2024
|
Invention
|
Probabilistic event linking. A method of monitoring a network for linked events includes receivin... |
|
P/S
|
Computer security consulting; consulting in the field of
information technology; computer securi... |
|
Invention
|
Static analyzer instruction generation based on action of external initialization code during ini... |
|
Invention
|
Nodal work assignments in cloud computing.
Nodal work assignments efficiently distribute server ... |
|
Invention
|
Directory service recommender assessment and scoring. A cybersecurity service assesses, scores, a... |
|
Invention
|
Risk scoring of cloud permission assignments using supervised machine learning. Techniques for ca... |
|
Invention
|
Threat classification in a streaming system. Techniques for identifying data usable for generatin... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; computer securit... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; consultation in ... |
|
Invention
|
Conditional bloom filters representing field aliasing. Conditional Bloom filters improve computer... |
|
Invention
|
Techniques for performing static analysis on deployed application code.
The present disclosure p... |
|
Invention
|
Analysis of malware.
A security service can determine a synthetic context based at least in part... |
|
P/S
|
Software as a service (SaaS) services featuring software for automating customer interactions and... |
|
P/S
|
Software as a service (SaaS) services featuring software for
automating customer interactions an... |
|
Invention
|
Injected byte buffer data classification. Methods and systems for injected byte buffer data class... |
|
Invention
|
Adversarial script generation using artificial intelligence models. The present disclosure provid... |
|
Invention
|
Localization middleware. A system and method of a localization middleware for localizing datasets... |
|
Invention
|
Large language model assisted cybersecurity platform.
A system and method of using generative AI... |
|
Invention
|
Using large language models to recommend and validate asset and/or cloud configurations.
A syste... |
2023
|
Invention
|
Counter adversary large language models.
A system and method of using generative AI to maintain ... |
|
Invention
|
Smart notification for structured and unstructured data.
Systems and methods for providing cyber... |
|
Invention
|
Threat exposure management system using large language models.
A system and method of using gene... |
|
Invention
|
Risk scoring of cloud permission assignments using supervised machine learning.
Techniques for c... |
|
Invention
|
Risk scoring using supervised machine learning.
Techniques for using supervised machine learning... |
|
Invention
|
Default-deny network egress architecture in a virtual private cloud.
Methods and systems for des... |
|
P/S
|
Computer security consulting; Consulting in the field of information technology relating to insta... |
|
Invention
|
Cybersecurity typing and inferencing.
A cybersecurity event validation service provides a user-f... |
|
Invention
|
Secure code clustering through llm-based semantic analysis.
An approach is provided that provide... |
|
Invention
|
Monitoring file system operations using ebpf dfa architecture.
A deterministic finite automata (... |
|
Invention
|
Secure code analysis copilot.
An approach is provided that identifies a vulnerability correspond... |
|
Invention
|
Method and apparatus for data synchronization and persistence between computing devices.
A compu... |
|
Invention
|
Adapters for runtime application self-protection.
An approach is provided that trains an artific... |
|
Invention
|
Stable and discernable mapping of categorical data to colors for graphical display.
Data is rece... |
|
Invention
|
Incremental solves using llms for api calls.
Systems and methods for incremental solves using LL... |
|
Invention
|
Source code similarity.
Automated source code similarity greatly improves computer functioning. ... |
|
Invention
|
Nodal redundancy storage decisions.
Nodal redundancy storage decisions efficiently distribute re... |
|
Invention
|
Embedding entity matching.
Embedding entity matching greatly improves computer functioning. Diff... |
|
Invention
|
Funnel techniques for natural language to api calls.
The present disclosure produces a first out... |
|
Invention
|
Prevention of prompt injection attacks on large language models by tokenization of structured dat... |
|
Invention
|
Cybersecurity detection.
A cybersecurity service protects endpoint devices from cybersecurity at... |
|
Invention
|
Threat classification in a streaming system.
Techniques for identify data usable for generating ... |
|
Invention
|
Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server w... |
|
Invention
|
Techniques for assessing malware classification.
A sample file that is associated with malware a... |
|
Invention
|
Techniques for delegated inter-party private set intersection. A method for detecting a private s... |
|
Invention
|
Cyber security boot status markers.
Boot status markers record historical boot processes perform... |
|
Invention
|
Assessing computer system vulnerabilities and exposures.
Assessing computer system vulnerabiliti... |
|
P/S
|
Computer security consulting; consulting services in the field of information technology, namely... |
|
P/S
|
Business administration services; business services, namely, administration of a program for enab... |
|
P/S
|
Business analysis, research and information services; business consulting services in the field o... |
|
P/S
|
Business administration services; business services, namely,
administration of a program for ena... |
|
P/S
|
Business analysis, research and information services;
business consulting services in the field ... |
|
Invention
|
Rules-based malware resolution suggestions.
A rules-based malware detection and assessment servi... |
|
Invention
|
Identifying patterns in large quantities of collected emails.
A system and method of detecting m... |
|
Invention
|
Threat prediction in a streaming system.
Techniques for aggregating data usable for generating s... |
|
Invention
|
Techniques for detecting file similarity.
A computer-implemented method of detecting similarity ... |
|
Invention
|
Detecting targeted intrusion on mobile devices.
Techniques to determining a program installed on... |
|
Invention
|
Method and apparatus for malicious file extension detection.
A feature vector is created that co... |
|
Invention
|
Method and apparatus for mapping similarity spaces.
A method for selecting a region of a similar... |
|
Invention
|
Interpolant pattern matching.
Interpolant pattern matching reflects a runtime environment. Any i... |
|
Invention
|
Applying diffusion models in adversarial purification and adversarial sample generation in cybers... |
|
Invention
|
Cloud-delivered hooks and hooking policies.
Cloud-delivered hooks are injected as binary instrum... |
|
P/S
|
Business administration services; Business services, namely, administration of a program for enab... |
|
P/S
|
Computer security consulting; consulting in the field of information technology; Computer securit... |
2022
|
P/S
|
Computer security consulting; consulting in the field of Internet security and information securi... |
|
P/S
|
Computer security consulting; consulting in the field of
information technology; consultation fo... |
|
P/S
|
Downloadable computer software for the protection and
security of computer networks and computin... |
|
P/S
|
Educational services, namely, providing online and in-person courses of instruction for detecting... |
|
P/S
|
Computer software for computer and network security. Computer consultation services relating to c... |
2021
|
P/S
|
Computer security consulting; consulting in the field of information technology; consultation for... |
|
P/S
|
Providing online education in the nature of online courses in the fields of cybersecurity, endpoi... |
|
P/S
|
Providing information in the field of monetization of cybersecurity breaches for the protection o... |
|
P/S
|
Downloadable computer software for secure data access,
namely, software providing a transparent ... |
2020
|
P/S
|
Providing a website featuring recommendations, ratings and reviews posted by consumers about loca... |
|
P/S
|
Software as a service (SAAS) services featuring software for computer and network security; softw... |
|
P/S
|
educational services, namely, providing online and onsite courses in the fields of cybersecurity,... |
|
P/S
|
computer security consulting; consulting in the field of information technology; consultation in ... |
|
P/S
|
DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L... |
|
P/S
|
Computer software for encryption. |
|
P/S
|
Downloadable and recorded computer search engine software; downloadable and recorded computer sof... |
|
P/S
|
Scientific, nautical, surveying, photographic,
cinematographic, optical, weighing, measuring, si... |
|
P/S
|
Downloadable computer software for secure data access, namely, software providing a transparent l... |
2019
|
P/S
|
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig... |
2018
|
P/S
|
Downloadable computer software for computer and network security; computer software for scanning,... |
|
P/S
|
computer consultation; consulting in the field of information technology; computer consultation i... |
2016
|
P/S
|
Downloadable software for cloud and network security; Computer software for computer network secu... |