2022
|
Invention
|
Random access of a member file in a compressed tar archive. A cloud computing infrastructure host... |
2021
|
Invention
|
Graph-based anomaly detection for cybersecurity. Anomalous activities on a computer network are d... |
|
Invention
|
Systems and methods for preventing information leakage. A system for preventing information leaka... |
|
Invention
|
Detecting unauthorized access points in a network. Methods and apparatus for detecting, in a gate... |
|
Invention
|
Systems and methods for facilitating malicious site detection. A system for facilitating Internet... |
|
Invention
|
Internet access control based on external third-party data. Systems and methods for Internet acce... |
|
Invention
|
Secure video content transmission over a computer network. A computer network includes a camera n... |
|
Invention
|
Systems and methods for detecting network attacks. Network attacks are detected by a protocol eng... |
|
Invention
|
On-demand scanning of e-mail attachments. An attachment to an e-mail message received at an e-mai... |
|
Invention
|
Automated mitigation of cyber threats using a semantic cybersecurity database. Systems and method... |
|
Invention
|
Decryption of encrypted network traffic using an inline network traffic monitor. An inline networ... |
|
Invention
|
Protection of kernel extension in a computer. A method protects a daemon in an operating system o... |
|
Invention
|
Multiclass classification system with accumulator-based arbitration. A multiclass classifier gene... |
2020
|
Invention
|
Mitigation of cyberattacks on cellular devices. A pause command is sent to a Subscriber Identity ... |
|
Invention
|
Malicious code scanning of remotely-located files. A file is stored in a public cloud storage. A ... |
|
Invention
|
Detecting malware by pooled analysis of sample files in a sandbox. Systems and methods are presen... |
|
Invention
|
Detection of malicious mobile apps. A mobile app is in a form of a package file. A structural fea... |
|
Invention
|
Visual representation of sender domain information and e-mail routing. The system executes online... |
|
Invention
|
Robust whitelisting of legitimate files using similarity score and suspiciousness score. A locali... |
|
Invention
|
Detecting unsecure data flow in automation task programs. An automation task program is inspected... |
|
Invention
|
Malware families identification based upon hierarchical clustering. Behavior report generation mo... |
|
Invention
|
Malware detection using locality sensitive hashing of api call sequences. An agent on an endpoint... |
|
Invention
|
Stateful detection of cyberattacks. A system for stateful detection of cyberattacks includes an e... |
2019
|
Invention
|
False alarm reduction by novelty detection. Features of sample files that are known to be normal ... |
|
Invention
|
Password protection with independent virtual keyboard. A virtual keyboard rendered on a separate ... |
|
Invention
|
Prevention of credential phishing based upon login behavior analysis. A system is implemented in ... |
|
Invention
|
Systems and methods for detecting scam emails. A scam detection system includes a user computer t... |
|
Invention
|
Generation of file digests for detecting malicious executable files. A cybersecurity server recei... |
|
Invention
|
Detection of forged e-mail messages at e-mail gateway. An e-mail message is sent from a public e-... |
|
Invention
|
Inspection of network traffic on accelerated platforms. A network security device has a local are... |
|
Invention
|
Methods and system for combating cyber threats using a related object sequence hash. A cyber thre... |
|
Invention
|
System and method for detecting leakage of email addresses. A system for detecting leakage of ema... |
|
Invention
|
Methods and arrangement for preventing spam comments without application specific changes. A meth... |
|
Invention
|
Clustering of binary files using architecture-agnostic digests. A target binary file is clustered... |
|
Invention
|
Automatic charset and language detection with machine learning. Language-based machine learning a... |
|
Invention
|
Evaluation of files for cyber threats using a machine learning model. A system for evaluating fil... |
|
Invention
|
Computer network monitoring with event prediction. A cybersecurity system includes sensors that d... |
|
Invention
|
Evaluation of files for cybersecurity threats using global and local file information. A global l... |
|
Invention
|
Systems and methods for distributed digital rights management with decentralized key management. ... |
|
Invention
|
Systems and methods for data certificate notarization utilizing bridging from private blockchain ... |
|
Invention
|
Protected smart contracts for managing internet of things devices. A system includes Internet of ... |
|
Invention
|
Dynamic taint tracking on mobile devices. Taint is dynamically tracked on a mobile device. Taint ... |
|
Invention
|
Systems and methods for detecting and responding to anomalous messaging and compromised accounts.... |
|
Invention
|
Replacement of e-mail attachment with url. An attachment to an e-mail message is replaced with a ... |
|
Invention
|
Frictionless authentication for logging on a computer service. A login authentication process to ... |
|
Invention
|
System and method for detecting malicious scripts. An endpoint system receives a target file for ... |
2018
|
Invention
|
Apparatus and method for cloud-based accelerated filtering and distributed available compute secu... |
|
Invention
|
Context-aware machine learning system. A machine learning system includes multiple machine learni... |
2017
|
Invention
|
Automatic identification of critical network assets of a private computer network. Critical netwo... |
|
Invention
|
Intrusion prevention system with machine learning model for real-time inspection of network traff... |
2001
|
G/S
|
COMPUTER ANTIVIRUS SOFTWARE; MALICIOUS CODE AND MALICIOUS CONTENT SCREENING SOFTWARE; COMPUTER SE... |
|
G/S
|
providing online computer databases in the fields of computers, computer security and computer sy... |