US 11,888,875 B1
Subscription and key management system
Sai Vashisht, Morgan Hill, CA (US); and Sumer Deshpande, San Jose, CA (US)
Assigned to Musarubra US LLC, Plano, TX (US)
Filed by FireEye Security Holdings US LLC, Milpitas, CA (US)
Filed on Dec. 5, 2022, as Appl. No. 18/075,140.
Application 18/075,140 is a continuation of application No. 17/133,411, filed on Dec. 23, 2020, granted, now 11,522,884, issued on Dec. 6, 2022.
Claims priority of provisional application 62/953,424, filed on Dec. 24, 2019.
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); H04L 12/14 (2006.01)
CPC H04L 63/1416 (2013.01) [H04L 12/1403 (2013.01); H04L 63/0442 (2013.01); H04L 63/1433 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A cybersecurity system, including a processor and a non-transitory storage medium, for conducting cyberthreat analytics on a submitted object to determine whether the object is malicious, comprising:
a key management module stored within the non-transitory storage medium, the key management module, upon execution by the processor, assigns a first key to a subscriber upon registration and generates one or more virtual keys, based at least in part on the first key, for distribution to the subscriber, wherein a virtual key of the one or more virtual keys is included as part of a submission received from the subscriber to authenticate the subscriber to verify that the subscriber is authorized to perform one or more tasks associated with the submission, and each of the one or more virtual keys including the virtual key is set with a usage restriction that permits use of the virtual key when provided from a network device having a network address residing within a selected network address range; and
a consumption quota monitoring module stored within the non-transitory storage medium, the consumption quota monitoring module, upon execution by the processor, monitors a number of submissions received from the subscriber.