|
2025
|
Invention
|
Throttling test mode for browser-based web application load testing.
For each of a number of tes... |
|
|
Invention
|
Models based on data augmented with conceivable transitions.
According to an example, a model is... |
|
|
Invention
|
Selecting subscribing computing node to execute data storage plan for data shard.
A distributed ... |
|
|
Invention
|
Automated network configuration.
Devices with low or no security are often added to networks. Th... |
|
|
Invention
|
Identifying anomalous device configuration.
Strings of a text file representing a configuration ... |
|
|
Invention
|
Overlay rule integration for document migration.
Documents are often generated using a customer ... |
|
|
Invention
|
Machine-based source code assessment.
Systems and methods are disclosed for configuring a testin... |
|
2024
|
Invention
|
Sensitive information discovery and test component configuration.
Testing software applications ... |
|
|
Invention
|
Performing sast on second version of source code after sast has been performed on first version. ... |
|
|
Invention
|
Sending authentication codes for secure access.
Authentication codes (e.g., a One Time Passwords... |
|
|
Invention
|
Prevention of data leakage of an artificial intelligence (ai) training set. Sensitive data is rec... |
|
|
Invention
|
Using an artificial intelligence (ai) algorithm to identify patterns in ai algorithm weights to c... |
|
|
Invention
|
Real-time management of artificial intelligence (ai) input data/training corpus.
A training scop... |
|
|
Invention
|
License analysis for artificial intelligence (ai) generated compositions.
A composition is gener... |
|
|
Invention
|
Identification of a compromised artificial intelligence (ai) algorithm.
Baseline structure infor... |
|
|
Invention
|
Java-based application inventory discovery.
A system includes at least one processor and a compu... |
|
|
Invention
|
Using artificial intelligence (ai) algorithms to identify input that produces issues in ai genera... |
|
|
Invention
|
Tying access/redaction to authentication levels.
A media is created. The media may be a document... |
|
|
Invention
|
Iterative application of user-selected filters to log events.
Log events for a target system are... |
|
|
Invention
|
Training machine learning algorithm(s) to identify leaks of sensitive information.
A trained mac... |
|
|
Invention
|
Search table and search job for search query for which matching events are to be continually prov... |
|
|
Invention
|
Generation of vectors from source code produced by artificial intelligence (ai) algorithms to ide... |
|
|
Invention
|
Deduplicate office files regardless of historical metadata manipulation by another system.
A sys... |
|
|
Invention
|
Performing flow-sensitive sast on source code representation from which lines identified by flow-... |
|
|
Invention
|
Managing smart contracts using a distributed ledger. A blockchain is created. The blockchain comp... |
|
2023
|
Invention
|
Automatic cookie consent.
In response to a web page of a web site having been loaded, a consent ... |
|
|
Invention
|
Scanning of training code to prevent vulnerabilities in artificial intelligence (ai) generated so... |
|
|
Invention
|
Using threat intelligence to manage software fixes.
A defect in the code of a software program i... |
|
|
Invention
|
Local browser databases support in state management for user interface based browser automation. ... |
|
|
Invention
|
Supply chain analysis for artificial intelligence (ai) generated source code. Source code generat... |
|
|
Invention
|
Adding watermarks to artificial intelligence (ai) generated compositions based on identification ... |
|
|
Invention
|
Using hierarchical models and artificial intelligence (ai) to improve recognition of graphical ob... |
|
|
Invention
|
Automated combobox.select in a non-technology way.
A method includes capturing a first image of ... |
|
|
Invention
|
Controlling the use of source code for training artificial intelligence (ai) algorithms.
Input s... |
|
|
Invention
|
Global signal analytics.
Attacks on a first network can be targeted to the first network or comp... |
|
|
Invention
|
Tracking virtual processes to identify anomalies.
A virtualization pattern is learned. The learn... |
|
|
Invention
|
Deadlock prevention utilizing distributed resource reservations. In multi-threaded or multi-proce... |
|
|
Invention
|
Generalized intermediate and lower level source code representations for static application secur... |
|
|
Invention
|
Systems and methods for structured bayesian classification for content management.
A system incl... |
|
|
Invention
|
Network information scanning system.
A training corpus for training a similarity algorithm is re... |
|
|
Invention
|
Automatic real user monitoring (rum) instrumentation.
Systems and methods are disclosed to devel... |
|
|
Invention
|
Using artificial intelligence (ai) analysis for identifying potential vulnerabilities inserted in... |
|
|
Invention
|
Security orchestration, automation, and response (soar) playbook generation.
A security orchestr... |
|
|
Invention
|
Discover and model applications deployed in containerized platforms.
Containerized platforms lik... |
|
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks. Data of a plurality o... |
|
|
Invention
|
Establishing secure session via proxy device.
A first device transmits a request message to a pr... |
|
|
Invention
|
Generalized dataflow analysis for static application security testing.
A superlattice correspond... |
|
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks.
Data of a plurality ... |
|
|
Invention
|
Method and apparatus to recognize and correlate screens.
Text screen description data for a term... |
|
2020
|
P/S
|
Downloadable computer software for preventing, detecting, evaluating, reporting, and responding t... |
|
2018
|
P/S
|
SaaS services for computerized management of secure electronic data, namely, instant messages, so... |
|
|
P/S
|
Computer software for information security; computer software for authentication, encryption and ... |
|
2017
|
P/S
|
Computer software for managing and tracking software licenses Software as a service for managing ... |
|
|
P/S
|
Computer software for managing and tracking software
licenses. Software as a service for managin... |
|
|
P/S
|
Computer software for managing and tracking software licenses |
|
|
P/S
|
Software as a service for managing and tracking software licenses |
|
2016
|
P/S
|
[ Enterprise software consultation services in the nature of application development and applicat... |
|
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications. |
|
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications |
|
|
P/S
|
Computer software, namely, process management software for monitoring the product lifecycle of co... |
|
|
P/S
|
Computer software development tool for the monitoring and testing of web-enabled and mobile softw... |
|
2015
|
P/S
|
Computer software for finding and identifying security defects during the software development an... |
|
|
P/S
|
Providing an online forum to showcase, display, demonstrate, and promote new and innovative ideas... |
|
|
P/S
|
Computer software; computer software for connecting and automating workflows; computer software f... |
|
|
P/S
|
Computer software for information security; computer software for authentication and encryption o... |
|
|
P/S
|
Computer services, namely, creating an online community for users to participate in discussions o... |
|
|
P/S
|
Computer software for application development, deployment, and management; computer software for ... |
|
|
P/S
|
Computer software; computer software for infrastructure monitoring and analysis; computer softwar... |
|
2014
|
P/S
|
Performance testing software, namely, software for testing the performance of developer's softwar... |
|
|
P/S
|
Technical support services, namely, technical consultation in the field of security software for ... |
|
|
P/S
|
Computer software development tools, namely computer software for assisting developers in creatin... |
|
|
P/S
|
Computer programs and computer software to automate formatted reporting of real-time security ind... |
|
2013
|
P/S
|
Software for analyzing source code; software for detecting and describing vulnerabilities and ass... |
|
2012
|
P/S
|
Computer data warehouse software for use in management of data and information; computer hardware... |
|
|
P/S
|
Computer data warehouse software for use in management of data and information, excluding CRM and... |
|
2011
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities |
|
2010
|
P/S
|
Computer programs and software for management of electronic data, backup, and disaster recovery t... |
|
|
P/S
|
Scientific, photographic, cinematographic, optical apparatus
and instruments; apparatus for reco... |
|
2007
|
P/S
|
Computer software, computers, computer hardware, and computer peripherals. |
|
|
P/S
|
Computer software used for testing, measuring and diagnosing system performance before deploying ... |
|
|
P/S
|
Computer software for monitoring the availability and performance of electronic communications ne... |
|
2006
|
P/S
|
Computer hardware; computer software used for collecting and analyzing data, to discover risks, c... |
|
|
P/S
|
Computer software for information security, namely for securing business and personal electronic ... |
|
2005
|
P/S
|
Computer data warehouse software for use in management of data and information |
|
|
P/S
|
Business services for others, namely, updating and distributing a rules database. Scientific and ... |
|
2004
|
P/S
|
Enterprise security hardware, namely computer hardware; enterprise security software, namely secu... |
|
|
P/S
|
Enterprise security hardware and software; intrusion detection hardware and software; computer ha... |
|
2003
|
P/S
|
Computer software: communications software; software development tools, but none of the above in ... |
|
2001
|
P/S
|
Electronic apparatus and equipment for the reception, secure storage, retrieval and transmission ... |
|
1996
|
P/S
|
[ computer hardware and ] computer software for monitoring performance of electronic communicatio... |
|
|
P/S
|
Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, meas... |
|
1994
|
P/S
|
computer software which permits computer files to be printed, viewed, converted or otherwise used... |
|
|
P/S
|
Appareils pour le traitement de l'information, ordinateurs
ainsi que parties de ceux-ci et appar... |