Using static analysis for vulnerability detection

PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …

Enabling an action based on a permission identifier for real-time identity resolution in a distributed system

T Zaitsev, M Sewall, S Sobhani - US Patent App. 17/900,384, 2023 - Google Patents
The present application discloses a method, system, and computer system for authentication
permissions with respect to an action. The method includes receiving, by a microservice …

Tracking of user login sessions

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …

Enhancing security of a cloud deployment based on learnings from other cloud deployments

Ú Erlingsson, Y Chen - US Patent 12,126,695, 2024 - Google Patents
Learning from other cloud deployments to combat security threats, including: identifying, for
at least a portion of a first cloud deployment, one or more additional cloud deployments to …

Cloud infrastructure entitlement management by a data platform

TM Reed, B Nguyen, K Beasley, JL Vertes… - US Patent …, 2024 - Google Patents
An illustrative method includes accessing data representative of a first role associated with a
set of permissions with respect to resources within the compute environment and specifying …

Universal cloud data ingestion for stream processing

G Karaje, H Sigurbjarnarson, JPE Martin… - US Patent …, 2024 - Google Patents
An example method includes accessing, by a data platform via a network, data from one or
more cloud environments; identifying, by the data platform and in the data, first data …

Deduplication of monitored communications data in a cloud environment

AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2024 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes: determining, by an agent deployed in a cloud environment and based on a …

Leveraging generative artificial intelligence ('AI') for securing a monitored deployment

N Skarphedinsson, P Bhattacharya… - US Patent …, 2024 - Google Patents
Leveraging generative artificial intelligence ('AI') for securing a monitored deployment,
including: receiving natural language input associated with the monitored deployment, the …

Using graph enrichment to detect a potentially malicious access attempt

SC Sakazi, A Karpovsky, AM Medina… - US Patent App. 17 …, 2023 - Google Patents
2022-02-25 Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment
MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST …

User-specific data-driven network security

V Kapoor, HKB Singh, W Zeng, V Jeyakumar… - US Patent …, 2024 - Google Patents
Detecting anomalous behavior of a device, including: generating, using information
describing historical activity associated with a user device, a trained model for detecting …