Cylance, Inc.

United States of America


 
Total IP 202
Total IP Rank # 6,042
IP Activity Score 3/5.0    163
IP Activity Rank # 4,230
Dominant Nice Class Scientific and electric apparatu...

Patents

Trademarks

110 26
4 12
30 7
13
 
Last Patent 2022 - Methods for converting hierarchi...
First Patent 2010 - System and method for internet s...
Last Trademark 2022 - CylanceGATEWAY
First Trademark 2012 - CYLANCE

Industry (Nice Classification)

Latest Inventions, Goods, Services

2022 G/S Recorded and downloadable computer software for providing cyber-security, endpoint security and d...
G/S Recorded and downloadable computer software for providing cyber-security, endpoint security and ...
G/S Technology consultation in the field of cybersecurity; Design and development of computer softwar...
G/S Endpoint detection and response software. Providing online non-downloadable endpoint detection an...
G/S Providing online non-downloadable software for use in preventing unauthorized access to computer...
G/S Providing online non-downloadable software for use in preventing unauthorized access to computer ...
2021 Invention Computer user authentication using machine learning. Systems and methods are described herein fo...
Invention Methods for converting hierarchical data. Systems, methods, and software can be used for securin...
Invention Clustering software codes in scalable manner. Systems, methods, and software can be used to clus...
2020 Invention Statistical data fingerprinting and tracing data similarity of documents. A method and computing ...
Invention Machine learning model for analysis of instruction sequences. A system is provided for classifyi...
Invention Prevention of hash-based api importing. Hash-based application programming interface (API) import...
Invention Machine learning model score obfuscation using step function, position-dependent noise. An artefa...
Invention Bayesian continuous user authentication. Bayesian continuous user authentication can be obtained ...
Invention Memory space protection. Executable memory space is protected by receiving, from a process, a req...
Invention Endpoint detection and response system with endpoint-based artifact storage. Each of a plurality ...
Invention Centroid for improving machine learning classification and info retrieval. Centroids are used for...
Invention Communications bus signal fingerprinting. Systems are provided herein for communications bus sign...
Invention Protecting devices from malicious files based on n-gram processing of sequential data. Under one...
Invention Detecting malware with deep generative models. Features are extracted from an artifact so that a ...
Invention Endpoint detection and response utilizing machine learning. A plurality of events associated with...
Invention Machine learning model for malware dynamic analysis. In some implementations there may be provide...
Invention Password-less software system user authentication. Data is received as part of an authentication...
Invention Machine learning model score obfuscation using step-function, position-dependent noise. An artefa...
Invention System abnormality detection using signal fingerprinting. Systems, methods, and devices are descr...
Invention Container file analysis using machine learning model. A system is provided for training a machine...
Invention Projected vector modification as mitigation for machine learning model string stuffing. An artifa...
Invention Malware detection. In one respect, there is provided a system for training a neural network adap...
Invention Deployment of machine learning models for discernment of threats. A mismatch between model-based ...
Invention Machine learning classification using markov modeling. Systems, methods, and articles of manufact...
Invention Detection of malware using feature hashing. Data is analyzed using feature hashing to detect malw...
Invention Projected vector overflow penalty as mitigation for machine learning model string stuffing. An ar...
Invention Indicator centroids for malware handling. An artifact is received and features are extracted ther...
2019 Invention Training a machine learning model for container file analysis. In one respect, there is provided ...
Invention Anomaly based malware detection. In one respect, there is provided a system for training a neural...
Invention Shellcode detection. Identifying shellcode in a sequence of instructions by identifying a first i...
G/S Consulting services in the field of implementation of computer hardware for preventing unauthoriz...
Invention Avoidance of malicious content in nested files. A nested file having a primary file and at least ...
Invention Advanced malware classification. In one respect, there is provided a system for classifying malwa...
Invention Icon based malware detection. In one respect, there is provided a system for training a neural ne...
Invention Retention and accessibility of data characterizing events on an endpoint computer. An endpoint co...
Invention Static feature extraction from structured files. Data is received or accessed that includes a str...
Invention Machine learning model score obfuscation using multiple classifiers. An artefact is received. The...
Invention Machine learning model score obfuscation using time-based score oscillations. An artefact is rece...
Invention Machine learning model score obfuscation using coordinated interleaving. An artefact is received....
Invention Machine learning model score obfuscation using vector modification techniques. An artefact is rec...
Invention Application execution control utilizing ensemble machine learning for discernment. Described are ...
G/S providing online non-downloadable software for use in preventing unauthorized access to computer ...
2018 Invention Artefact classification using xenospace centroids. An artefact is received and parsed into a plur...
Invention Verifying user identity through human / computer interaction. An identity of a user on a first co...
G/S Internet security software; software for identifying and authenticating users; downloadable softw...
G/S Internet security software; software for preventing unauthorized access to computers and electron...
G/S consulting services in the field of downloadable and non-downloadable Internet security software;...
G/S downloadable software accessible via a web interface for preventing unauthorized access to comput...
G/S Downloadable software accessible via a web interface for preventing unauthorized access to comput...
2017 G/S Endpoint detection and response software Providing online non-downloadable endpoint detection and...
G/S Downloadable software for use in preventing unauthorized access to computers and electronics syst...
G/S Downloadable software for enabling testing of malware detection by antivirus software applications.
2016 G/S Downloadable internet security software; downloadable software for preventing unauthorized acces...
G/S Downloadable software for use in preventing unauthorized access to computer and electronics syste...
G/S Downloadable software for use in preventing unauthorized access to computers and electronics sys...
G/S Downloadable software for enabling testing of malware detection by antivirus software applications
G/S Providing online non-downloadable Internet security software; consulting services for others in c...
G/S Downloadable security software accessible via a web interface for preventing unauthorized access ...
2015 G/S downloadable software for use in preventing unauthorized access to computers and electronics syst...
G/S Providing consulting services regarding Internet security software and for preventing unauthorize...
G/S providing non-downloadable software for use in preventing unauthorized access to computer and ele...
G/S Downloadable software for for use in preventing unauthorized access to computer and electronics s...