Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Carbon Black Inc patents

Recent patent applications related to Carbon Black Inc. Carbon Black Inc is listed as an Agent/Assignee. Note: Carbon Black Inc may have other listings under different names/spellings. We're not affiliated with Carbon Black Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Carbon Black Inc-related inventors

Learned behavior based security

The present system and method pertain to the detection of malicious software and processes such as malware. A cloud security policy system receives hashes and behavioral information about applications and/or processes executing on user devices. ... Carbon Black Inc

Cybersecurity incident detection systems and techniques

Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining, based on security rules or heuristics, which of the observed occurrences are associated with potential security risks, (3) identifying patterns of activity based on the suspicious occurrences, and (4) prompting a user to indicate whether the observed patterns of suspicious activity are expected or unexpected. Behavior baselines established in this manner can then be used to differentiate between expected and unexpected patterns of activity on the computer system.. ... Carbon Black Inc

Cybersecurity systems and techniques

Cybersecurity systems and techniques are described. A cybersecurity method may include generating a process fingerprint of a process, wherein the process fingerprint identifies the process based, at least in part, on dynamic features of the process. ... Carbon Black Inc

Systems and techniques for guiding a response to a cybersecurity incident

A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security incident, selecting a subset of such events based on the estimated utilities, and presenting data associated with the selected events to the investigator. A method for guiding a response to a security incident may include estimating, for each of a plurality of security events associated with the security incident, a utility of investigating the security event. ... Carbon Black Inc

Using private threat intelligence in public cloud

A distributed security system and method are disclosed that enable access to known threat events from threat intelligence feeds when the system includes public cloud components. A cloud-based security policy system stores observable events for security incidents detected by and sent from user devices within an enterprise network. ... Carbon Black Inc

System and method for process hollowing detection

A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the process to monitor application programming interface (api) calls between the process and an operating system of the user device, determining whether the process is associated with a process hollowing intrusion based on information associated with the process and/or the api calls, and executing security policies against the process associated with the process hollowing intrusion. In examples, it is determined whether the child process is associated with a process hollowing intrusion in response to determining whether one or more api calls associated with known process hollowing intrusions modify executable memory of and/or modify an entry point address of the child process.. ... Carbon Black Inc

Multi-host threat tracking

A system and method for tracking data security threats within an organization is proposed. A threat aggregator process executing on an analysis computer system within the organization receives events indicating possible threats observed by and sent from different user devices and aggregates related events into threats. ... Carbon Black Inc

System and method for reverse command shell detection

A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed. In one embodiment, the system detects each process starting on an operating system of the user device, such as a mobile phone or laptop computer, and monitors application programming interface (api) calls between each process and the operating system. ... Carbon Black Inc

Carbon aerogels, process for their preparation and their use

The invention relates to carbon aerogels with particle sizes less than 1 μm. The carbon aerogels are prepared by (a)reacting a mono- and/or polyhydroxybenzene, an aldehyde and a catalyst in a reactor at a reaction temperature t in the range from 75-200° c. ... Carbon Black Inc

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Carbon Black Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Carbon Black Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by