2023
|
Invention
|
Scanning of partial downloads.
By way of example, a method includes, responsive to a user reques... |
|
Invention
|
Secure over-the-air updates.
In an example, there is disclosed a method of a remote device recei... |
|
Invention
|
Methods and apparatus to detect deepfake content.
Methods, apparatus, systems and articles of ma... |
|
Invention
|
Methods and apparatus to defend against adversarial machine learning. Methods, apparatus, systems... |
2022
|
Invention
|
Icon based phishing detection.
An apparatus for detecting a phishing website based on website ic... |
|
Invention
|
Systems, methods, and media for protecting application programming interfaces.
Mechanisms for pr... |
|
Invention
|
Security services for small businesses.
A computer-implemented method provides security services... |
|
Invention
|
Methods and apparatus to generate dynamic password update notifications. Methods, apparatus, syst... |
|
Invention
|
Multi-dimensional malware analysis.
There is disclosed in one example a computing apparatus, inc... |
|
Invention
|
System for authenticating a phone number using a phone number certificate. An apparatus, related ... |
|
Invention
|
Method and apparatus for detecting malware via analysis of a screen capture.
Methods, apparatus,... |
|
Invention
|
Phishing mitigation service.
There is disclosed a method of providing passive phishing remediati... |
|
Invention
|
Methods and apparatus to disable select processes for malware prevention.
Methods, apparatus, sy... |
|
Invention
|
Methods and apparatus to classify web content.
Methods, apparatus, systems, and articles of manu... |
|
Invention
|
Methods and apparatus to implement trusted transfer learning on transformer-based phishing detect... |
|
Invention
|
System and method for assessment of privacy exposure and computing risk index for online service.... |
|
Invention
|
Security risk evaluation across user devices.
Security risk evaluation across user devices is di... |
|
Invention
|
Identification of malicious content in operating system clipboard.
A method includes determining... |
|
Invention
|
Methods and apparatus to translate hash-based signature signals for machine learning applications... |
|
Invention
|
Provisioning of encrypted dns services. There is disclosed in one example an enrollment over secu... |
|
Invention
|
Methods and apparatus to implement a virtual private network with probe for network connectivity.... |
|
Invention
|
Methods, systems, and media for dynamically separating internet of things devices in a network. M... |
|
Invention
|
User activity-triggered url scan.
There is disclosed in one example a computing apparatus, inclu... |
|
Invention
|
Visual detection of phishing websites via headless browser.
There is disclosed in one example a ... |
|
Invention
|
Cluster-based machine learning model validation.
There is disclosed a method and system therefor... |
|
Invention
|
Detecting ransomware.
There is disclosed in one example a ransomware mitigation engine, includin... |
|
Invention
|
Methods and apparatus for machine learning based malware detection and visualization with raw byt... |
|
Invention
|
Methods, systems, and media for protected near-field communications. Methods, systems, and media ... |
|
Invention
|
Digital protection that travels with data. The present disclosure relates to a system and method ... |
|
Invention
|
Methods and apparatus for malware classification through convolutional neural networks using raw ... |
|
Invention
|
Methods and apparatus to visualize machine learning based malware classification.
Methods, appar... |
|
Invention
|
Methods and apparatus to orchestrate personal protection across digital assets. Methods, apparatu... |
2021
|
Invention
|
Methods and apparatus to augment classification coverage for low prevalence samples through neigh... |
|
P/S
|
Computer utility software, namely, security software, computer utility virus protection programs ... |
|
Invention
|
Methods and apparatus to determine mutex entropy for malware classification.
Methods, apparatus,... |
|
Invention
|
Methods and apparatus to detect malware using micro-forests with customer trust seeds.
Methods a... |
|
Invention
|
Methods and apparatus to classify samples as clean or malicious using low level markov transition... |
|
Invention
|
Methods and apparatus for managing and online transactions involving personal data. Methods and a... |
|
Invention
|
Deterministic hash to secure personal data and passwords.
There is disclosed herein a computing ... |
|
Invention
|
Website classification via containment queries.
A computing apparatus, including: a hardware pla... |
|
P/S
|
Downloadable and recorded computer utility software, namely, software for improving system perfor... |
|
Invention
|
Systems, methods, and media for sharing information with vendor applications in secure environmen... |
|
Invention
|
Methods and apparatus to generate dynamic password update notifications.
Methods, apparatus, sys... |
|
Invention
|
Selective security scan to reduce signature candidates.
A computing apparatus includes a hardwar... |
|
Invention
|
Systems, methods, and apparatus to optimize telemetry collection and processing of transport laye... |
|
Invention
|
Quantified social media privacy.
A computing includes a hardware platform having a processor and... |
|
Invention
|
Contextual data security. There is disclosed in one example a computing apparatus, including: a h... |
|
Invention
|
Mechanism to determine cellular signal reputation of a location and intelligently manage lack of ... |
|
P/S
|
Downloadable and recorded computer utility software for performing computer maintenance; download... |
|
P/S
|
Downloadable and recorded computer utility software for performing computer maintenance; Download... |
|
Invention
|
Methods and apparatus to protect open and closed operating systems.
Methods, apparatus, systems ... |
|
P/S
|
Providing temporary use of non-downloadable security software; Providing temporary use of non-dow... |
|
P/S
|
Providing temporary use of non-downloadable computer security software; Providing temporary use o... |
|
Invention
|
Secure attestation of endpoint capability. There is disclosed in one example a network gateway de... |
|
Invention
|
Contextual management of browser extensions. There is disclosed in one example a computing endpoi... |
2017
|
P/S
|
Computer utility software; computer anti-virus software;
computer software and hardware for prov... |
|
P/S
|
computer utility software; computer anti-virus software; computer software and hardware for provi... |
|
P/S
|
Business networking services for those in the field of computer data and information security tec... |
|
P/S
|
software for ensuring the security of password, logins, credit card numbers, driver's licenses, h... |
|
P/S
|
Software for generating passwords for website users; Software for ensuring the security of passwo... |
|
P/S
|
Software for ensuring the security of password, logins, credit card numbers, driver's licenses, h... |
2016
|
P/S
|
Computer utility software, computer software for the detection and removal of computer viruses, m... |
2014
|
P/S
|
Computer software; computer software for use in securing
data, networks, computers, personal com... |
|
P/S
|
Computer software for use in securing data, networks, computers, personal computing devices, and ... |
|
P/S
|
Computer software; computer software for use in securing data, networks, computers, personal comp... |
2013
|
P/S
|
Computer software for use in computer, data, network and
mobile device security, namely, digital... |
|
P/S
|
Computer software for use in computer, data, network and mobile device security, namely, digital ... |
|
P/S
|
Downloadable computer software for enabling virtual private network (VPN) operation on computers;... |
2012
|
P/S
|
Technical support services, namely, troubleshooting and support services in the nature of diagnos... |
2010
|
P/S
|
Monitoring of computer systems for security purposes, namely, website scanning services used to v... |
2009
|
P/S
|
Computer utility virus protection programs; and computer utility programs for providing diagnosti... |
|
P/S
|
Computer utility software; computer software and hardware
for providing network, Internet, and c... |
|
P/S
|
Computer utility software; computer software [ and hardware ] for providing network, Internet, an... |
2005
|
P/S
|
DOWNLOADABLE WEB SAFETY SOFTWARE FOR ACCESSING WEB SAFETY RATINGS, TEST RESULTS, THREAT WARNINGS,... |
2003
|
P/S
|
Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, meas... |
|
P/S
|
computer utility software; computer software for the detection and removal of computer viruses an... |
2002
|
P/S
|
computer utility software; computer software for the detection and removal of computer viruses; c... |
|
P/S
|
computer utility software; computer software for protecting and securing the integrity of data, c... |
1992
|
P/S
|
computer programs; namely, utility programs and anti-virus programs |