2024
|
Invention
|
Network resource privacy negotiation system and method.
A method for accessing a network resourc... |
|
Invention
|
User and group specific threat protection system and method.
A method of managing access to a ne... |
2023
|
Invention
|
Malware detection and mitigation systems and methods.
An electronic threat mitigation method is ... |
|
Invention
|
Systems and methods for detecting and mitigating threats in electronic messages.
Systems and met... |
|
Invention
|
One-class threat detection using federated learning.
A machine learning model is trained to clas... |
|
Invention
|
Dynamic analysis for malicious browser extensions.
The behavior of browser extensions when insta... |
|
Invention
|
Systems and methods for credential-based transactions over a network incorporating transaction co... |
|
Invention
|
Systems and methods for verifying digital documents.
A system and method are provided by which a... |
|
Invention
|
Electronic tracking protection systems and methods.
An electronic tracking protection system and... |
|
Invention
|
Systems and methods for transacting over a network. Systems and methods for transacting over a ne... |
|
Invention
|
Network resource privacy negotiation system and method. A method for accessing a network resource... |
|
Invention
|
Data sharing and storage control system and method. A data sharing control method. The method inc... |
|
Invention
|
Malware analysis using group testing.
Malicious activity is identified in a plurality of sequenc... |
|
Invention
|
Malicious pattern matching using graph neural networks.
A method of detecting likely malicious a... |
|
Invention
|
System and method for evaluating online data.
A method and system detects at a plurality of netw... |
2022
|
Invention
|
Systems and methods for credential-based transactions over a network.
Systems and methods for tr... |
|
Invention
|
Systems and methods for transacting over a network.
Systems and methods for transacting over a n... |
|
Invention
|
Systems and methods for reputation-based transactions over a network.
Systems and methods for tr... |
|
Invention
|
Content feed delivery system and method. A method of providing a content feed. The method include... |
|
G/S
|
Electronic transmission of credentials via peer-to-peer network Downloadable e-wallets and digita... |
|
Invention
|
Computing threat detection rule systems and methods.
A computing threat detection rule method an... |
|
G/S
|
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical,... |
|
G/S
|
Downloadable e-wallets or digital wallets; Digital Signature Algorithm (DSA) enabled kiosks; down... |
|
Invention
|
Network attack prevention systems and methods.
A system and method for preventing access to pote... |
|
Invention
|
User data collection privacy using probabilistic data structures. A method of collecting user dev... |
|
Invention
|
Privacy preference based device controls. A data control method includes receiving from a user an... |
|
Invention
|
Detecting malicious url redirection chains.
Malicious redirects in a redirect chain as a result ... |
|
Invention
|
Synthetic biometrics for user privacy.
A synthetic biometric signature is generated for a user f... |
|
Invention
|
Systems and methods for encryption in network communication. A system, computer-readable storage ... |
|
Invention
|
Universal virtual remote control for smart devices.
A universal virtual device remote control is... |
|
Invention
|
System and method for data compression and decompression. A data processing method in the form of... |
|
Invention
|
Blocked xor filter for blacklist filtering. A method of filtering a URL against a blacklist inclu... |
2021
|
Invention
|
Malware detection and mitigation system and method. A method and system for updating and applying... |
|
Invention
|
Predicting future malware with generative models.
A malware classification system includes a fir... |
|
Invention
|
Privacy preserving malicious network activity detection and mitigation. A method includes accessi... |
|
Invention
|
Reducing malware signature redundancy. Redundancy in a malware signature list is reduced by proce... |
|
Invention
|
Machine learning outputs with high confidence explanations.
A malware classification system prov... |
|
G/S
|
Computer programs, namely, intrusion detection, intrusion
prevention and virus protection softwa... |
|
G/S
|
Downloadable computer programs, namely, intrusion detection, intrusion prevention and virus prote... |
|
G/S
|
downloadable computer programs, namely, intrusion detection, intrusion prevention and virus prote... |
|
Invention
|
Application user journey management.
An application activation method includes enabling an activ... |
|
Invention
|
Data exfiltration detection. A computer-implemented method includes creating an account including... |
|
Invention
|
Managing network latency using buffer fill control. A method of managing a fill state of a buffer... |
|
G/S
|
downloadable computer software and programs for security protection and anti-virus protection, in... |
|
Invention
|
Messaging server credentials exfiltration based malware threat assessment and mitigation. A metho... |
|
Invention
|
Online content evaluation system and methods. A method including detecting a webpage accessed by ... |
|
Invention
|
User and group specific threat protection system and method. A method of managing access to a net... |
|
Invention
|
Anomaly detection and characterization in app permissions.
Anomalous or unexpected system permis... |
|
Invention
|
Network device type classification.
A method of identifying network devices includes transformin... |
|
G/S
|
Downloadable computer programs, namely, downloadable intrusion detection, intrusion prevention an... |
|
Invention
|
Automated malware classification with human-readable explanations.
A malware classification is g... |
|
Invention
|
Intra-lan network device isolation.
A private network device such as a security device is insert... |
|
Invention
|
High-confidence malware severity classification of reference file set. A reference file set havin... |
2020
|
Invention
|
Low latency cloud-assisted network security with local cache. Latency in a cloud security service... |
|
Invention
|
Network-shared data managing system and method. A data managing method. Metadata including a shar... |
2018
|
G/S
|
Computer software and programs for optimizing and resolving computer performance issues for perso... |
2017
|
G/S
|
Computer operating software; computer browsing software,
namely, software for browsing the globa... |
2014
|
G/S
|
Downloadable software and mobile application for security and performance management of mobile de... |
|
G/S
|
Computer anti-virus software; Computer software and hardware for computer security, to increase c... |
2012
|
G/S
|
Providing virtual private network (VPN) services, namely, private and secure electronic communica... |
|
G/S
|
Scientific, nautical, surveying, photographic,
cinematographic, optical, weighing, measuring, si... |
2011
|
G/S
|
Software, in particular antivirus software; data processing programs. Printed matter, in particul... |
|
G/S
|
Computer programs, namely, intrusion detection, intrusion prevention and virus protection softwar... |
|
G/S
|
Recorded computer software, recorded computer programs, including for downloading on the Internet... |
2009
|
G/S
|
Computer software and programs for security protection and anti-virus protection, in the field of... |
|
G/S
|
Computer programs, namely intrusion detection, intrusion prevention and virus protection software... |
|
G/S
|
Software. |
|
G/S
|
Computer software and programs for security protection, namely anti-spam, anti-spyware, firewall,... |
2006
|
G/S
|
Computer software programs for computer anti-virus protection; pre-recorded electronic, magnetic ... |
|
G/S
|
Software, recorded programs, data and databases and other information on electronic, magnetic and... |
2004
|
G/S
|
computer software and programs for security protection, including anti-virus protection, in the f... |
|
G/S
|
Software, programs (recorded), data and databases and other information on electronic, magnetic a... |
|
G/S
|
Software; loaded programs; data and databases and other information on all kinds of electronic, m... |
|
G/S
|
Data processing programs. Computer programming; applied consultancy in the area of
electronic da... |