2024
|
P/S
|
Computer security consulting; consulting in the field of
information technology; computer securi... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; computer securit... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; consultation for... |
|
Invention
|
Analysis of malware.
A security service can determine a synthetic context based at least in part... |
|
Invention
|
Distributed digital security system.
A distributed security system can include instances of a co... |
|
P/S
|
Software as a service (SaaS) services featuring software for automating customer interactions and... |
|
P/S
|
Software as a service (SaaS) services featuring software for
automating customer interactions an... |
|
Invention
|
Method, system and computer program product for editing movies in distributed scalable media envi... |
|
Invention
|
Merging and unmerging entity representations via resolver trees.
A digital security system can s... |
|
Invention
|
Systems and methods for caching of managed content in a distributed environment using a multi-tie... |
|
Invention
|
Collaborative augmented reality.
Augmented reality presentations are provided at respective elec... |
|
Invention
|
Using large language models to recommend and validate asset and/or cloud configurations.
A syste... |
2023
|
Invention
|
Smart notification for structured and unstructured data.
Systems and methods for providing cyber... |
|
Invention
|
Threat exposure management system using large language models.
A system and method of using gene... |
|
P/S
|
Computer security consulting; Consulting in the field of information technology relating to insta... |
|
Invention
|
Large language model-based authentication.
Systems and methods of authentication utilizing a lar... |
|
Invention
|
Incremental solves using llms for api calls.
Systems and methods for incremental solves using LL... |
|
Invention
|
Funnel techniques for natural language to api calls.
The present disclosure produces a first out... |
|
Invention
|
Triggering and downselection of volatile memory scanning.
Methods and systems implement computin... |
|
Invention
|
Prevention of prompt injection attacks on large language models by tokenization of structured dat... |
|
Invention
|
Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server w... |
|
Invention
|
Cyber security boot status markers.
Boot status markers record historical boot processes perform... |
|
P/S
|
Business administration services; business services, namely, administration of a program for enab... |
|
P/S
|
Business analysis, research and information services; business consulting services in the field o... |
|
P/S
|
Business administration services; business services, namely,
administration of a program for ena... |
|
P/S
|
Business analysis, research and information services;
business consulting services in the field ... |
|
Invention
|
Rules-based malware resolution suggestions.
A rules-based malware detection and assessment servi... |
|
Invention
|
Identifying patterns in large quantities of collected emails.
A system and method of detecting m... |
|
Invention
|
Threat prediction in a streaming system.
Techniques for aggregating data usable for generating s... |
|
Invention
|
Techniques for detecting file similarity.
A computer-implemented method of detecting similarity ... |
|
Invention
|
Detecting targeted intrusion on mobile devices.
Techniques to determining a program installed on... |
|
Invention
|
Method and apparatus for malicious file extension detection.
A feature vector is created that co... |
|
Invention
|
Method and apparatus for mapping similarity spaces.
A method for selecting a region of a similar... |
|
Invention
|
Interpolant pattern matching.
Interpolant pattern matching reflects a runtime environment. Any i... |
|
Invention
|
Applying diffusion models in adversarial purification and adversarial sample generation in cybers... |
|
Invention
|
Cloud-delivered hooks and hooking policies.
Cloud-delivered hooks are injected as binary instrum... |
|
Invention
|
Interwoven amq data structure.
An interwoven approximate membership query (AMQ) data structure i... |
|
Invention
|
Adversarial attacks common interface.
A system and method of adjusting a classifier to improve a... |
|
Invention
|
Techniques for remediating control flow flattening.
A computer-implemented method for deobfuscat... |
|
Invention
|
Accessibility services based phishing detection and prevention.
Systems and methods disclosed th... |
|
Invention
|
Method and apparatus for evaluating similarity between files.
A method for constructing a simila... |
|
Invention
|
Query management in a streaming system.
Techniques to manage queries for managing queries that d... |
|
Invention
|
Fingerprinting techniques to support file hash generation.
A method of generating a file hash us... |
|
Invention
|
Namespace mapping to support file hash generation.
A method of generating a file hash using moun... |
|
Invention
|
Artificial intelligence monitoring.
An artificial intelligence (AI) monitoring service detects, ... |
|
P/S
|
Business administration services; Business services, namely, administration of a program for enab... |
|
Invention
|
Aggressive embedding dropout in embedding-based malware detection.
Malware is detected using an ... |
|
Invention
|
Data-only decision validation models to update false predictions.
A security agent configured to... |
|
Invention
|
Machine learning-based malware detection for code reflection.
A process subset of an executing p... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; Computer securit... |
|
Invention
|
Use of multifactor authentication in assessing suspicious activity.
A security agent configured ... |
2022
|
Invention
|
Techniques for ordering process activity in a concurrent environment.
Trackable activity perform... |
|
Invention
|
Techniques for tracking executable images across forking operations.
A creation of a first proce... |
|
P/S
|
Computer security consulting; consulting in the field of Internet security and information securi... |
|
P/S
|
Computer security consulting; consulting in the field of
information technology; consultation fo... |
|
Invention
|
Techniques for generating unique identifiers for tracking process activity.
A method includes re... |
|
Invention
|
Techniques for tracking process activity.
A unique process identifier (UPID) associated with a p... |
|
Invention
|
Adaptive profiling of cloud services using machine learning for malware detection.
A cloud-servi... |
|
Invention
|
Methods and systems for multi-cloud breach detection using ensemble classification and deep anoma... |
|
Invention
|
Securing function as a service cloud computing environments.
A system and method of securing a F... |
|
Invention
|
Techniques for variable memory allocation using constant-sized structures. A first message struct... |
|
Invention
|
Anomalous command line entry detection.
A command line anomaly detection system can generate ano... |
|
Invention
|
Source code programming language prediction for a text file.
A method to predict that a text fil... |
|
Invention
|
Selective addition of datum to a tree data structure.
A value is assigned to a rate threshold fo... |
|
P/S
|
Downloadable computer software for the protection and
security of computer networks and computin... |
|
P/S
|
Educational services, namely, providing online and in-person courses of instruction for detecting... |
|
P/S
|
Computer software for computer and network security. Computer consultation services relating to c... |
2021
|
P/S
|
Providing online education in the nature of online courses in the fields of cybersecurity, endpoi... |
|
P/S
|
Providing information in the field of monetization of cybersecurity breaches for the protection o... |
|
P/S
|
Downloadable computer software for secure data access,
namely, software providing a transparent ... |
2020
|
P/S
|
Providing a website featuring recommendations, ratings and reviews posted by consumers about loca... |
|
P/S
|
Software as a service (SAAS) services featuring software for computer and network security; softw... |
|
P/S
|
educational services, namely, providing online and onsite courses in the fields of cybersecurity,... |
|
P/S
|
computer security consulting; consulting in the field of information technology; consultation in ... |
|
P/S
|
DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L... |
|
P/S
|
Computer software for encryption. |
|
P/S
|
Downloadable and recorded computer search engine software; downloadable and recorded computer sof... |
|
P/S
|
Scientific, nautical, surveying, photographic,
cinematographic, optical, weighing, measuring, si... |
|
P/S
|
Downloadable computer software for secure data access, namely, software providing a transparent l... |
2019
|
P/S
|
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig... |
2018
|
P/S
|
Downloadable computer software for computer and network security; computer software for scanning,... |
|
P/S
|
computer consultation; consulting in the field of information technology; computer consultation i... |
2017
|
P/S
|
Computer software for encryption |