The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 15, 2022

Filed:

Dec. 05, 2018
Applicant:

Crowdstrike , Inc., Irvine, CA (US);

Inventors:

Ajit Sancheti, San Francisco, CA (US);

Roman Blachman, Givatayim, IL;

Amir Jakoby, Nathania, IL;

Eyal Karni, Kochav Yair, IL;

Assignee:

CrowdStrike, Inc., Irvine, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/00 (2006.01); H04L 9/40 (2022.01); H04W 12/06 (2021.01); H04W 12/37 (2021.01); H04W 12/63 (2021.01); H04W 12/67 (2021.01); H04W 12/68 (2021.01); H04L 67/53 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); H04L 63/0245 (2013.01); H04L 63/20 (2013.01); H04L 63/205 (2013.01); H04W 12/06 (2013.01); H04W 12/37 (2021.01); H04L 67/53 (2022.05); H04L 2463/082 (2013.01); H04W 12/63 (2021.01); H04W 12/67 (2021.01); H04W 12/68 (2021.01);
Abstract

The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant system is adapted for installation inline or in sniffer mode. In various embodiments, defined rules are applied to network traffic to determine whether certain types of attacks are occurring on the network resources. If one such attack is detected, the system provides for several potential responses, including for example disconnecting the attacking remote machine, requiring the user at that machine to re-authenticate, and/or requiring a second factor of authentication from the user at that machine. In some example embodiments, regardless of any activity required of a user at the remote machine suspected of malicious behavior, the disclosed system generates an alarm or other alert for presentation as appropriate, such as via a graphical user interface or a third-party system using an API.


Find Patent Forward Citations

Loading…