The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 14, 2024

Filed:

Dec. 10, 2021
Applicant:

Cyemptive Technologies, Inc., Snohomish, WA (US);

Inventor:

Robert Pike, Woodinville, WA (US);

Assignee:

Cyemptive Technologies, Inc., Snohomish, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 9/50 (2006.01); G06F 21/57 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01); H04L 67/148 (2022.01); H04L 67/01 (2022.01);
U.S. Cl.
CPC ...
H04L 63/10 (2013.01); G06F 9/5077 (2013.01); G06F 21/57 (2013.01); G06F 21/6218 (2013.01); H04L 63/0846 (2013.01); H04L 63/102 (2013.01); H04L 63/108 (2013.01); H04L 63/1408 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 63/1466 (2013.01); H04L 63/20 (2013.01); H04L 67/148 (2013.01); H04L 63/0263 (2013.01); H04L 67/01 (2022.05);
Abstract

Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.


Find Patent Forward Citations

Loading…