2024
|
Invention
|
Thread-based malware detection.
Embodiments provide for detecting viruses and other malware in e... |
|
Invention
|
Selecting subscribing computing node to execute data storage plan for data shard.
A distributed ... |
2023
|
Invention
|
Patch generation for flaws in software.
Identifying and resolving weaknesses in software are com... |
|
Invention
|
Secure hashing server. A first hash of information is generated. The first hash of the informatio... |
|
Invention
|
Secure hashing server.
A first hash of information is generated. The first hash of the informati... |
|
Invention
|
Detection of malicious software packages using machine learning on code and community data.
Embo... |
|
Invention
|
Using machine learning to identify phishing, vishing, and deep fake attacks.
Language used by a ... |
|
Invention
|
Identifying a digital watermark in an image/video/audio stream where the image has been converted... |
|
Invention
|
Identification of malicious programs using thread patterns and related data.
A current thread pa... |
|
Invention
|
Identification of variants of artificial intelligence generated malware.
Source code for a type ... |
|
Invention
|
Overlay rule integration for document migration.
Documents are often generated using a customer ... |
|
Invention
|
Overlay rule integration for document migration. Documents are often generated using a customer c... |
|
Invention
|
Automatic account setup. A request is received, from a first communication device, to create a co... |
|
Invention
|
Resource based licensing.
A request is received from a tenant. For example, the tenant may be a ... |
|
Invention
|
Automated preprocessing of complex logs. Embodiments of the disclosure provide systems and method... |
|
Invention
|
Automated network configuration.
Devices with low or no security are often added to networks. Th... |
|
Invention
|
Identifying anomalous device configuration.
Strings of a text file representing a configuration ... |
|
Invention
|
Sandboxing databases.
A sandbox database is created. The sandbox database is typically a tempora... |
|
Invention
|
Efficient length preserving encryption of large plaintexts.
A plaintext is received. For example... |
|
Invention
|
Client-side composition analysis.
Software developers and security personnel routinely scan code... |
|
Invention
|
Automated testing of user interfaces requiring a time-based one-time password (totp).
Automated ... |
|
Invention
|
Audit chain for hashes using tokenization.
A first hash of a record is retrieved. The first hash... |
|
Invention
|
Audit chain for encrypted hashes.
A first hash of a record is retrieved. The first hash is encry... |
|
Invention
|
Storing watermarks in a software image.
One or more unused locations in a software image are ide... |
|
Invention
|
Throttling test mode for browser-based web application load testing.
For each of a number of tes... |
|
Invention
|
Automatic webpage layout checker: 5d deep learning based on unique rules for coloring web compone... |
|
Invention
|
Comparing event profile for target system event-processing data source to reference event profile... |
|
Invention
|
Tying anomalies to authentication levels.
An anomaly on a computer network is identified by proc... |
|
Invention
|
Comparison based autocorrelation in load testing.
A first execution of a test script is recorded... |
|
Invention
|
Application resource tracking between load cycles of an application.
A first load cycle of an ap... |
|
Invention
|
Identification of embedded browsers in application for automated software testing.
Software appl... |
|
Invention
|
Virtual network computing with extra keyboard layout.
Methods, systems, and techniques are provi... |
|
Invention
|
Auto-fix object not found error using image recognition.
A system, device, system-on-a-chip, and... |
|
Invention
|
Abstracting network traffic as video for representation learning.
A plurality of captured packet... |
|
Invention
|
Establishing communication stream with database control agent over which database commands are di... |
|
Invention
|
Learning based identification of vulnerable functions in relation to common vulnerabilities and e... |
|
Invention
|
Prevention of vishing attacks.
A communication stream is received. For example, the communicatio... |
|
Invention
|
Multi-level virtual resource authentication.
A request to grant control of a virtual resource is... |
2022
|
Invention
|
Circular blockchains.
A plurality of circular blockchains are created. The plurality of circular... |
|
Invention
|
Comprehensive software supply chain analysis.
A current a version of an external component (e.g.... |
|
Invention
|
Automate load test scenario based on mapping with real-time data monitoring.
Input data is recei... |
|
Invention
|
Blockchain escrow and auditing service.
A request to authenticate to a Blockchain as a Service (... |
|
Invention
|
Identification of relevant code block within relevant software package for a query.
A database s... |
|
Invention
|
Efficient liveness detection in a management network.
A request is received by a network managem... |
|
Invention
|
Updating label probability distributions of data points.
One or more iterations are performed. E... |
|
Invention
|
Direct resource sync.
A snapshot event is received. The snapshot event is a snapshot of data tha... |
|
Invention
|
Watermark server.
An indication of a user being authenticated is received. For example, the user... |
|
Invention
|
Private secure blockchain.
A first node in a distributed blockchain ledger validates all remaini... |
|
Invention
|
Machine-based security requirements assessment. An input regarding security characteristics of a ... |
|
Invention
|
Configuration compliance check prior to deployment. A request is received to deploy a configurati... |
2020
|
P/S
|
Downloadable computer software for preventing, detecting, evaluating, reporting, and responding t... |
2018
|
P/S
|
SaaS services for computerized management of secure electronic data, namely, instant messages, so... |
2017
|
P/S
|
Computer software for managing and tracking software licenses Software as a service for managing ... |
|
P/S
|
Computer software for managing and tracking software
licenses. Software as a service for managin... |
|
P/S
|
Computer software for managing and tracking software licenses |
|
P/S
|
Software as a service for managing and tracking software licenses |
2016
|
P/S
|
[ Enterprise software consultation services in the nature of application development and applicat... |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications. |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications |
|
P/S
|
Computer software, namely, process management software for monitoring the product lifecycle of co... |
|
P/S
|
Computer software development tool for the monitoring and testing of web-enabled and mobile softw... |
2015
|
P/S
|
Computer software for finding and identifying security defects during the software development an... |
|
P/S
|
Providing an online forum to showcase, display, demonstrate, and promote new and innovative ideas... |
|
P/S
|
Computer software; computer software for connecting and automating workflows; computer software f... |
|
P/S
|
Computer software for information security; computer software for authentication and encryption o... |
|
P/S
|
Computer services, namely, creating an online community for users to participate in discussions o... |
|
P/S
|
Computer software for application development, deployment, and management; computer software for ... |
|
P/S
|
Computer software; computer software for infrastructure monitoring and analysis; computer softwar... |
2014
|
P/S
|
Performance testing software, namely, software for testing the performance of developer's softwar... |
|
P/S
|
Software; performance testing software; software for testing applications; computer database mana... |
|
P/S
|
Computer software. |
|
P/S
|
Technical support services, namely, technical consultation in the field of security software for ... |
|
P/S
|
Computer software development tools, namely computer software for assisting developers in creatin... |
|
P/S
|
Computer hardware and computer software for testing, evaluating, monitoring, scanning, mapping an... |
|
P/S
|
computer software; computer software for encryption and safeguarding digital files; computer soft... |
|
P/S
|
Computer software for management of unstructured and semi-structured data for storage and analytics. |
|
P/S
|
Computer software; computer software development tools; software for computer system and applicat... |
|
P/S
|
Computer programs and computer software to automate formatted reporting of real-time security ind... |
2013
|
P/S
|
Software for analyzing source code; software for detecting and describing vulnerabilities and ass... |
2012
|
P/S
|
Computer data warehouse software for use in management of data and information; computer hardware... |
|
P/S
|
Computer data warehouse software for use in management of data and information, excluding CRM and... |
2011
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities |
2010
|
P/S
|
Computer programs and software for management of electronic data, backup, and disaster recovery t... |
|
P/S
|
Scientific, photographic, cinematographic, optical apparatus
and instruments; apparatus for reco... |
2007
|
P/S
|
Computer software, computers, computer hardware, and computer peripherals. |
|
P/S
|
Computer software used for testing, measuring and diagnosing system performance before deploying ... |
|
P/S
|
Computer software for monitoring the availability and performance of electronic communications ne... |
2006
|
P/S
|
Computer hardware; computer software used for collecting and analyzing data, to discover risks, c... |
|
P/S
|
Computer software for information security, namely for securing business and personal electronic ... |
2005
|
P/S
|
Computer data warehouse software for use in management of data and information |
|
P/S
|
Business services for others, namely, updating and distributing a rules database. Scientific and ... |
2004
|
P/S
|
Enterprise security hardware, namely computer hardware; enterprise security software, namely secu... |
|
P/S
|
Enterprise security hardware and software; intrusion detection hardware and software; computer ha... |