Using static analysis for vulnerability detection
PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …
underapproximate static code analysis, a non-executable representation of an application to …
Enabling an action based on a permission identifier for real-time identity resolution in a distributed system
T Zaitsev, M Sewall, S Sobhani - US Patent App. 17/900,384, 2023 - Google Patents
The present application discloses a method, system, and computer system for authentication
permissions with respect to an action. The method includes receiving, by a microservice …
permissions with respect to an action. The method includes receiving, by a microservice …
Tracking of user login sessions
M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …
login session have a parent-child relationship that indicates that a particular user is …
Enhancing security of a cloud deployment based on learnings from other cloud deployments
Ú Erlingsson, Y Chen - US Patent 12,126,695, 2024 - Google Patents
Learning from other cloud deployments to combat security threats, including: identifying, for
at least a portion of a first cloud deployment, one or more additional cloud deployments to …
at least a portion of a first cloud deployment, one or more additional cloud deployments to …
Cloud infrastructure entitlement management by a data platform
TM Reed, B Nguyen, K Beasley, JL Vertes… - US Patent …, 2024 - Google Patents
An illustrative method includes accessing data representative of a first role associated with a
set of permissions with respect to resources within the compute environment and specifying …
set of permissions with respect to resources within the compute environment and specifying …
Universal cloud data ingestion for stream processing
G Karaje, H Sigurbjarnarson, JPE Martin… - US Patent …, 2024 - Google Patents
An example method includes accessing, by a data platform via a network, data from one or
more cloud environments; identifying, by the data platform and in the data, first data …
more cloud environments; identifying, by the data platform and in the data, first data …
Deduplication of monitored communications data in a cloud environment
AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2024 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes: determining, by an agent deployed in a cloud environment and based on a …
includes: determining, by an agent deployed in a cloud environment and based on a …
Leveraging generative artificial intelligence ('AI') for securing a monitored deployment
N Skarphedinsson, P Bhattacharya… - US Patent …, 2024 - Google Patents
Leveraging generative artificial intelligence ('AI') for securing a monitored deployment,
including: receiving natural language input associated with the monitored deployment, the …
including: receiving natural language input associated with the monitored deployment, the …
Using graph enrichment to detect a potentially malicious access attempt
SC Sakazi, A Karpovsky, AM Medina… - US Patent App. 17 …, 2023 - Google Patents
2022-02-25 Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment
MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST …
MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST …
User-specific data-driven network security
Detecting anomalous behavior of a device, including: generating, using information
describing historical activity associated with a user device, a trained model for detecting …
describing historical activity associated with a user device, a trained model for detecting …