2023
|
Invention
|
Blockchain malware protection.
A request to add a new block to a blockchain is received. Data as... |
|
Invention
|
Installation and authentication of applications using blockchain.
A request to install a first v... |
|
Invention
|
Detection of abnormal transaction loops.
Examples relate to detecting an abnormality. The exampl... |
|
Invention
|
Dynamic level authentication/encryption.
Results of an authentication process are received. The ... |
|
Invention
|
Software supply chain quality control evaluation.
A primary blockchain for a software applicatio... |
|
Invention
|
Authorization of use of cryptographic keys.
Examples herein involve authorization of use of cryp... |
|
Invention
|
Models based on data augmented with conceivable transitions.
According to an example, a model is... |
|
Invention
|
Logically consistent archive with minimal downtime.
A sub-archive is initiated. The sub-archive ... |
|
Invention
|
Application tuning based on performance characteristics.
According to examples, an apparatus may... |
|
Invention
|
Blockchain auditing system and method.
A copy of a blockchain is stored. The stored copy of the ... |
|
Invention
|
Generating hash values for input strings.
A computing device includes a processor and a machine-... |
|
Invention
|
Computing resources discovery via replacing filter parameter of input query with discovery job pa... |
2022
|
Invention
|
Watermark server.
An indication of a user being authenticated is received. For example, the user... |
|
Invention
|
Private secure blockchain.
A first node in a distributed blockchain ledger validates all remaini... |
|
Invention
|
Machine-based security requirements assessment.
An input regarding security characteristics of a... |
|
Invention
|
Time-only based authentication factors.
A multi-factor authentication request of a user is recei... |
|
Invention
|
Using thread patterns to identify anomalous behavior.
Thread information generated by one or mor... |
|
Invention
|
Software vulnerability remediation.
Software is commonly built from a package of software packag... |
|
Invention
|
Using mouseover to scan a graphical user interface to improve accuracy of graphical object recogn... |
|
Invention
|
Encoded string processing.
A pointer is set to a first code unit of an original string that enco... |
|
Invention
|
Internal reconnaissance attack identification using command line analysis.
Command line inputs t... |
|
Invention
|
Providing single-sign-on for multifactor authentication.
A request to authenticate is received. ... |
|
Invention
|
Hybrid graph-based representation.
Network traffic is monitored over a period of time (e.g., net... |
|
Invention
|
System and method for managing fragmented encryption keys for granting access.
A secondary fragm... |
|
Invention
|
Tying addresses to authentication processes.
A request to authenticate is received (e.g., a requ... |
|
Invention
|
Systems and methods of automatically identifying a date in a graphical user interface.
Systems a... |
|
Invention
|
Forget me tokenization tables for blockchains.
A transaction block in a blockchain is generated.... |
|
Invention
|
Optimal usage of content storage in a managed network. An event is identified. The event is assoc... |
|
Invention
|
Training a system to recognize scroll bars in an application under test. The design for modern gr... |
|
Invention
|
Dynamic self-check.
A self-contained validation process is initiated. For example, an applicatio... |
|
Invention
|
Method and apparatus for efficient file/folder synchronization. A synchronization structure that ... |
|
Invention
|
Graphical display of plot of bins over which items represented within log events having a power l... |
|
Invention
|
Process invocation responsive to configuration deployment.
A controller system receives from a d... |
|
Invention
|
Systems and methods for entity interestingness-based retention and removal.
A system includes a ... |
|
Invention
|
Systems and methods for near real-time risk score generation.
Embodiments of the present disclos... |
|
Invention
|
Using authentication credentials to validate blockchain additions.
A request is received, by a p... |
|
Invention
|
Machine-based source code assessment.
Testing software applications is routinely limited by time... |
|
Invention
|
Retroactively adding encryption and/or authentication levels to a blockchain.
A request to retro... |
|
Invention
|
Sensitive information discovery and test component configuration.
Testing software applications ... |
|
Invention
|
Software intelligent optimization system.
Software applications may be installed on a variety of... |
|
Invention
|
Dynamic biometric combination authentication.
A request to authenticate a user is received. A ra... |
|
Invention
|
Using a trusted authority to enforce encryption levels/authentication levels in a blockchain.
A ... |
|
Invention
|
Typo squatting, dependency confusion, and brandjacking detection.
A software build environment i... |
|
Invention
|
Container based generation of inputs for generic functions.
According to examples, an apparatus ... |
|
Invention
|
Selecting subscribing computing node to execute data storage plan for data shard.
A distributed ... |
|
Invention
|
Generating debugging information for query plan steps. A query plan includes steps to implement a... |
2021
|
Invention
|
Inventory tracking using blockchain.
A first sub-blockchain and a second sub-blockchain are retr... |
|
Invention
|
Static-dynamic integration.
Testing software applications often requires a balancing of thorough... |
|
Invention
|
Blockchain consolidation with active archiving.
An event is identified. For example, the event i... |
2020
|
P/S
|
Downloadable computer software for preventing, detecting, evaluating, reporting, and responding t... |
2018
|
P/S
|
SaaS services for computerized management of secure electronic data, namely, instant messages, so... |
2017
|
P/S
|
Computer software for managing and tracking software licenses Software as a service for managing ... |
|
P/S
|
Computer software for managing and tracking software
licenses. Software as a service for managin... |
|
P/S
|
Computer software for managing and tracking software licenses |
|
P/S
|
Software as a service for managing and tracking software licenses |
2016
|
P/S
|
Enterprise software consultation services in the nature of application development and applicatio... |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications. |
|
P/S
|
Process management software for monitoring the product lifecycle of computing applications |
|
P/S
|
Computer software, namely, process management software for monitoring the product lifecycle of co... |
|
P/S
|
Computer software development tool for the monitoring and testing of web-enabled and mobile softw... |
2015
|
P/S
|
Computer software for finding and identifying security defects during the software development an... |
|
P/S
|
Providing an online forum to showcase, display, demonstrate, and promote new and innovative ideas... |
|
P/S
|
Computer software; computer software for connecting and automating workflows; computer software f... |
|
P/S
|
Computer software for information security; computer software for authentication and encryption o... |
|
P/S
|
Computer services, namely, creating an online community for users to participate in discussions o... |
|
P/S
|
Computer software for application development, deployment, and management; computer software for ... |
|
P/S
|
Computer software; computer software for infrastructure monitoring and analysis; computer softwar... |
2014
|
P/S
|
Performance testing software, namely, software for testing the performance of developer's softwar... |
|
P/S
|
Software; performance testing software; software for testing applications; computer database mana... |
|
P/S
|
Computer software. |
|
P/S
|
Technical support services, namely, technical consultation in the field of security software for ... |
|
P/S
|
Computer software development tools, namely computer software for assisting developers in creatin... |
|
P/S
|
Computer hardware and computer software for testing, evaluating, monitoring, scanning, mapping an... |
|
P/S
|
Computer software for management of unstructured and semi-structured data for storage and analytics. |
|
P/S
|
computer software; computer software for encryption and safeguarding digital files; computer soft... |
|
P/S
|
Computer software; computer software development tools; software for computer system and applicat... |
|
P/S
|
Computer programs and computer software to automate formatted reporting of real-time security ind... |
|
P/S
|
Computer software for management and analysis of social media and networking data; computer softw... |
|
P/S
|
Computer software; computer software for encryption and safeguarding digital files; computer soft... |
2013
|
P/S
|
Monitoring the performance of electronic communications networks, computer networks and intranet ... |
|
P/S
|
Software for analyzing source code; software for detecting and describing vulnerabilities and ass... |
2012
|
P/S
|
Computer data warehouse software for use in management of data and information; computer hardware... |
|
P/S
|
Computer data warehouse software for use in management of data and information, excluding CRM and... |
2011
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities. |
|
P/S
|
Computer software for identifying and correcting web application security vulnerabilities |
2010
|
P/S
|
Computer programs and software for management of electronic data, backup, and disaster recovery t... |
|
P/S
|
Scientific, photographic, cinematographic, optical apparatus
and instruments; apparatus for reco... |
2007
|
P/S
|
Computer software, computers, computer hardware, and computer peripherals. |
|
P/S
|
Computer software used for testing, measuring and diagnosing system performance before deploying ... |
|
P/S
|
Computer software for monitoring the availability and performance of electronic communications ne... |
2006
|
P/S
|
Computer hardware; computer software used for collecting and analyzing data, to discover risks, c... |
|
P/S
|
Computer software for information security, namely for securing business and personal electronic ... |
2005
|
P/S
|
Computer data warehouse software for use in management of data and information |