2025
|
Invention
|
Overlay rule integration for document migration.
Documents are often generated using a customer ... |
|
Invention
|
Machine-based source code assessment.
Systems and methods are disclosed for configuring a testin... |
2024
|
Invention
|
Sensitive information discovery and test component configuration.
Testing software applications ... |
|
Invention
|
Machine-based security requirements assessment.
An input regarding security characteristics of a... |
|
Invention
|
Performing sast on second version of source code after sast has been performed on first version. ... |
|
Invention
|
License analysis for artificial intelligence (ai) generated compositions.
A composition is gener... |
|
Invention
|
Iterative application of user-selected filters to log events.
Log events for a target system are... |
|
Invention
|
Training machine learning algorithm(s) to identify leaks of sensitive information.
A trained mac... |
|
Invention
|
Search table and search job for search query for which matching events are to be continually prov... |
|
Invention
|
Generation of vectors from source code produced by artificial intelligence (ai) algorithms to ide... |
|
Invention
|
Deduplicate office files regardless of historical metadata manipulation by another system.
A sys... |
|
Invention
|
Performing flow-sensitive sast on source code representation from which lines identified by flow-... |
|
Invention
|
Managing smart contracts using a distributed ledger.
A blockchain is created. The blockchain com... |
2023
|
Invention
|
Automatic cookie consent.
In response to a web page of a web site having been loaded, a consent ... |
|
Invention
|
Scanning of training code to prevent vulnerabilities in artificial intelligence (ai) generated so... |
|
Invention
|
Using threat intelligence to manage software fixes.
A defect in the code of a software program i... |
|
Invention
|
Local browser databases support in state management for user interface based browser automation. ... |
|
Invention
|
Supply chain analysis for artificial intelligence (ai) generated source code. Source code generat... |
|
Invention
|
Adding watermarks to artificial intelligence (ai) generated compositions based on identification ... |
|
Invention
|
Using hierarchical models and artificial intelligence (ai) to improve recognition of graphical ob... |
|
Invention
|
Automated combobox.select in a non-technology way.
A method includes capturing a first image of ... |
|
Invention
|
Controlling the use of source code for training artificial intelligence (ai) algorithms.
Input s... |
|
Invention
|
Global signal analytics.
Attacks on a first network can be targeted to the first network or comp... |
|
Invention
|
Tracking virtual processes to identify anomalies.
A virtualization pattern is learned. The learn... |
|
Invention
|
Deadlock prevention utilizing distributed resource reservations. In multi-threaded or multi-proce... |
|
Invention
|
Generalized intermediate and lower level source code representations for static application secur... |
|
Invention
|
Systems and methods for structured bayesian classification for content management.
A system incl... |
|
Invention
|
Network information scanning system.
A training corpus for training a similarity algorithm is re... |
|
Invention
|
Automatic real user monitoring (rum) instrumentation.
Systems and methods are disclosed to devel... |
|
Invention
|
Using artificial intelligence (ai) analysis for identifying potential vulnerabilities inserted in... |
|
Invention
|
Security orchestration, automation, and response (soar) playbook generation.
A security orchestr... |
|
Invention
|
Discover and model applications deployed in containerized platforms.
Containerized platforms lik... |
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks. Data of a plurality o... |
|
Invention
|
Establishing secure session via proxy device.
A first device transmits a request message to a pr... |
|
Invention
|
Generalized dataflow analysis for static application security testing.
A superlattice correspond... |
|
Invention
|
Using cross-channel analysis to detect attacks on spread-spectrum networks.
Data of a plurality ... |
|
Invention
|
Anomaly detection based on multi-level authentication.
A determination is made to see if a user ... |
|
Invention
|
Method and system for improving keyboard input in automated testing.
Method and system to improv... |
|
Invention
|
Method and apparatus to recognize and correlate screens.
Text screen description data for a term... |
|
Invention
|
Auto-complete testing.
One or more characters are input into an auto-complete field. Text of a d... |
|
Invention
|
Using watermarks to identify a chain of title in media.
A watermark is generated. The generated ... |
|
Invention
|
System and method to use polling to simulate server events. A device, system, and method are prov... |
|
Invention
|
Augmented question and answer (q&a) with large language models.
Large language models (LLMs) are... |
|
Invention
|
Secure hashing server. A first hash of information is generated. The first hash of the informatio... |
|
Invention
|
Secure hashing server.
A first hash of information is generated. The first hash of the informati... |
|
Invention
|
Detection of malicious software packages using machine learning on code and community data.
Embo... |
|
Invention
|
Using machine learning to identify phishing, vishing, and deep fake attacks.
Language used by a ... |
|
Invention
|
Identifying a digital watermark in an image/video/audio stream where the image has been converted... |
|
Invention
|
Identification of malicious programs using thread patterns and related data.
A current thread pa... |
2020
|
P/S
|
Downloadable computer software for preventing, detecting, evaluating, reporting, and responding t... |
2018
|
P/S
|
SaaS services for computerized management of secure electronic data, namely, instant messages, so... |
|
P/S
|
Computer software for information security; computer software for authentication, encryption and ... |
2017
|
P/S
|
Computer software for managing and tracking software licenses Software as a service for managing ... |
|
P/S
|
Computer software for managing and tracking software
licenses. Software as a service for managin... |
|
P/S
|
Computer software for managing and tracking software licenses |
|
P/S
|
Software as a service for managing and tracking software licenses |
2016
|
P/S
|
[ Enterprise software consultation services in the nature of application development and applicat... |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications. |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications |
|
P/S
|
Computer software, namely, process management software for monitoring the product lifecycle of co... |
|
P/S
|
Computer software development tool for the monitoring and testing of web-enabled and mobile softw... |
2015
|
P/S
|
Computer software for finding and identifying security defects during the software development an... |
|
P/S
|
Providing an online forum to showcase, display, demonstrate, and promote new and innovative ideas... |
|
P/S
|
Computer software; computer software for connecting and automating workflows; computer software f... |
|
P/S
|
Computer software for information security; computer software for authentication and encryption o... |
|
P/S
|
Computer services, namely, creating an online community for users to participate in discussions o... |
|
P/S
|
Computer software for application development, deployment, and management; computer software for ... |
|
P/S
|
Computer software; computer software for infrastructure monitoring and analysis; computer softwar... |
2014
|
P/S
|
Performance testing software, namely, software for testing the performance of developer's softwar... |
|
P/S
|
Software; performance testing software; software for testing applications; computer database mana... |
|
P/S
|
Technical support services, namely, technical consultation in the field of security software for ... |
|
P/S
|
Computer software development tools, namely computer software for assisting developers in creatin... |
|
P/S
|
Computer programs and computer software to automate formatted reporting of real-time security ind... |
2013
|
P/S
|
Software for analyzing source code; software for detecting and describing vulnerabilities and ass... |
2012
|
P/S
|
Computer data warehouse software for use in management of data and information; computer hardware... |
|
P/S
|
Computer data warehouse software for use in management of data and information, excluding CRM and... |
2011
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities |
2010
|
P/S
|
Computer programs and software for management of electronic data, backup, and disaster recovery t... |
|
P/S
|
Scientific, photographic, cinematographic, optical apparatus
and instruments; apparatus for reco... |
2007
|
P/S
|
Computer software, computers, computer hardware, and computer peripherals. |
|
P/S
|
Computer software used for testing, measuring and diagnosing system performance before deploying ... |
|
P/S
|
Computer software for monitoring the availability and performance of electronic communications ne... |
2006
|
P/S
|
Computer hardware; computer software used for collecting and analyzing data, to discover risks, c... |
|
P/S
|
Computer software for information security, namely for securing business and personal electronic ... |
2005
|
P/S
|
Computer data warehouse software for use in management of data and information |
|
P/S
|
Business services for others, namely, updating and distributing a rules database. Scientific and ... |
2004
|
P/S
|
Enterprise security hardware, namely computer hardware; enterprise security software, namely secu... |
|
P/S
|
Enterprise security hardware and software; intrusion detection hardware and software; computer ha... |
2003
|
P/S
|
Computer software: communications software; software development tools, but none of the above in ... |
2001
|
P/S
|
Electronic apparatus and equipment for the reception, secure storage, retrieval and transmission ... |
1996
|
P/S
|
[ computer hardware and ] computer software for monitoring performance of electronic communicatio... |
|
P/S
|
Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, meas... |