The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 01, 2022

Filed:

Nov. 16, 2020
Applicant:

AO Kaspersky Lab, Moscow, RU;

Inventors:

Sergey V. Gordeychik, Moscow, RU;

Konstantin V. Sapronov, Moscow, RU;

Yury G. Parshin, Moscow, RU;

Teymur S. Kheirkhabarov, Moscow, RU;

Sergey V. Soldatov, Moscow, RU;

Assignee:

AO Kaspersky Lab, Moscow, RU;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 67/306 (2022.01); G06F 21/50 (2013.01); G06F 16/27 (2019.01); G06F 16/951 (2019.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 16/27 (2019.01); G06F 16/951 (2019.01); G06F 21/50 (2013.01); H04L 63/145 (2013.01); H04L 63/1433 (2013.01); H04L 67/306 (2013.01); H04L 2463/121 (2013.01);
Abstract

Disclosed are systems and methods of adding tags for use in detecting computer attacks. In one aspect, the system comprises a computer protection module configured to: receive a security notification, extract an object from the security notification, search for the extracted object in a threat database, add a first tag corresponding to the extracted object in the threat database only when the extracted object is found in the threat database, search for signs of suspicious activity in a database of suspicious activities based on the received security notification and the added first tag, and when at least one sign of suspicious activity is found, extract a second tag from the database of suspicious activities and add the second tag to an object database, wherein the object database is used for identifying signature of targeted attacks based on security notifications, objects, first tags and second tags.


Find Patent Forward Citations

Loading…