The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 05, 2023

Filed:

Nov. 30, 2022
Applicant:

Cujo Llc, Walnut, CA (US);

Inventors:

Santeri Kangas, Kirkkonummi, FI;

Kimmo Kasslin, Espoo, FI;

Leonardas Marozas, Vilnius, LT;

Filip Savin, Vilnius, LT;

Assignee:

Cujo LLC, Covina, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/12 (2006.01); H04L 61/4511 (2022.01); H04L 61/09 (2022.01); H04L 9/40 (2022.01); H04L 67/02 (2022.01); G06F 15/16 (2006.01); G06F 16/901 (2019.01); H04L 101/618 (2022.01);
U.S. Cl.
CPC ...
H04L 61/4511 (2022.05); H04L 61/09 (2022.05); H04L 63/14 (2013.01); H04L 67/02 (2013.01); H04L 2101/618 (2022.05);
Abstract

A first data communication of a first connected device related to a first target website is intercepted. The first data communication identifies the first target website by a first fully qualified domain name (FQDN), and the first FQDN is mapped to a first Internet protocol (IP) address. A pair of the first FQDN and the first IP address is determined. A second data communication of a second connected device related to a second target website is intercepted. The second data communication comprises a second encrypted FQDN and a second IP address of the second target website. The second IP address is determined to be equal to the first IP address. A cybersecurity reputation of the second target website is retrieved based on the first FQDN. In response to determining that the reputation matches a predetermined alarm condition, a cybersecurity operation is enforced for the second data communication.


Find Patent Forward Citations

Loading…