Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Cylance Inc patents


Recent patent applications related to Cylance Inc. Cylance Inc is listed as an Agent/Assignee. Note: Cylance Inc may have other listings under different names/spellings. We're not affiliated with Cylance Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cylance Inc-related inventors


Endpoint detection and response utilizing machine learning

A plurality of events associated with each of a plurality of computing nodes that form part of a network topology are monitored. The network topology includes antivirus tools to detect malicious software prior to it accessing one of the computing nodes. ... Cylance Inc

Detection of vulnerable code

A machine learning model is applied to at least determine whether a computer program includes vulnerable code. The machine learning model is trained to determine whether the computer program includes vulnerable code based at least on a presence and/or absence of a first trait. ... Cylance Inc

Isolating data for analysis to avoid malicious attacks

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment. ... Cylance Inc

Static feature extraction from structured files

Data is received or accessed that includes a structured file encapsulating data required by an execution environment to manage executable code wrapped within the structured file. Thereafter, code and data regions are iteratively identified in the structured file. ... Cylance Inc

Clustering analysis for deduplication of training set samples for machine learning based computer threat analysis

A method, a system, and a computer program product for performing analysis of data to detect presence of malicious code are disclosed. Reduced dimensionality vectors are generated from a plurality of original dimensionality vectors representing features in a plurality of samples. ... Cylance Inc

Icon based malware detection

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. ... Cylance Inc

Shellcode detection

Identifying shellcode in a sequence of instructions by identifying a first instruction, the first instruction identifying a first bound of a sequence of instructions, identifying a second instruction, the second instruction identifying a second bound of the sequence of instructions, and generating a distribution for the sequence of instructions, bounded by the first instruction and the second instructions, the distribution indicative of whether the sequence of instructions is likely to include shellcode.. . ... Cylance Inc

Recurrent neural networks for malware analysis

Using a recurrent neural network (rnn) that has been trained to a satisfactory level of performance, highly discriminative features can be extracted by running a sample through the rnn, and then extracting a final hidden state hh where i is the number of instructions of the sample. This resulting feature vector may then be concatenated with the other hand-engineered features, and a larger classifier may then be trained on hand-engineered as well as automatically determined features. ... Cylance Inc

Machine learning classification using markov modeling

Systems, methods, and articles of manufacture, including computer program products, are provided for classification systems and methods using modeling. In some example embodiments, there is provided a system that includes at least one processor and at least one memory including program code which when executed by the at least one memory provides operations. ... Cylance Inc

Centroid for improving machine learning classification and info retrieval

Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. ... Cylance Inc

Training a machine learning model for analysis of instruction sequences

In one respect, there is provided a system for training a neural network adapted for classifying one or more instruction sequences. The system may include at least one processor and at least one memory. ... Cylance Inc

Machine learning model for analysis of instruction sequences

In one respect, there is provided a system for classifying an instruction sequence with a machine learning model. The system may include at least one processor and at least one memory. ... Cylance Inc

Memory space protection

Executable memory space is protected by receiving, from a process, a request to configure a portion of memory with a memory protection attribute that allows the process to perform at least one memory operation on the portion of the memory. Thereafter, the request is responded to with a grant, configuring the portion of memory with a different memory protection attribute than the requested memory protection attribute. ... Cylance Inc

Computer user authentication using machine learning

Systems and methods are described herein for computer user authentication using machine learning. Authentication for a user is initiated based on an identification confidence score of the user. ... Cylance Inc

03/01/18 / #20180063169

Container file analysis using machine learning model

In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. ... Cylance Inc

03/01/18 / #20180060760

Automated systems and methods for generative multimodel multiclass classification and similarity analysis using machine learning

Under one aspect, a computer-implemented method includes receiving a query at a query interface about whether a computer file comprises malicious code. It is determined, using at least one machine learning sub model corresponding to a type of the computer file, whether the computer file comprises malicious code. ... Cylance Inc

03/01/18 / #20180060580

Training a machine learning model for container file analysis

In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. ... Cylance Inc

12/14/17 / #20170357813

Avoidance of malicious content in nested files

A nested file having a primary file and at least one secondary file embedded therein is parsed using at least one parser of a cell. The cell assigns a maliciousness score to each of the parsed primary file and each of the parsed at least one secondary file. ... Cylance Inc

12/14/17 / #20170357807

Deployment of machine learning models for discernment of threats

A mismatch between model-based classifications produced by a first version of a machine learning threat discernment model and a second version of a machine learning threat discernment model for a file is detected. The mismatch is analyzed to determine appropriate handling for the file, and taking an action based on the analyzing. ... Cylance Inc

12/14/17 / #20170357805

Macro-script execution control

An agent inserts one or more hooks into a sub-execution runtime environment that is configured to include a script and/or targeted to include the script. The agent including the one or more hooks monitors a behavior of the sub-execution runtime environment and/or the script. ... Cylance Inc

08/31/17 / #20170249462

Retention and accessibility of data characterizing events on an endpoint computer

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. ... Cylance Inc

08/31/17 / #20170249461

Retention and accessibility of data characterizing events on an endpoint computer

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. A query response can be generated, for example by identifying and retrieving responsive data from the local data store. ... Cylance Inc

08/31/17 / #20170249459

Sub-execution environment controller

In one aspect there is provided a method. The method may include: determining that an executable implements a sub-execution environment, the sub-execution environment being configured to receive an input, and the input triggering at least one event at the sub-execution environment; intercepting the event at the sub-execution environment; and applying a security policy to the intercepted event, the applying of the policy comprises blocking the event, when the event is determined to be a prohibited event. ... Cylance Inc

08/31/17 / #20170249455

Isolating data for analysis to avoid malicious attacks

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment. ... Cylance Inc

08/24/17 / #20170243183

Transaction terminal malware detection and prevention

Transaction terminal malicious software is detected by monitoring calls of a first process to identify attempts by the first process to read memory used by a second process. The first and second processes are different from each other and are executed by at least one data processor forming part of a transaction terminal system having at least one transaction terminal. ... Cylance Inc

08/17/17 / #20170237773

Endpoint-based man in the middle attack detection using machine learning models

A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (mitm) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. ... Cylance Inc

01/19/17 / #20170017793

Malware detection

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. ... Cylance Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Cylance Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cylance Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###