2025
|
Invention
|
Smart caching based on reputation information.
Embodiments disclosed herein relate to systems an... |
|
Invention
|
Proactive browser content analysis.
A protection module operates to analyze threats, at the prot... |
2024
|
Invention
|
Discrete processor feature behavior collection.
Examples of the present disclosure describe syst... |
|
Invention
|
Real-time scanning of ip addresses.
Examples of the present disclosure describe systems and meth... |
|
Invention
|
Advanced file modification heuristics.
Examples of the present disclosure describe systems and m... |
|
Invention
|
Security privilege escalation exploit detection and mitigation.
Examples of the present disclosu... |
|
Invention
|
Behavioral threat detection definition and compilation.
Examples of the present disclosure descr... |
|
Invention
|
Peer device protection.
Peer device protection enables a first device comprising a digital secur... |
|
Invention
|
Behavioral threat detection definition and compilation. Examples of the present disclosure descri... |
|
Invention
|
Stack pivot exploit detection and mitigation.
Examples of the present disclosure describe system... |
|
Invention
|
Systems and methods of tracking chain of custody of documents.
Systems and methods of tracking c... |
|
Invention
|
Systems and methods for remote management of appliances. The present disclosure describes systems... |
|
Invention
|
Automatic inline detection based on static data.
Examples of the present disclosure describe sys... |
|
Invention
|
Detecting stack pivots using stack artifact verification.
Examples of the present disclosure des... |
|
Invention
|
Multi-ring shared, traversable, and dynamic advanced database.
Examples of the present disclosur... |
|
Invention
|
Managing the loading of sensitive modules. The present disclosure relates to systems and methods ... |
|
Invention
|
Malicious software detection based on api trust.
Examples of the present disclosure describe sys... |
|
Invention
|
Systems and methods for detection and mitigation of malicious encryption.
The present disclosure... |
|
Invention
|
Systems and methods for secure file management via an aggregation of cloud storage services. The ... |
|
Invention
|
Selective import/export address table filtering.
Examples of the present disclosure describe sys... |
|
Invention
|
Restricting access to application programming interfaces (apis).
Examples of the present disclos... |
2023
|
Invention
|
Methods and systems of content integration for generative artificial intelligence. Systems and me... |
|
Invention
|
Online identity reputation.
Examples of the present disclosure describe systems and methods of i... |
|
Invention
|
Discrete processor feature behavior collection. Examples of the present disclosure describe syste... |
|
Invention
|
Smart caching based on reputation information. Embodiments disclosed herein relate to systems and... |
|
G/S
|
Downloadable computer software using artificial intelligence for managing content, customer user ... |
|
Invention
|
Real-time javascript classifier.
Aspects of the present disclosure are operable to protect again... |
|
G/S
|
Telecommunication advisory and consultancy services relating to artificial intelligence as it app... |
|
Invention
|
Systems and methods for enabling parallelized verification of forensic copies using non-paralleli... |
|
Invention
|
Definition and extension of stories of core entities and calculation of risk scores thereof.
Cor... |
|
Invention
|
Exploit detection via induced exceptions. Examples of the present disclosure describe systems and... |
|
Invention
|
Real-time scanning of ip addresses. Examples of the present disclosure describe systems and metho... |
|
Invention
|
Generation of domain-specific images for training optical character recognition (ocr) machine lea... |
|
Invention
|
Aggregation and management among a plurality of storage providers. The present disclosure describ... |
|
Invention
|
State-based entity behavior analysis.
Examples of the present disclosure describe systems and me... |
|
Invention
|
Systems and methods for dns smart access.
Embodiments of systems and methods for DNS smart acces... |
|
Invention
|
Behavioral threat detection engine. Examples of the present disclosure describe systems and metho... |
|
Invention
|
System and method for leak prevention for domain name system requests. Embodiments of systems and... |
|
Invention
|
Selective import/export address table filtering. Examples of the present disclosure describe syst... |
|
Invention
|
Behavioral threat detection virtual machine. Examples of the present disclosure describe systems ... |
|
Invention
|
Detection and prevention of hostile network traffic flow appropriation and validation of firmware... |
|
Invention
|
Advanced file modification heuristics. Examples of the present disclosure describe systems and me... |
|
Invention
|
Stack pivot exploit detection and mitigation. Examples of the present disclosure describe systems... |
|
Invention
|
Malicious software detection based on api trust. Examples of the present disclosure describe syst... |
2022
|
Invention
|
Multi-ring shared, traversable, and dynamic advanced database. Examples of the present disclosure... |
|
Invention
|
Systems and methods for aggregation of cloud storage.
The present disclosure describes systems a... |
|
Invention
|
Event logging protocol connector systems and methods.
Embodiments provide systems and methods fo... |
1994
|
G/S
|
Computer programs for use by home users, businesses and government for the storage management of ... |