection engine operates below a virtual machine (VM) executing on the host system. The engine is configured to analyze the content of a virtual memory page used by software executing within the VM, and/or to protect the respective content from unauthorized modification, for instance by malware. When the respective content is swapped out of memory, the memory introspection engine injects a page fault into the respective VM, to force a swap-in of the respective content.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

35.

PROCESS EVALUATION FOR MALWARE DETECTION IN VIRTUAL MACHINES

      
Document Number 02915888
Status In Force
Filing Date 2014-07-02
Open to Public Date 2015-10-08
Grant Date 2021-05-04
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Tosa, Raul-Vasile
  • Boca, Paul-Daniel
  • Hajmasan, Gheorghe-Florin
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. An anti-malware component executes within a virtual machine (VM) exposed by a hypervisor executing on the computer system. A memory introspection engine executes outside the virtual machine, at the processor privilege level of the hypervisor, and protects a process executing within the virtual machine by write-protecting a memory page of the respective process. By combining anti-malware components executing inside and outside the respective VM, some embodiments of the present invention may use the abundance of behavioral data that inside- VM components have access to, while protecting the integrity of such components from outside the respective VM.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

36.

COMPLEX SCORING FOR MALWARE DETECTION

      
Document Number 02931325
Status In Force
Filing Date 2014-09-25
Open to Public Date 2015-04-09
Grant Date 2020-10-06
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Tosa, Raul-Vasile
  • Boca, Paul-Daniel
  • Hajmasan, Gheorghe-Florin
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, Trojans, and spyware. For each of a plurality of executable entities (such as processes and threads executing on the computer system), a scoring engine records a plurality of evaluation scores, each score determined according to a distinct evaluation criterion. Every time an entity satisfies an evaluation criterion (e.g, performs an action), the respective score of the entity is updated. Updating a score of an entity may trigger score updates of entities related to the respective entity, even when the related entities are terminated, i.e., no longer active. Related entities include, among others, a parent of the respective entity, and/or an entity injecting code into the respective entity. The scoring engine determines whether an entity is malicious according to the plurality of evaluation scores of the respective entity.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

37.

DOCUMENT CLASSIFICATION USING MULTISCALE TEXT FINGERPRINTS

      
Document Number 02898086
Status In Force
Filing Date 2014-02-04
Open to Public Date 2014-09-12
Grant Date 2018-06-26
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Toma, Adrian
  • Tibeica, Marius Nicolae

Abstract

Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is calculated for a text block of each target document, and comprises a sequence of characters determined according to a plurality of text tokens of the respective text block. In some embodiments, the length of the text fingerprint is forced within a pre-determined range of lengths (e.g. between 129 and 256 characters) irrespective of the length of the text block, by zooming in for short text blocks, and zooming out for long ones. Classification may include, for instance, determining whether an electronic document represents unsolicited communication (spam) or online fraud such as phishing.

IPC Classes  ?

  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

38.

MEMORY INTROSPECTION ENGINE FOR INTEGRITY PROTECTION OF VIRTUAL MACHINES

      
Document Number 02897747
Status In Force
Filing Date 2014-02-04
Open to Public Date 2014-08-28
Grant Date 2019-12-31
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lutas, Andrei-Vlad
  • Lukacs, Sandor
  • Lutas, Dan-Horea

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/14 - Protection against unauthorised use of memory

39.

SYSTEM AND METHODS FOR SPAM DETECTION USING FREQUENCY SPECTRA OF CHARACTER STRINGS

      
Document Number 02859135
Status In Force
Filing Date 2012-09-05
Open to Public Date 2013-08-01
Grant Date 2019-10-22
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu, Z. Lucian

Abstract

Described spam detection techniques including string identification, pre-filtering, and frequency spectrum and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti-spam server determines whether the electronic communication is spam or non-spam according to features of the frequency spectrum of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar spectra.

IPC Classes  ?

  • H04L 51/00 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

40.

SYSTEMS AND METHODS FOR SPAM DETECTION USING CHARACTER HISTOGRAMS

      
Document Number 02859131
Status In Force
Filing Date 2012-09-05
Open to Public Date 2013-08-01
Grant Date 2020-04-21
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu Z., Lucian

Abstract

Described spam detection techniques including string identification, pre-filtering, and character histogram and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti- spam server determines whether the electronic communication is spam or non-spam according to certain features of the character histogram of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar character histograms.

IPC Classes  ?

  • H04L 51/00 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

41.

ONLINE FRAUD DETECTION DYNAMIC SCORING AGGREGATION SYSTEMS AND METHODS

      
Document Number 02859126
Status In Force
Filing Date 2012-09-05
Open to Public Date 2013-07-25
Grant Date 2021-01-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Tibeica, N. Marius
  • Damian, O. Alin
  • Visan, L. Razvan

Abstract

In some embodiments, an online fraud prevention system combines the output of several distinct fraud filters, to produce an aggregate score indicative of the likelihood that a surveyed target document (e.g. webpage, email) is fraudulent. Newly implemented fraud filters can be incorporated and ageing fraud filters can be phased out without the need to recalculate individual scores or to renormalize the aggregate fraud score. Every time the output of an individual filter is calculated, the aggregate score is updated in a manner which ensures the aggregate score remains within predetermined bounds defined by a minimum allowable score and a maximum allowable score (e.g., 0 to 100).

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

42.

FUZZY WHITELISTING ANTI-MALWARE SYSTEMS AND METHODS

      
Document Number 02854433
Status In Force
Filing Date 2012-09-05
Open to Public Date 2013-06-20
Grant Date 2018-10-09
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Topan, I. Vlad
  • Dudea, V. Sorin
  • Canja, D. Viorel

Abstract

In some embodiments, an anti-malware system accounts for benign differences between non- malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements