Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Crowdstrike Inc patents


Recent patent applications related to Crowdstrike Inc. Crowdstrike Inc is listed as an Agent/Assignee. Note: Crowdstrike Inc may have other listings under different names/spellings. We're not affiliated with Crowdstrike Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Crowdstrike Inc-related inventors


File-modifying malware detection

A security agent implemented on a computing device is described herein. The security agent is configured to detect file-modifying malware by detecting that a process is traversing a directory of the memory of the computing device and detecting that the process is accessing files in the memory according to specified file access patterns. ... Crowdstrike Inc

Tracing system operations across remote procedure linkages to identify request originators

A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive one or more event notifications respectively associated with one or more kernel-mode events. ... Crowdstrike Inc

Inferential exploit attempt detection

A security agent implemented on a monitored computing device is described herein. The security agent is configured to detect an action of interest (aoi) that may be probative of a security exploit and to determine a context in which that aoi occurred. ... Crowdstrike Inc

Correlation-based detection of exploit activity

A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative of execution of an object and store, in a data structure on the monitored computing device, information associated with the event notification and the object. ... Crowdstrike Inc

Hypervisor-based interception of memory accesses

A security agent configured to initiate a security agent component as a hypervisor for a computing device is described herein. The security agent is further configured to determine a subset of memory locations in memory of the computing device to be intercepted. ... Crowdstrike Inc

Kernel-level security agent

A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. ... Crowdstrike Inc

Processing security-relevant events using tagged trees

Devices described herein are configured to propagate tags among data objects representing system components. Such devices may detect an event associated with a plurality of system components. ... Crowdstrike Inc

Security agent

A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. ... Crowdstrike Inc

Integrity assurance through early loading in the boot phase

Techniques utilizing library and pre-boot components to ensure that a driver associated with a kernel-mode component is initialized before other drivers during a boot phase are described herein. The library component is processed during a boot phase; the pre-boot component, which may be an alternative to the library component, is processed during a pre-boot phase. ... Crowdstrike Inc

User-mode component injection techniques

Techniques are described herein for loading a user-mode component of a security agent based on an asynchronous procedure call (apc) built by a kernel-mode component of the security agent. The apc is executed while a process loads, causing the process to load the user-mode component. ... Crowdstrike Inc

User-mode component injection and atomic hooking

Techniques are described herein for loading a user-mode component associated with a kernel-mode component based on an asynchronous procedure call (apc) built by the kernel-mode component. The apc is provided to the main thread of a user-mode process while that user-mode process loads, causing the user-mode process to load the user-mode component. ... Crowdstrike Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Crowdstrike Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Crowdstrike Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###