2021
|
Invention
|
Systems and methods for detecting network attacks. Network attacks are detected by a protocol eng... |
|
Invention
|
On-demand scanning of e-mail attachments. An attachment to an e-mail message received at an e-mai... |
|
Invention
|
Decryption of encrypted network traffic using an inline network traffic monitor. An inline networ... |
|
Invention
|
Protection of kernel extension in a computer. A method protects a daemon in an operating system o... |
2020
|
Invention
|
Mitigation of cyberattacks on cellular devices. A pause command is sent to a Subscriber Identity ... |
|
Invention
|
Malicious code scanning of remotely-located files. A file is stored in a public cloud storage. A ... |
|
Invention
|
Detecting malware by pooled analysis of sample files in a sandbox. Systems and methods are presen... |
|
Invention
|
Detection of malicious mobile apps. A mobile app is in a form of a package file. A structural fea... |
|
Invention
|
Application-aware routing in network address translation environments. A network device has a Loc... |
|
Invention
|
Methods and apparatus for intrusion prevention using global and local feature extraction contexts... |
|
Invention
|
Visual representation of sender domain information and e-mail routing. The system executes online... |
|
Invention
|
Robust whitelisting of legitimate files using similarity score and suspiciousness score. A locali... |
|
Invention
|
Detecting unsecure data flow in automation task programs. An automation task program is inspected... |
|
Invention
|
Malware detection using locality sensitive hashing of api call sequences. An agent on an endpoint... |
|
Invention
|
Classification of executable files using a digest of a call graph pattern. A cybersecurity server... |
2019
|
Invention
|
Password protection with independent virtual keyboard. A virtual keyboard rendered on a separate ... |
|
Invention
|
Prevention of credential phishing based upon login behavior analysis. A system is implemented in ... |
|
Invention
|
Generation of file digests for detecting malicious executable files. A cybersecurity server recei... |
|
Invention
|
Generation of file digests for cybersecurity applications. A cybersecurity server receives an exe... |
|
Invention
|
Detection of forged e-mail messages at e-mail gateway. An e-mail message is sent from a public e-... |
|
Invention
|
Inspection of network traffic on accelerated platforms. A network security device has a local are... |
|
Invention
|
Methods and system for combating cyber threats using a related object sequence hash. A cyber thre... |
|
Invention
|
System and method for detecting leakage of email addresses. A system for detecting leakage of ema... |
|
Invention
|
Methods and apparatus for controlling internet access. Apparatus and methods for controlling acce... |
|
Invention
|
Automatic charset and language detection with machine learning. Language-based machine learning a... |
|
Invention
|
Multi-process architecture for implementing a secure internet service. A method in an internet se... |
|
Invention
|
Evaluation of files for cyber threats using a machine learning model. A system for evaluating fil... |
|
Invention
|
Computer network monitoring with event prediction. A cybersecurity system includes sensors that d... |
|
Invention
|
Detection of periodic transmissions for identifying malicious computers. In one embodiment, a net... |
|
Invention
|
Evaluation of files for cybersecurity threats using global and local file information. A global l... |
|
Invention
|
Systems and methods for distributed digital rights management with decentralized key management. ... |
|
Invention
|
Protection of antivirus daemon in a computer. A method protects a daemon in an operating system o... |
|
Invention
|
Systems and methods for data certificate notarization utilizing bridging from private blockchain ... |
|
Invention
|
Protected smart contracts for managing internet of things devices. A system includes Internet of ... |
|
Invention
|
Dynamic taint tracking on mobile devices. Taint is dynamically tracked on a mobile device. Taint ... |
|
Invention
|
Systems and methods for detecting and responding to anomalous messaging and compromised accounts.... |
|
Invention
|
Secure video content transmission over a computer network. A computer network includes a camera n... |
|
Invention
|
Replacement of e-mail attachment with url. An attachment to an e-mail message is replaced with a ... |
|
Invention
|
Cybersecurity for a smart home. A smart home includes Internet of things (IOT) devices that are p... |
|
Invention
|
System and method for detecting malicious scripts. An endpoint system receives a target file for ... |
2018
|
Invention
|
Anomalous logon detector for protecting servers of a computer network. A server hosted by a serve... |
|
Invention
|
Detection of abusive user accounts in social networks. Abusive user accounts in a social network ... |
|
Invention
|
Detection of business email compromise attacks. An email attempting to perpetrate a business emai... |
|
Invention
|
Apparatus and method for cloud-based accelerated filtering and distributed available compute secu... |
|
Invention
|
Context-aware machine learning system. A machine learning system includes multiple machine learni... |
|
Invention
|
System and methods for security inspection and protection of software containers at runtime. The ... |
2017
|
Invention
|
Anti-phishing system and method using computer vision to match identifiable key information. The ... |
|
Invention
|
Automatic identification of critical network assets of a private computer network. Critical netwo... |
|
Invention
|
Intrusion prevention system with machine learning model for real-time inspection of network traff... |
2001
|
G/S
|
COMPUTER ANTIVIRUS SOFTWARE; MALICIOUS CODE AND MALICIOUS CONTENT SCREENING SOFTWARE; COMPUTER SE... |
|
G/S
|
providing online computer databases in the fields of computers, computer security and computer sy... |