Systems and methods for threat identification and remediation

S Kumar, D Pollutro - US Patent 9,092,616, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …

Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms

S Kumar, D Pollutro - US Patent 8,776,180, 2014 - Google Patents
7,797.544 7,882,221 7,979,696 7,984,304 8,010,469 8, 108,536 8,214,497 8,429.454
2005/0033987 2005/O132O31 2005, 01322O2 2005, 0138384 2005/0204404 …

Malicious advertisement detection and remediation

A Ranadive, S Rizvi, NM Daswani - US Patent 8,516,590, 2013 - Google Patents
Sites that source JavaScript from external websites are vulnerable to malware infections.
Attackers often infect 3rd party widgets and JavaScript code hosted at other sites. If this …

Systems and methods for orchestrating runtime operational integrity

S Kumar, D Pollutro - US Patent 8,990,948, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …

Encrypted memory

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,930,714, 2015 - Google Patents
(63) Continuation-in-part of application No. 13, 136,024, for an Incompletely Trusted
Environment”; 5'Symposium on Oper filed on Jul. 19, 2011, and a continuation-in-part of …

Security perimeter

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,575,903, 2017 - Google Patents
See application file for complete search history. nicated with a processor, and a logic
operable to create at least one cryptographic security perimeter enclosing at least one …

Mitigating malware

NM Daswani, A Ranadive, S Rizvi - US Patent 8,370,938, 2013 - Google Patents
One way computers have traditionally been protected from unauthorized (and frequently
malicious) programs/modifica tions (hereinafter collectively “malware') is through the use of …

Adaptive scanning

T Demir, A Ranadive, S Rizvi, NM Daswani - US Patent 8,555,391, 2013 - Google Patents
Sites that scice JavaScript fron exteria websites are weable to aware infections. tackers often
infect 3rd party widgets and JavaScript code hosted at other sites. if this occurs with any of …

Systems and methods for providing mobile security based on dynamic attestation

S Kumar, D Pollutro - US Patent 8,850,588, 2014 - Google Patents
Instrumented networks, machines and platforms having tar get Subjects (devices,
transactions, services, users, organiza tions) are disclosed. A security orchestration service …

Fine-grained security in federated data sets

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,943,313, 2015 - Google Patents
(57) ABSTRACT A data processing system, a server Such as a federated server, a computer
system, and like devices, and associated operating methods can be configured to Support …