The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 10, 2023

Filed:

Sep. 12, 2018
Applicant:

Sophos Limited, Abingdon, GB;

Inventors:

Joshua Daniel Saxe, Washington, DC (US);

Andrew J. Thomas, Oxfordshire, GB;

Russell Humphries, Horley, GB;

Simon Neil Reed, Wokingham, GB;

Kenneth D. Ray, Seattle, WA (US);

Joseph H. Levy, Farmington, UT (US);

Assignee:

Sophos Limited, Abingdon, GB;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06N 5/04 (2006.01); G06N 20/00 (2019.01); G06F 17/18 (2006.01); G06F 21/56 (2013.01); G06Q 10/06 (2012.01); G06F 16/955 (2019.01); G06F 11/07 (2006.01); G06K 9/62 (2022.01); G06N 7/00 (2006.01); G06F 21/55 (2013.01); G06F 9/54 (2006.01); G06N 5/00 (2006.01); G06N 5/02 (2006.01); G06N 20/20 (2019.01); G06V 10/44 (2022.01); G06V 20/52 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 9/542 (2013.01); G06F 11/079 (2013.01); G06F 16/955 (2019.01); G06F 17/18 (2013.01); G06F 21/554 (2013.01); G06F 21/56 (2013.01); G06F 21/562 (2013.01); G06F 21/565 (2013.01); G06K 9/6223 (2013.01); G06K 9/6256 (2013.01); G06K 9/6263 (2013.01); G06K 9/6274 (2013.01); G06N 5/003 (2013.01); G06N 5/022 (2013.01); G06N 5/04 (2013.01); G06N 5/046 (2013.01); G06N 7/00 (2013.01); G06N 20/00 (2019.01); G06N 20/20 (2019.01); G06Q 10/0635 (2013.01); G06Q 10/06395 (2013.01); G06V 10/457 (2022.01); G06V 20/52 (2022.01); H04L 63/0227 (2013.01); H04L 63/0263 (2013.01); H04L 63/1408 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01);
Abstract

An ensemble of detection techniques are used to identify code that presents intermediate levels of threat. For example, an ensemble of machine learning techniques may be used to evaluate suspiciousness based on binaries, file paths, behaviors, reputations, and so forth, and code may be sorted into safe, unsafe, intermediate, or any similar categories. By filtering and prioritizing intermediate threats with these tools, human threat intervention can advantageously be directed toward code samples and associated contexts most appropriate for non-automated responses.


Find Patent Forward Citations

Loading…