Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Crowdstrike Inc patents


Recent patent applications related to Crowdstrike Inc. Crowdstrike Inc is listed as an Agent/Assignee. Note: Crowdstrike Inc may have other listings under different names/spellings. We're not affiliated with Crowdstrike Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Crowdstrike Inc-related inventors


Symmetric bridge component for communications between kernel mode and user mode

A symmetric, cross-platform, bridge component is described herein. The bridge component creates an interface (through a set of application programming interfaces (apis)) to enable the sending of data between a pair of components, called “endpoints,” a first endpoint component of the pair being executed in a kernel mode of a computing device, and a second endpoint component of the pair being executed in a user mode of the computing device. ... Crowdstrike Inc

Validation-based determination of computational models

Example techniques described herein determine a validation dataset, determine a computational model using the validation dataset, or determine a signature or classification of a data stream such as a file. The classification can indicate whether the data stream is associated with malware. ... Crowdstrike Inc

Computational modeling and classification of data streams

Example techniques described herein determine a signature or classification of a data stream such as a file. The classification can indicate whether the data stream is associated with malware. ... Crowdstrike Inc

Applications of a binary search engine based on an inverted index of byte sequences

Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index. ... Crowdstrike Inc

Binary search of byte sequences using inverted indices

Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. ... Crowdstrike Inc

File-modifying malware detection

A security agent implemented on a computing device is described herein. The security agent is configured to detect file-modifying malware by detecting that a process is traversing a directory of the memory of the computing device and detecting that the process is accessing files in the memory according to specified file access patterns. ... Crowdstrike Inc

Tracing system operations across remote procedure linkages to identify request originators

A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive one or more event notifications respectively associated with one or more kernel-mode events. ... Crowdstrike Inc

Inferential exploit attempt detection

A security agent implemented on a monitored computing device is described herein. The security agent is configured to detect an action of interest (aoi) that may be probative of a security exploit and to determine a context in which that aoi occurred. ... Crowdstrike Inc

Correlation-based detection of exploit activity

A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative of execution of an object and store, in a data structure on the monitored computing device, information associated with the event notification and the object. ... Crowdstrike Inc

Hypervisor-based interception of memory accesses

A security agent configured to initiate a security agent component as a hypervisor for a computing device is described herein. The security agent is further configured to determine a subset of memory locations in memory of the computing device to be intercepted. ... Crowdstrike Inc

Kernel-level security agent

A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. ... Crowdstrike Inc

Processing security-relevant events using tagged trees

Devices described herein are configured to propagate tags among data objects representing system components. Such devices may detect an event associated with a plurality of system components. ... Crowdstrike Inc

Security agent

A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. ... Crowdstrike Inc

Integrity assurance through early loading in the boot phase

Techniques utilizing library and pre-boot components to ensure that a driver associated with a kernel-mode component is initialized before other drivers during a boot phase are described herein. The library component is processed during a boot phase; the pre-boot component, which may be an alternative to the library component, is processed during a pre-boot phase. ... Crowdstrike Inc

02/09/17 / #20170039367

User-mode component injection techniques

Techniques are described herein for loading a user-mode component of a security agent based on an asynchronous procedure call (apc) built by a kernel-mode component of the security agent. The apc is executed while a process loads, causing the process to load the user-mode component. ... Crowdstrike Inc

02/09/17 / #20170039366

User-mode component injection and atomic hooking

Techniques are described herein for loading a user-mode component associated with a kernel-mode component based on an asynchronous procedure call (apc) built by the kernel-mode component. The apc is provided to the main thread of a user-mode process while that user-mode process loads, causing the user-mode process to load the user-mode component. ... Crowdstrike Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Crowdstrike Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Crowdstrike Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###