2024
|
Invention
|
Sensitive information discovery and test component configuration.
Testing software applications ... |
|
Invention
|
Machine-based security requirements assessment.
An input regarding security characteristics of a... |
|
Invention
|
Thread-based malware detection.
Embodiments provide for detecting viruses and other malware in e... |
2023
|
Invention
|
Patch generation for flaws in software.
Identifying and resolving weaknesses in software are com... |
|
Invention
|
Automatic real user monitoring (rum) instrumentation.
Systems and methods are disclosed to devel... |
|
Invention
|
Using artificial intelligence (ai) analysis for identifying potential vulnerabilities inserted in... |
|
Invention
|
Security orchestration, automation, and response (soar) playbook generation.
A security orchestr... |
|
Invention
|
Discover and model applications deployed in containerized platforms.
Containerized platforms lik... |
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks. Data of a plurality o... |
|
Invention
|
Establishing secure session via proxy device.
A first device transmits a request message to a pr... |
|
Invention
|
Generalized dataflow analysis for static application security testing.
A superlattice correspond... |
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks.
Data of a plurality ... |
|
Invention
|
Anomaly detection based on multi-level authentication.
A determination is made to see if a user ... |
|
Invention
|
Method and system for improving keyboard input in automated testing.
Method and system to improv... |
|
Invention
|
Method and apparatus to recognize and correlate screens.
Text screen description data for a term... |
|
Invention
|
Auto-complete testing.
One or more characters are input into an auto-complete field. Text of a d... |
|
Invention
|
Using watermarks to identify a chain of title in media.
A watermark is generated. The generated ... |
|
Invention
|
System and method to use polling to simulate server events. A device, system, and method are prov... |
|
Invention
|
Augmented question and answer (q&a) with large language models.
Large language models (LLMs) are... |
|
Invention
|
Secure hashing server. A first hash of information is generated. The first hash of the informatio... |
|
Invention
|
Secure hashing server.
A first hash of information is generated. The first hash of the informati... |
|
Invention
|
Detection of malicious software packages using machine learning on code and community data.
Embo... |
|
Invention
|
Using machine learning to identify phishing, vishing, and deep fake attacks.
Language used by a ... |
|
Invention
|
Identifying a digital watermark in an image/video/audio stream where the image has been converted... |
|
Invention
|
Identification of malicious programs using thread patterns and related data.
A current thread pa... |
|
Invention
|
Identification of variants of artificial intelligence generated malware.
Source code for a type ... |
|
Invention
|
Overlay rule integration for document migration.
Documents are often generated using a customer ... |
|
Invention
|
Overlay rule integration for document migration. Documents are often generated using a customer c... |
|
Invention
|
Automatic account setup. A request is received, from a first communication device, to create a co... |
|
Invention
|
Resource based licensing.
A request is received from a tenant. For example, the tenant may be a ... |
|
Invention
|
Automated preprocessing of complex logs. Embodiments of the disclosure provide systems and method... |
|
Invention
|
Automated network configuration.
Devices with low or no security are often added to networks. Th... |
|
Invention
|
Identifying anomalous device configuration.
Strings of a text file representing a configuration ... |
|
Invention
|
Sandboxing databases.
A sandbox database is created. The sandbox database is typically a tempora... |
|
Invention
|
Efficient length preserving encryption of large plaintexts.
A plaintext is received. For example... |
|
Invention
|
Client-side composition analysis.
Software developers and security personnel routinely scan code... |
|
Invention
|
Automated testing of user interfaces requiring a time-based one-time password (totp).
Automated ... |
|
Invention
|
Audit chain for hashes using tokenization.
A first hash of a record is retrieved. The first hash... |
|
Invention
|
Audit chain for encrypted hashes.
A first hash of a record is retrieved. The first hash is encry... |
|
Invention
|
Storing watermarks in a software image.
One or more unused locations in a software image are ide... |
|
Invention
|
Throttling test mode for browser-based web application load testing.
For each of a number of tes... |
|
Invention
|
Comparing event profile for target system event-processing data source to reference event profile... |
|
Invention
|
Tying anomalies to authentication levels.
An anomaly on a computer network is identified by proc... |
|
Invention
|
Comparison based autocorrelation in load testing.
A first execution of a test script is recorded... |
|
Invention
|
Application resource tracking between load cycles of an application.
A first load cycle of an ap... |
|
Invention
|
Identification of embedded browsers in application for automated software testing.
Software appl... |
|
Invention
|
Virtual network computing with extra keyboard layout.
Methods, systems, and techniques are provi... |
|
Invention
|
Auto-fix object not found error using image recognition.
A system, device, system-on-a-chip, and... |
|
Invention
|
Abstracting network traffic as video for representation learning.
A plurality of captured packet... |
|
Invention
|
Establishing communication stream with database control agent over which database commands are di... |
2020
|
P/S
|
Downloadable computer software for preventing, detecting, evaluating, reporting, and responding t... |
2018
|
P/S
|
SaaS services for computerized management of secure electronic data, namely, instant messages, so... |
|
P/S
|
Computer software for information security; computer software for authentication, encryption and ... |
2017
|
P/S
|
Computer software for managing and tracking software licenses Software as a service for managing ... |
|
P/S
|
Computer software for managing and tracking software
licenses. Software as a service for managin... |
|
P/S
|
Computer software for managing and tracking software licenses |
|
P/S
|
Software as a service for managing and tracking software licenses |
2016
|
P/S
|
[ Enterprise software consultation services in the nature of application development and applicat... |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications. |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications |
|
P/S
|
Computer software, namely, process management software for monitoring the product lifecycle of co... |
|
P/S
|
Computer software development tool for the monitoring and testing of web-enabled and mobile softw... |
2015
|
P/S
|
Computer software for finding and identifying security defects during the software development an... |
|
P/S
|
Providing an online forum to showcase, display, demonstrate, and promote new and innovative ideas... |
|
P/S
|
Computer software; computer software for connecting and automating workflows; computer software f... |
|
P/S
|
Computer software for information security; computer software for authentication and encryption o... |
|
P/S
|
Computer services, namely, creating an online community for users to participate in discussions o... |
|
P/S
|
Computer software for application development, deployment, and management; computer software for ... |
|
P/S
|
Computer software; computer software for infrastructure monitoring and analysis; computer softwar... |
2014
|
P/S
|
Performance testing software, namely, software for testing the performance of developer's softwar... |
|
P/S
|
Software; performance testing software; software for testing applications; computer database mana... |
|
P/S
|
Computer software. |
|
P/S
|
Technical support services, namely, technical consultation in the field of security software for ... |
|
P/S
|
Computer software development tools, namely computer software for assisting developers in creatin... |
|
P/S
|
Computer programs and computer software to automate formatted reporting of real-time security ind... |
2013
|
P/S
|
Software for analyzing source code; software for detecting and describing vulnerabilities and ass... |
2012
|
P/S
|
Computer data warehouse software for use in management of data and information; computer hardware... |
|
P/S
|
Computer data warehouse software for use in management of data and information, excluding CRM and... |
2011
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities |
2010
|
P/S
|
Computer programs and software for management of electronic data, backup, and disaster recovery t... |
|
P/S
|
Scientific, photographic, cinematographic, optical apparatus
and instruments; apparatus for reco... |
2007
|
P/S
|
Computer software, computers, computer hardware, and computer peripherals. |
|
P/S
|
Computer software used for testing, measuring and diagnosing system performance before deploying ... |
|
P/S
|
Computer software for monitoring the availability and performance of electronic communications ne... |
2006
|
P/S
|
Computer hardware; computer software used for collecting and analyzing data, to discover risks, c... |
|
P/S
|
Computer software for information security, namely for securing business and personal electronic ... |
2005
|
P/S
|
Computer data warehouse software for use in management of data and information |
|
P/S
|
Business services for others, namely, updating and distributing a rules database. Scientific and ... |
2004
|
P/S
|
Enterprise security hardware, namely computer hardware; enterprise security software, namely secu... |
|
P/S
|
Enterprise security hardware and software; intrusion detection hardware and software; computer ha... |
2003
|
P/S
|
Computer software: communications software; software development tools, but none of the above in ... |
2001
|
P/S
|
Electronic apparatus and equipment for the reception, secure storage, retrieval and transmission ... |
1996
|
P/S
|
[ computer hardware and ] computer software for monitoring performance of electronic communicatio... |