The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 11, 2025

Filed:

Apr. 24, 2023
Applicant:

Fireeye Security Holdings Us Llc, San Jose, CA (US);

Inventors:

Neeraj Kulkarni, Milpitas, CA (US);

Robert M. Beard, Jr., Charlotte, NC (US);

Robin Caron, Charlotte, NC (US);

Assignee:

Musarubra US LLC, Plano, TX (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/54 (2013.01); G06F 8/65 (2018.01); G06F 9/54 (2006.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
G06F 21/54 (2013.01); G06F 8/65 (2013.01); G06F 9/546 (2013.01); G06F 21/564 (2013.01); G06F 21/566 (2013.01); G06F 21/577 (2013.01);
Abstract

An electronic device for receiving and seamlessly providing cybersecurity analyzer updates and concurrent management systems for detecting cybersecurity threats including a processor and a memory communicatively coupled to the processor. The memory stores an analyzer logic to generate a first analyzer configured to receive a suspicious object for threat evaluation, an inspection logic to manage a first queue of suspicious objects for threat evaluation to the first analyzer, and an update logic to receive updated cybersecurity analytics content data. The analyzer logic receives updated cybersecurity analytics content data and can generate a second analyzer that incorporates at least a portion of the parsed updated cybersecurity analytics content data. In response to the generation of the second analyzer, the inspection logic manages a second queue of subsequent suspicious objects and sends the subsequent suspicious objects to the second analyzer for threat evaluation, thereby minimizing downtime during the analyzer update process.


Find Patent Forward Citations

Loading…