CrowdStrike, Inc.

États‑Unis d’Amérique


 
Quantité totale PI 419
Rang # Quantité totale PI 3 049
Note d'activité PI 3,3/5.0    325
Rang # Activité PI 2 193
Parent CrowdStrike Holdings, Inc.
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

339 33
0 10
14 16
7
 
Dernier brevet 2025 - Smart notification for structure...
Premier brevet 2002 - Wireless network security
Dernière marque 2024 - CROWDSTRIKE
Première marque 2012 - CROWDSTRIKE

Industrie (Classification de Nice)

Derniers inventions, produits et services

2024 P/S Computer security consulting; consulting in the field of information technology; computer securi...
P/S Computer security consulting; consulting in the field of information technology; computer securit...
P/S Computer security consulting; consulting in the field of information technology; consultation for...
Invention Analysis of malware. A security service can determine a synthetic context based at least in part...
Invention Distributed digital security system. A distributed security system can include instances of a co...
P/S Software as a service (SaaS) services featuring software for automating customer interactions and...
P/S Software as a service (SaaS) services featuring software for automating customer interactions an...
Invention Method, system and computer program product for editing movies in distributed scalable media envi...
Invention Merging and unmerging entity representations via resolver trees. A digital security system can s...
Invention Systems and methods for caching of managed content in a distributed environment using a multi-tie...
Invention Collaborative augmented reality. Augmented reality presentations are provided at respective elec...
Invention Using large language models to recommend and validate asset and/or cloud configurations. A syste...
2023 Invention Smart notification for structured and unstructured data. Systems and methods for providing cyber...
Invention Threat exposure management system using large language models. A system and method of using gene...
P/S Computer security consulting; Consulting in the field of information technology relating to insta...
Invention Large language model-based authentication. Systems and methods of authentication utilizing a lar...
Invention Incremental solves using llms for api calls. Systems and methods for incremental solves using LL...
Invention Funnel techniques for natural language to api calls. The present disclosure produces a first out...
Invention Triggering and downselection of volatile memory scanning. Methods and systems implement computin...
Invention Prevention of prompt injection attacks on large language models by tokenization of structured dat...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server w...
Invention Cyber security boot status markers. Boot status markers record historical boot processes perform...
P/S Business administration services; business services, namely, administration of a program for enab...
P/S Business analysis, research and information services; business consulting services in the field o...
P/S Business administration services; business services, namely, administration of a program for ena...
P/S Business analysis, research and information services; business consulting services in the field ...
Invention Rules-based malware resolution suggestions. A rules-based malware detection and assessment servi...
Invention Identifying patterns in large quantities of collected emails. A system and method of detecting m...
Invention Threat prediction in a streaming system. Techniques for aggregating data usable for generating s...
Invention Techniques for detecting file similarity. A computer-implemented method of detecting similarity ...
Invention Detecting targeted intrusion on mobile devices. Techniques to determining a program installed on...
Invention Method and apparatus for malicious file extension detection. A feature vector is created that co...
Invention Method and apparatus for mapping similarity spaces. A method for selecting a region of a similar...
Invention Interpolant pattern matching. Interpolant pattern matching reflects a runtime environment. Any i...
Invention Applying diffusion models in adversarial purification and adversarial sample generation in cybers...
Invention Cloud-delivered hooks and hooking policies. Cloud-delivered hooks are injected as binary instrum...
Invention Interwoven amq data structure. An interwoven approximate membership query (AMQ) data structure i...
Invention Adversarial attacks common interface. A system and method of adjusting a classifier to improve a...
Invention Techniques for remediating control flow flattening. A computer-implemented method for deobfuscat...
Invention Accessibility services based phishing detection and prevention. Systems and methods disclosed th...
Invention Method and apparatus for evaluating similarity between files. A method for constructing a simila...
Invention Query management in a streaming system. Techniques to manage queries for managing queries that d...
Invention Fingerprinting techniques to support file hash generation. A method of generating a file hash us...
Invention Namespace mapping to support file hash generation. A method of generating a file hash using moun...
Invention Artificial intelligence monitoring. An artificial intelligence (AI) monitoring service detects, ...
P/S Business administration services; Business services, namely, administration of a program for enab...
Invention Aggressive embedding dropout in embedding-based malware detection. Malware is detected using an ...
Invention Data-only decision validation models to update false predictions. A security agent configured to...
Invention Machine learning-based malware detection for code reflection. A process subset of an executing p...
P/S Computer security consulting; consulting in the field of information technology; Computer securit...
Invention Use of multifactor authentication in assessing suspicious activity. A security agent configured ...
2022 Invention Techniques for ordering process activity in a concurrent environment. Trackable activity perform...
Invention Techniques for tracking executable images across forking operations. A creation of a first proce...
P/S Computer security consulting; consulting in the field of Internet security and information securi...
P/S Computer security consulting; consulting in the field of information technology; consultation fo...
Invention Techniques for generating unique identifiers for tracking process activity. A method includes re...
Invention Techniques for tracking process activity. A unique process identifier (UPID) associated with a p...
Invention Adaptive profiling of cloud services using machine learning for malware detection. A cloud-servi...
Invention Methods and systems for multi-cloud breach detection using ensemble classification and deep anoma...
Invention Securing function as a service cloud computing environments. A system and method of securing a F...
Invention Techniques for variable memory allocation using constant-sized structures. A first message struct...
Invention Anomalous command line entry detection. A command line anomaly detection system can generate ano...
Invention Source code programming language prediction for a text file. A method to predict that a text fil...
Invention Selective addition of datum to a tree data structure. A value is assigned to a rate threshold fo...
P/S Downloadable computer software for the protection and security of computer networks and computin...
P/S Educational services, namely, providing online and in-person courses of instruction for detecting...
P/S Computer software for computer and network security. Computer consultation services relating to c...
2021 P/S Providing online education in the nature of online courses in the fields of cybersecurity, endpoi...
P/S Providing information in the field of monetization of cybersecurity breaches for the protection o...
P/S Downloadable computer software for secure data access, namely, software providing a transparent ...
2020 P/S Providing a website featuring recommendations, ratings and reviews posted by consumers about loca...
P/S Software as a service (SAAS) services featuring software for computer and network security; softw...
P/S educational services, namely, providing online and onsite courses in the fields of cybersecurity,...
P/S computer security consulting; consulting in the field of information technology; consultation in ...
P/S DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L...
P/S Computer software for encryption.
P/S Downloadable and recorded computer search engine software; downloadable and recorded computer sof...
P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, si...
P/S Downloadable computer software for secure data access, namely, software providing a transparent l...
2019 P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig...
2018 P/S Downloadable computer software for computer and network security; computer software for scanning,...
P/S computer consultation; consulting in the field of information technology; computer consultation i...
2017 P/S Computer software for encryption