CrowdStrike, Inc.

United States of America


Create a watch for CrowdStrike, Inc.
Total IP 485
Total IP Rank # 2,730
IP Activity Score 3.3/5.0    384
IP Activity Rank # 1,840
Parent Entity CrowdStrike Holdings, Inc.
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

402 34
0 11
14 17
7
 
Last Patent 2025 - Multi-instance generic operation...
First Patent 2002 - Wireless network security
Last Trademark 2025 - FALCON FLEX
First Trademark 2012 - CROWDSTRIKE

Industry (Nice Classification)

Latest Inventions, Goods, Services

2025 G/S licensing of software, namely, computer and network security software Computer security consultin...
G/S Financial services, namely, providing financing for purchasing cybersecurity software and service...
Invention Private data set intersection with mutual device anonymity. A method for detecting a private set...
Invention System and method for utilizing and removing a non-persistent collector in a compute environment....
G/S Downloadable computer software for computer and network security. Computer consultation; consult...
G/S Downloadable computer software for computer and network security. Computer consultation; consulti...
Invention Localization middleware. A system and method of a localization middleware. The method includes r...
Invention Injected byte buffer data classification. Methods and systems for injected byte buffer data clas...
2024 Invention Probabilistic event linking. A method of monitoring a network for linked events includes receivin...
G/S Computer security consulting; consulting in the field of information technology; computer securi...
Invention Static analyzer instruction generation based on action of external initialization code during ini...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server ...
Invention Ai model based cybersecurity detection prioritization for cybersecurity management systems. The p...
Invention Directory service recommender assessment and scoring. A cybersecurity service assesses, scores, a...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for ca...
Invention Data prefiltering for large scale data classification. Data prefiltering techniques for large sca...
Invention Entropy-based preemptive false positive mitigation. The present disclosure provides an approach o...
G/S Computer security consulting; consulting in the field of information technology; computer securit...
G/S Computer security consulting; consulting in the field of information technology; consultation in ...
Invention Conditional bloom filters representing field aliasing. Conditional Bloom filters improve computer...
Invention Rules generation to prioritize computer network devices. The present disclosure provides an appro...
G/S Software as a service (SaaS) services featuring software for automating customer interactions and...
G/S Software as a service (SaaS) services featuring software for automating customer interactions an...
Invention Multi-instance generic operation pipeline. An event detection service detects hardware and softw...
Invention Machine-learned suspicious query detection. A cybersecurity detection prediction service pre-scr...
Invention Ebpf general allocator. Systems and methods for an eBPF general allocator for an eBPF program is...
Invention Injected byte buffer data classification. Methods and systems for injected byte buffer data class...
Invention Data labeling using a prevalence-driven artificial intelligence model. The present disclosure pr...
Invention System and method for timing-based network entity resolution. A first request message is receive...
Invention Double subscription service & reactive event notification loop. A hierarchical subscription-publ...
Invention Localization middleware. A system and method of a localization middleware for localizing datasets...
Invention Automated vulnerability remediation guidance based on detection logic elements. The present disc...
Invention External services in distributed databases. Computer nodes associated with a cluster store a dis...
Invention Semantic data determination using a large language model. Techniques for automatically determinin...
Invention Asynchronous blocking of exfiltration events via browser extensions. A cybersecurity data loss p...
Invention Using artificial intelligence models with intermediate representations to analyze malicious files...
Invention Operational prediction on user-based contextual sessions. Contextual session-based operational p...
Invention Protective distributed database service. Computer nodes associated with a cluster store a distri...
2023 Invention Using large language models to generate natural language descriptions of code for enhanced threat...
Invention Counter adversary large language models. A system and method of using generative AI to maintain ...
Invention Large language model-based software reverse engineering assistant. Systems and methods of utiliz...
Invention Behavior-based asset classifications. Techniques, systems, and computer-readable media for dynam...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for c...
Invention Risk scoring using supervised machine learning. Techniques for using supervised machine learning...
Invention Default-deny network egress architecture in a virtual private cloud. Methods and systems for des...
G/S Computer security consulting; Consulting in the field of information technology relating to insta...
Invention Cybersecurity typing and inferencing. A cybersecurity event validation service provides a user-f...
Invention Secure code clustering through llm-based semantic analysis. An approach is provided that provide...
Invention Monitoring file system operations using ebpf dfa architecture. A deterministic finite automata (...
Invention Secure code analysis copilot. An approach is provided that identifies a vulnerability correspond...
Invention Method and apparatus for data synchronization and persistence between computing devices. A compu...
Invention Adapters for runtime application self-protection. An approach is provided that trains an artific...
Invention Stable and discernable mapping of categorical data to colors for graphical display. Data is rece...
Invention Source code similarity. Automated source code similarity greatly improves computer functioning. ...
Invention Nodal redundancy storage decisions. Nodal redundancy storage decisions efficiently distribute red...
Invention Embedding entity matching. Embedding entity matching greatly improves computer functioning. Diff...
Invention Cybersecurity detection. A cybersecurity service protects endpoint devices from cybersecurity att...
Invention Techniques for assessing malware classification. A sample file that is associated with malware a...
Invention Techniques for delegated inter-party private set intersection. A method for detecting a private s...
Invention Assessing computer system vulnerabilities and exposures. Assessing computer system vulnerabiliti...
G/S Computer security consulting; consulting services in the field of information technology, namely...
G/S Business administration services; business services, namely, administration of a program for enab...
G/S Business analysis services, namely business profit analysis and business management analysis, bus...
G/S Business administration services; business services, namely, administration of a program for ena...
G/S Business analysis, research and information services; business consulting services in the field ...
G/S Business administration services; Business services, namely, administration of a program for enab...
G/S Computer security consulting; consulting in the field of information technology; Computer securit...
G/S Business analysis, research and information services; business consulting services in the field o...
2022 G/S Computer security consulting; consulting in the field of Internet security and information securi...
G/S Computer security consulting; consulting in the field of information technology; consultation fo...
G/S Downloadable computer software for the protection and security of computer networks and computin...
G/S Educational services, namely, providing online and in-person courses of instruction for detecting...
G/S Computer software for computer and network security. Computer consultation services relating to c...
2021 G/S Computer security consulting; consulting in the field of information technology; consultation for...
G/S Providing online education in the nature of online courses in the fields of cybersecurity, endpoi...
G/S Providing information in the field of monetization of cybersecurity breaches for the protection o...
G/S Downloadable computer software for secure data access, namely, software providing a transparent ...
2020 G/S Providing a website featuring recommendations, ratings and reviews posted by consumers about loca...
G/S Software as a service (SAAS) services featuring software for computer and network security; softw...
G/S educational services, namely, providing online and onsite courses in the fields of cybersecurity,...
G/S computer security consulting; consulting in the field of information technology; consultation in ...
G/S DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L...
G/S Computer software for encryption.
G/S Downloadable and recorded computer search engine software; downloadable and recorded computer sof...
G/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, si...
G/S Downloadable computer software for secure data access, namely, software providing a transparent l...
2019 G/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig...