Using static analysis for vulnerability detection

PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …

Tracking of user login sessions

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …

Enhancing security of a cloud deployment based on learnings from other cloud deployments

Ú Erlingsson, Y Chen - US Patent 12,126,695, 2024 - Google Patents
Learning from other cloud deployments to combat security threats, including: identifying, for
at least a portion of a first cloud deployment, one or more additional cloud deployments to …

Cloud infrastructure entitlement management by a data platform

TM Reed, B Nguyen, K Beasley, JL Vertes… - US Patent …, 2024 - Google Patents
An illustrative method includes accessing data representative of a first role associated with a
set of permissions with respect to resources within the compute environment and specifying …

Universal cloud data ingestion for stream processing

G Karaje, H Sigurbjarnarson, JPE Martin… - US Patent …, 2024 - Google Patents
An example method includes accessing, by a data platform via a network, data from one or
more cloud environments; identifying, by the data platform and in the data, first data …

Deduplication of monitored communications data in a cloud environment

AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2024 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes: determining, by an agent deployed in a cloud environment and based on a …

Leveraging generative artificial intelligence ('AI') for securing a monitored deployment

N Skarphedinsson, P Bhattacharya… - US Patent …, 2024 - Google Patents
Leveraging generative artificial intelligence ('AI') for securing a monitored deployment,
including: receiving natural language input associated with the monitored deployment, the …

User-specific data-driven network security

V Kapoor, HKB Singh, W Zeng, V Jeyakumar… - US Patent …, 2024 - Google Patents
Detecting anomalous behavior of a device, including: generating, using information
describing historical activity associated with a user device, a trained model for detecting …

Detecting threats against computing resources based on user behavior changes

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 12,120,140, 2024 - Google Patents
An illustrative method includes generating, based on log data associated with at least one
user session in a network environment associated with a user, a logical graph, wherein the …

Detecting anomalies in a network environment

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2025 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …