The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 18, 2021

Filed:

Oct. 23, 2018
Applicant:

Architecture Technology Corporation, Eden Prairie, MN (US);

Inventors:

Judson Powers, Ithaca, NY (US);

Katey Huddleston, Ithaca, NY (US);

Assignee:

Architecture Technology Corporation, Eden Prairie, MN (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); H04L 29/06 (2006.01); G06F 9/455 (2018.01); G06K 9/62 (2006.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
G06F 21/566 (2013.01); G06F 9/45558 (2013.01); G06K 9/6282 (2013.01); G06N 20/00 (2019.01); H04L 63/1416 (2013.01); G06F 2009/45591 (2013.01);
Abstract

Disclosed herein are embodiments of systems, methods, and products providing real-time anti-malware detection and protection. The computer uses artificial intelligence techniques to learn and detect new exploits in real time and protect the full system from harm. The computer trains a first machine learning model for executable files. The computer trains a second machine learning model for non-executable files. The computer trains a third machine learning model for network traffic. The computer identifies malware using the various machine learning models. The computer restores to a clean, uncorrupted state using virtual machine technology. The computer reports the detected malware to a security server, such as security information and even management (SIEM) systems, by transmitting detection alert message regarding the malware. The computer interacts with an administrative system over an isolated control network to allow the system administrator to correct the corruption caused by the malware.


Find Patent Forward Citations

Loading…