CrowdStrike, Inc.

États‑Unis d’Amérique


 
Quantité totale PI 458
Rang # Quantité totale PI 2 846
Note d'activité PI 3,3/5.0    359
Rang # Activité PI 1 991
Parent CrowdStrike Holdings, Inc.
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

379 32
0 10
14 16
7
 
Dernier brevet 2025 - Probabilistic event linking
Premier brevet 2002 - Wireless network security
Dernière marque 2024 - CROWDSTRIKE
Première marque 2012 - CROWDSTRIKE

Industrie (Classification de Nice)

Derniers inventions, produits et services

2024 Invention Probabilistic event linking. A method of monitoring a network for linked events includes receivin...
P/S Computer security consulting; consulting in the field of information technology; computer securi...
Invention Static analyzer instruction generation based on action of external initialization code during ini...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server ...
Invention Directory service recommender assessment and scoring. A cybersecurity service assesses, scores, a...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for ca...
Invention Threat classification in a streaming system. Techniques for identifying data usable for generatin...
P/S Computer security consulting; consulting in the field of information technology; computer securit...
P/S Computer security consulting; consulting in the field of information technology; consultation in ...
Invention Conditional bloom filters representing field aliasing. Conditional Bloom filters improve computer...
Invention Techniques for performing static analysis on deployed application code. The present disclosure p...
Invention Analysis of malware. A security service can determine a synthetic context based at least in part...
P/S Software as a service (SaaS) services featuring software for automating customer interactions and...
P/S Software as a service (SaaS) services featuring software for automating customer interactions an...
Invention Injected byte buffer data classification. Methods and systems for injected byte buffer data class...
Invention Adversarial script generation using artificial intelligence models. The present disclosure provid...
Invention Localization middleware. A system and method of a localization middleware for localizing datasets...
Invention Large language model assisted cybersecurity platform. A system and method of using generative AI...
Invention Using large language models to recommend and validate asset and/or cloud configurations. A syste...
2023 Invention Counter adversary large language models. A system and method of using generative AI to maintain ...
Invention Smart notification for structured and unstructured data. Systems and methods for providing cyber...
Invention Threat exposure management system using large language models. A system and method of using gene...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for c...
Invention Risk scoring using supervised machine learning. Techniques for using supervised machine learning...
Invention Default-deny network egress architecture in a virtual private cloud. Methods and systems for des...
P/S Computer security consulting; Consulting in the field of information technology relating to insta...
Invention Cybersecurity typing and inferencing. A cybersecurity event validation service provides a user-f...
Invention Secure code clustering through llm-based semantic analysis. An approach is provided that provide...
Invention Monitoring file system operations using ebpf dfa architecture. A deterministic finite automata (...
Invention Secure code analysis copilot. An approach is provided that identifies a vulnerability correspond...
Invention Method and apparatus for data synchronization and persistence between computing devices. A compu...
Invention Adapters for runtime application self-protection. An approach is provided that trains an artific...
Invention Stable and discernable mapping of categorical data to colors for graphical display. Data is rece...
Invention Incremental solves using llms for api calls. Systems and methods for incremental solves using LL...
Invention Source code similarity. Automated source code similarity greatly improves computer functioning. ...
Invention Nodal redundancy storage decisions. Nodal redundancy storage decisions efficiently distribute re...
Invention Embedding entity matching. Embedding entity matching greatly improves computer functioning. Diff...
Invention Funnel techniques for natural language to api calls. The present disclosure produces a first out...
Invention Prevention of prompt injection attacks on large language models by tokenization of structured dat...
Invention Cybersecurity detection. A cybersecurity service protects endpoint devices from cybersecurity at...
Invention Threat classification in a streaming system. Techniques for identify data usable for generating ...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server w...
Invention Techniques for assessing malware classification. A sample file that is associated with malware a...
Invention Techniques for delegated inter-party private set intersection. A method for detecting a private s...
Invention Cyber security boot status markers. Boot status markers record historical boot processes perform...
Invention Assessing computer system vulnerabilities and exposures. Assessing computer system vulnerabiliti...
P/S Computer security consulting; consulting services in the field of information technology, namely...
P/S Business administration services; business services, namely, administration of a program for enab...
P/S Business analysis, research and information services; business consulting services in the field o...
P/S Business administration services; business services, namely, administration of a program for ena...
P/S Business analysis, research and information services; business consulting services in the field ...
Invention Rules-based malware resolution suggestions. A rules-based malware detection and assessment servi...
Invention Identifying patterns in large quantities of collected emails. A system and method of detecting m...
Invention Threat prediction in a streaming system. Techniques for aggregating data usable for generating s...
Invention Techniques for detecting file similarity. A computer-implemented method of detecting similarity ...
Invention Detecting targeted intrusion on mobile devices. Techniques to determining a program installed on...
Invention Method and apparatus for malicious file extension detection. A feature vector is created that co...
Invention Method and apparatus for mapping similarity spaces. A method for selecting a region of a similar...
Invention Interpolant pattern matching. Interpolant pattern matching reflects a runtime environment. Any i...
Invention Applying diffusion models in adversarial purification and adversarial sample generation in cybers...
Invention Cloud-delivered hooks and hooking policies. Cloud-delivered hooks are injected as binary instrum...
P/S Business administration services; Business services, namely, administration of a program for enab...
P/S Computer security consulting; consulting in the field of information technology; Computer securit...
2022 P/S Computer security consulting; consulting in the field of Internet security and information securi...
P/S Computer security consulting; consulting in the field of information technology; consultation fo...
P/S Downloadable computer software for the protection and security of computer networks and computin...
P/S Educational services, namely, providing online and in-person courses of instruction for detecting...
P/S Computer software for computer and network security. Computer consultation services relating to c...
2021 P/S Computer security consulting; consulting in the field of information technology; consultation for...
P/S Providing online education in the nature of online courses in the fields of cybersecurity, endpoi...
P/S Providing information in the field of monetization of cybersecurity breaches for the protection o...
P/S Downloadable computer software for secure data access, namely, software providing a transparent ...
2020 P/S Providing a website featuring recommendations, ratings and reviews posted by consumers about loca...
P/S Software as a service (SAAS) services featuring software for computer and network security; softw...
P/S educational services, namely, providing online and onsite courses in the fields of cybersecurity,...
P/S computer security consulting; consulting in the field of information technology; consultation in ...
P/S DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L...
P/S Computer software for encryption.
P/S Downloadable and recorded computer search engine software; downloadable and recorded computer sof...
P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, si...
P/S Downloadable computer software for secure data access, namely, software providing a transparent l...
2019 P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig...
2018 P/S Downloadable computer software for computer and network security; computer software for scanning,...
P/S computer consultation; consulting in the field of information technology; computer consultation i...
2016 P/S Downloadable software for cloud and network security; Computer software for computer network secu...