Cylance, Inc.

United States of America


 
Total IP 199
Total IP Rank # 6,298
IP Activity Score 2.9/5.0    138
IP Activity Rank # 5,049
Dominant Nice Class Scientific and electric apparatu...

Patents

Trademarks

111 24
4 12
30 7
11
 
Last Patent 2023 - Clustering analysis for deduplic...
First Patent 2010 - System and method for internet s...
Last Trademark 2022 - CylanceGATEWAY
First Trademark 2012 - CYLANCE

Industry (Nice Classification)

Latest Inventions, Goods, Services

2023 Invention Clustering analysis for deduplication of training set samples for machine learning based computer...
2022 G/S Recorded and downloadable computer software for providing cyber-security, endpoint security and d...
G/S Recorded and downloadable computer software for providing cyber-security, endpoint security and ...
G/S Technology consultation in the field of cybersecurity; Design and development of computer softwar...
G/S Providing online non-downloadable software for use in preventing unauthorized access to computer...
G/S Endpoint detection and response software. Providing online non-downloadable endpoint detection an...
G/S Providing online non-downloadable software for use in preventing unauthorized access to computer ...
2021 Invention Computer user authentication using machine learning. Systems and methods are described herein for...
Invention Methods for converting hierarchical data. Systems, methods, and software can be used for securin...
Invention Clustering software codes in scalable manner. Systems, methods, and software can be used to clust...
2020 Invention Statistical data fingerprinting and tracing data similarity of documents. A method and computing ...
Invention Machine learning model for analysis of instruction sequences. A system is provided for classifyin...
Invention Prevention of hash-based api importing. Hash-based application programming interface (API) import...
Invention Machine learning model score obfuscation using step function, position-dependent noise. An artefa...
Invention Bayesian continuous user authentication. Bayesian continuous user authentication can be obtained ...
Invention Memory space protection. Executable memory space is protected by receiving, from a process, a req...
Invention Endpoint detection and response system with endpoint-based artifact storage. Each of a plurality ...
Invention Centroid for improving machine learning classification and info retrieval. Centroids are used for...
Invention Communications bus signal fingerprinting. Systems are provided herein for communications bus sign...
Invention Protecting devices from malicious files based on n-gram processing of sequential data. Under one...
Invention Detecting malware with deep generative models. Features are extracted from an artifact so that a ...
Invention Endpoint detection and response utilizing machine learning. A plurality of events associated with...
Invention Machine learning model for malware dynamic analysis. In some implementations there may be provide...
Invention Password-less software system user authentication. Data is received as part of an authentication ...
Invention Machine learning model score obfuscation using step-function, position-dependent noise. An artefa...
Invention System abnormality detection using signal fingerprinting. Systems, methods, and devices are descr...
Invention Container file analysis using machine learning model. A system is provided for training a machine...
Invention Projected vector modification as mitigation for machine learning model string stuffing. An artifa...
Invention Malware detection. In one respect, there is provided a system for training a neural network adapt...
Invention Deployment of machine learning models for discernment of threats. A mismatch between model-based ...
Invention Machine learning classification using markov modeling. Systems, methods, and articles of manufact...
Invention Detection of malware using feature hashing. Data is analyzed using feature hashing to detect malw...
Invention Projected vector overflow penalty as mitigation for machine learning model string stuffing. An ar...
Invention Indicator centroids for malware handling. An artifact is received and features are extracted ther...
2019 Invention Training a machine learning model for container file analysis. In one respect, there is provided ...
Invention Anomaly based malware detection. In one respect, there is provided a system for training a neural...
Invention Shellcode detection. Identifying shellcode in a sequence of instructions by identifying a first i...
G/S Consulting services in the field of implementation of computer hardware for preventing unauthoriz...
Invention Avoidance of malicious content in nested files. A nested file having a primary file and at least ...
Invention Advanced malware classification. In one respect, there is provided a system for classifying malwa...
Invention Icon based malware detection. In one respect, there is provided a system for training a neural ne...
Invention Retention and accessibility of data characterizing events on an endpoint computer. An endpoint co...
Invention Static feature extraction from structured files. Data is received or accessed that includes a str...
Invention Machine learning model score obfuscation using multiple classifiers. An artefact is received. The...
Invention Machine learning model score obfuscation using time-based score oscillations. An artefact is rece...
Invention Machine learning model score obfuscation using coordinated interleaving. An artefact is received....
Invention Machine learning model score obfuscation using vector modification techniques. An artefact is rec...
G/S providing online non-downloadable software for use in preventing unauthorized access to computer ...
2018 Invention Artefact classification using xenospace centroids. An artefact is received and parsed into a plur...
Invention Verifying user identity through human / computer interaction. An identity of a user on a first co...
G/S Internet security software; software for identifying and authenticating users; downloadable softw...
G/S Internet security software; software for preventing unauthorized access to computers and electron...
G/S consulting services in the field of downloadable and non-downloadable Internet security software;...
G/S downloadable software accessible via a web interface for preventing unauthorized access to comput...
G/S Downloadable software accessible via a web interface for preventing unauthorized access to comput...
2017 G/S Endpoint detection and response software Providing online non-downloadable endpoint detection and...
G/S Downloadable software for use in preventing unauthorized access to computers and electronics syst...
G/S Downloadable software for enabling testing of malware detection by antivirus software applications.
2016 G/S Downloadable internet security software; downloadable software for preventing unauthorized acces...
G/S Downloadable software for use in preventing unauthorized access to computer and electronics syste...
G/S Downloadable software for use in preventing unauthorized access to computers and electronics sys...
G/S Providing online non-downloadable Internet security software; consulting services for others in c...
G/S Downloadable security software accessible via a web interface for preventing unauthorized access ...
2015 G/S downloadable software for use in preventing unauthorized access to computers and electronics syst...
G/S Providing consulting services regarding Internet security software and for preventing unauthorize...
G/S providing non-downloadable software for use in preventing unauthorized access to computer and ele...
G/S Downloadable software for for use in preventing unauthorized access to computer and electronics s...