G06F21/554 - CPC Classification

Classification description:

Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems; Detecting local intrusion or implementing counter-measures involving event detection and direct action

Recent Application in this class:
#1
20240296221
2024-09-05

ARTIFICIAL INTELLIGENCE DETERRENCE TECHNIQUES FOR SECURITY AND AUTOMATION SYSTEMS

#2
20240296220
2024-09-05

METHOD AND SYSTEM FOR FREEDOM FROM INTERFERENCE (FFI)

#3
20240289463
2024-08-29

MODIFICATION OF VULNERABLE PODS

#4
20240289450
2024-08-29

AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS

#5
20240289449
2024-08-29

ADAPTIVE DETECTION OF SECURITY THREATS THROUGH TRAINING OF COMPUTER-IMPLEMENTED MODELS

#6
20240289448
2024-08-29

System and Methods for Click-Jacking and Content Redressing Protection

#7
20240289447
2024-08-29

SYSTEMS AND METHODS FOR AUTOMATED CYBERSECURITY THREAT TESTING AND DETECTION

#8
20240289446
2024-08-29

EXTRACTION METHOD, EXTRACTION DEVICE, AND EXTRACTION PROGRAM

#9
20240289445
2024-08-29

STORAGE SYSTEM AND STORAGE SYSTEM MONITORING METHOD

#10
20240289444
2024-08-29

SYSTEMS AND METHODS FOR PREVENTING COMMUNICATIONS WITH MALICIOUS CRYPTOGRAPHY-BASED STORAGE APPLICATION ADDRESSES USING CONSENSUS

#11
20240289443
2024-08-29

SYSTEMS AND METHODS FOR INDICATING ONLOOKER VULNERABILITY

#12
20240289434
2024-08-29

Method and Apparatus for Operating a Computer

#13
20240289367
2024-08-29

THREAT MITIGATION SYSTEM AND METHOD

#14
20240283462
2024-08-22

DATA COMPRESSION WITH INTRUSION DETECTION

#15
20240281563
2024-08-22

Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling

#16
20240281528
2024-08-22

Machine Learning Process Detection

#17
20240281527
2024-08-22

EXTRACTION METHOD, EXTRACTION DEVICE, AND EXTRACTION PROGRAM

#18
20240281526
2024-08-22

ADVERSARY ALERTING AND PROCESSING SYSTEM (ALPS)

#19
20240281525
2024-08-22

SPURIOUS-DATA-BASED DETECTION RELATED TO MALICIOUS ACTIVITY

#20
20240273209
2024-08-15

FIRMWARE SWITCHING METHOD FOR SYSTEM SECURITY AND ELECTRICAL DEVICE USING THE SAME

#21
20240273202
2024-08-15

SYSTEMS AND METHODS FOR ADAPTIVELY DETECTING AND MITIGATING ROWHAMMER ATTACKS AGAINST COMPUTER MEMORIES

#22
20240273201
2024-08-15

METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE

#23
20240273197
2024-08-15

INFORMATION VISUALIZATION APPARATUS, INFORMATION VISUALIZATION METHOD, AND COMPUTERREADABLE RECORDING MEDIUM

#24
20240273196
2024-08-15

Methods for Managing Software Supply Chain Risk through Declared Intent

#25
20240273195
2024-08-15

In-Vehicle System and Electronic Control Device

#26
20240273194
2024-08-15

MEMORY DEVICE AND PROTECTION METHOD THEREOF

#27
20240273193
2024-08-15

ADVANCED PERSISTENT THREAT DETECTION

#28
20240273192
2024-08-15

DYNAMIC CLOUD CONFIGURATION CHANGES BASED ON ADVANCED PERSISTENT THREAT DETECTION

#29
20240273191
2024-08-15

AGENT-BASED DEVICE PROTECTION USING DETECTION AND MITIGATION OF MODIFICATIONS TO A PROTECTED STORAGE REGION

#30
20240273190
2024-08-15

DEVICE PROTECTION AGAINST UNAUTHORIZED ENCRYPTION USING POPULATION OF AVAILABLE STORAGE

#31
20240273189
2024-08-15

Reduction of Security Detection False Positives

#32
20240273185
2024-08-15

INTROSPECTION DRIVEN BY INCIDENTS FOR CONTROLLING INFILTRATION

#33
20240273183
2024-08-15

DETECTING STACK PIVOTS USING STACK ARTIFACT VERIFICATION

#34
20240265099
2024-08-08

APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING

#35
20240259404
2024-08-01

PROCESS TREE AND TAGS

#36
20240257589
2024-08-01

ELECTRONIC LOCK COMPRISING A LOCK-CORE SOFTWARE MODULE

#37
20240257263
2024-08-01

SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS

#38
20240256670
2024-08-01

SMART RECOVERY OF BACKUP COPIES BASED ON THREAT ANALYSIS

#39
20240256663
2024-08-01

SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGE

#40
20240256662
2024-08-01

SECURITY APPLIANCE EXTENSION

#41
20240256661
2024-08-01

DETECTING RANSOMWARE IN MONITORED DATA

#42
20240256660
2024-08-01

METHOD AND SYSTEM FOR DETERMINATION OF OUT-OF-DISTRIBUTION SAMPLES AND ATTACK SURFACES FOR ARTIFICIAL NEURAL NETWORKS

#43
20240256659
2024-08-01

CONTAINER SECURITY IN A CLOUD ENVIRONMENT

#44
20240256658
2024-08-01

PROTECTING DATA AGAINST MALWARE ATTACKS USING CYBER VAULT AND AUTOMATED AIRGAP CONTROL

#45
20240256657
2024-08-01

SYSTEM AND METHOD FOR INTRUSION DETECTION IN MODULAR SYSTEMS

#46
20240256656
2024-08-01

CONTINUAL LEARNING APPROACH FOR THREAT DETECTION IN ZERO-TRUST ARCHITECTURES

#47
20240256324
2024-08-01

TECHNIQUES FOR SECURING VIRTUAL MACHINES

#48
20240249000
2024-07-25

ENCRYPTION WITH ENHANCED TWEAK GENERATION

#49
20240248987
2024-07-25

RETROSPECTIVE MEMORY ANALYSIS

#50
20240248986
2024-07-25

DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM

#51
20240248985
2024-07-25

AUTOMATIC RETENTION LOCK EXTENSIONS

#52
20240248679
2024-07-25

SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKS

#53
20240244067
2024-07-18

ELECTRONIC MAIL SECURITY SYSTEM

#54
20240244065
2024-07-18

TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES

#55
20240241956
2024-07-18

CLASSIFYING CYBERSECURITY THREATS USING MACHINE LEARNING ON NON-EUCLIDEAN DATA

#56
20240241951
2024-07-18

MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES

#57
20240241950
2024-07-18

PREVENTION OF CONTAINER ESCAPE-BASED ATTACKS OF A HOST SYSTEM

#58
20240241949
2024-07-18

SYSTEM AND METHOD FOR DYNAMIC SCORING OF INCIDENTS

#59
20240241948
2024-07-18

PREVENTING INSIDER THREAT UTILIZING MACHINE LEARNING

#60
20240235861
2024-07-11

SYSTEM AND METHOD FOR MACHINE LEARNING BASED SECURITY INCIDENTS DETECTION AND CLASSIFICATION IN A BLOCKCHAIN ECOSYSTEM

#61
20240233469
2024-07-11

MULTIMODE RETAIL SYSTEM

#62
20240232349
2024-07-11

MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM

#63
20240232344
2024-07-11

Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters

#64
20240232343
2024-07-11

Attack Detection Method and Apparatus

#65
20240232342
2024-07-11

PROTECTION OF MASKED DATA

#66
20240232341
2024-07-11

METHODS AND SYSTEMS FOR AUTOMATIC GRADING, IMPACT ANALYSIS AND MAPPING TO THE CIA TRIAD

#67
20240232340
2024-07-11

OUT-OF-BAND PAIRING FOR WIRELESS NEURAL IMPLANT

#68
20240232339
2024-07-11

SYSTEM AND METHOD FOR ANOMALY DETECTION IN IOT DATA RECORDS

#69
20240232338
2024-07-11

SYSTEM AND METHOD FOR THREAT MANAGEMENT IN DISTRIBUTED SYSTEMS

#70
20240232326
2024-07-11

SENTINEL SYSTEM FOR AN ONLINE DEVICE

#71
20240220640
2024-07-04

COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS

#72
20240220629
2024-07-04

INCIDENT CONFIDENCE LEVEL

#73
20240220619
2024-07-04

SYSTEMS AND METHODS FOR SELECTING CLIENT BACKUP FILES FOR MALICIOUSNESS ANALYSIS

#74
20240220617
2024-07-04

DEEP LEARNING BASED DETECTION OF MALICIOUS SHELL SCRIPTS

#75
20240220615
2024-07-04

SYSTEM AND METHOD FOR MANAGING AI MODELS USING VIEW LEVEL ANALYSIS

#76
20240220614
2024-07-04

System and method for threat detection based on stack trace and kernel sensors

#77
20240220613
2024-07-04

DNS TUNNELING DETECTION AND PREVENTION

#78
20240220612
2024-07-04

METHODS AND APPARATUS FOR DISARMING JAVASCRIPT IN PDF OR HWP

#79
20240220592
2024-07-04

SYSTEM AND METHOD FOR DETECTING AGENT SHARING CREDENTIALS

#80
20240214420
2024-06-27

APPLICATION FIREWALL

#81
20240211601
2024-06-27

FIRMWARE POLICY ENFORCEMENT VIA A SECURITY PROCESSOR

#82
20240211599
2024-06-27

METHOD AND SYSTEM FOR INFERRING DOCUMENT SENSITIVITY

#83
20240211598
2024-06-27

DATA DETECTION METHOD AND ELECTRONIC DEVICE

#84
20240211592
2024-06-27

ASSESSING SECURITY IN INFORMATION AND EVENT MANAGEMENT (SIEM) ENVIRONMENTS

#85
20240202331
2024-06-20

ARTIFICIAL INTELLIGENCE DETERRENCE TECHNIQUES FOR SECURITY AND AUTOMATION SYSTEMS

#86
20240202330
2024-06-20

SECURE MIL-STD-1553 DATA BUS

#87
20240202329
2024-06-20

SYSTEM AND METHOD FOR ROBUST NATURAL LANGUAGE CLASSIFICATION UNDER CHARACTER ENCODING

#88
20240202328
2024-06-20

MEMORY DEVICE FOR PERFORMING TARGET REFRESH OPERATION, AND OPERATION METHOD THEREOF

#89
20240202327
2024-06-20

APPARATUS FOR CONTROLLING VEHICLE AND METHOD FOR THE SAME

#90
20240202326
2024-06-20

Anomaly Detection on MIL-STD-1553 Dataset Using Machine Learning

#91
20240202325
2024-06-20

System and Method for Explainable Anomaly Detection

#92
20240202324
2024-06-20

SENSOR DEVICE PROTECTION AGAINST ATTACK

#93
20240202323
2024-06-20

METHOD AND SYSTEM FOR PROTECTING A MACHINE LEARNING MODEL AGAINST EXTRACTION

#94
20240202292
2024-06-20

SYSTEM, METHODS, AND APPARATUS FOR MOBILE DEVICE SECURITY

#95
20240193486
2024-06-13

ACCELERATED MACHINE LEARNING

#96
20240193269
2024-06-13

CLUSTERING AND CLUSTER TRACKING OF CATEGORICAL DATA

#97
20240193268
2024-06-13

THREAT DETECTION AND MITIGATION IN A NETWORKED ENVIRONMENT

#98
20240193267
2024-06-13

METHODS AND SYSTEMS FOR CYBER THREAT ANALYSIS

#99
20240193007
2024-06-13

System and Methods Involving Features of Hardware Virtualization, Hypervisors, APIs of Interest and/or Other Features

#100
20240187423
2024-06-06

INTERACTIVE SHELL EVENT DETECTION

#101
20240185843
2024-06-06

DETECTION OF POTENTIAL EXFILTRATION OF AUDIO DATA FROM DIGITAL ASSISTANT APPLICATIONS

#102
20240184894
2024-06-06

METHOD FOR DEPLOYING CONTAINERIZED SECURITY TECHNOLOGIES ON EMBEDDED DEVICES

#103
20240184888
2024-06-06

MALICIOUS SOFTWARE DETECTION BASED ON API TRUST

#104
20240184886
2024-06-06

Ransomware Detection Using Multiple Security Threat Detection Processes

#105
20240179166
2024-05-30

SYSTEMS AND METHODS FOR DETECTION AND MITIGATION OF MALICIOUS ENCRYPTION

#106
20240176917
2024-05-30

DEVICE SECURITY FOR CABLE THREAT ACTORS

#107
20240176894
2024-05-30

A CRITICAL INFRASTRUCTURE SIMULATION AND EMULATION SYSTEM AND METHOD

#108
20240176882
2024-05-30

SYSTEM AND METHOD FOR MACHING LEARING-BASED DETECTION OF RANSOMWARE ATTACKS ON A STORAGE SYSTEM

#109
20240176878
2024-05-30

MACHINE LEARNING ASSISTED ROOT CAUSE ANALYSIS FOR COMPUTER NETWORKS

#110
20240176877
2024-05-30

ADDRESSABLE SMART AGENT DATA TECHNOLOGY TO DETECT UNAUTHORIZED TRANSACTION ACTIVITY

#111
20240176875
2024-05-30

SELECTIVE IMPORT/EXPORT ADDRESS TABLE FILTERING

#112
20240176874
2024-05-30

PRESERVING DLL HOOKS

#113
20240171615
2024-05-23

DYNAMIC, RUNTIME APPLICATION PROGRAMMING INTERFACE PARAMETER LABELING, FLOW PARAMETER TRACKING AND SECURITY POLICY ENFORCEMENT USING API CALL GRAPH

#114
20240169098
2024-05-23

Secure Chip-Wide Transmission

#115
20240169062
2024-05-23

METHOD AND DEVICE FOR ANALYZING AND PROCESSING MALICIOUS CODE FOR CONTAINER IMAGE, AND COMPUTER-READABLE RECORDING MEDIUM

#116
20240169060
2024-05-23

METHOD AND SYSTEM FOR VERIFYING QUICK RESPONSE CODES

#117
20240169059
2024-05-23

PREMISES SECURITY SYSTEM WITH WIRELESS ENERGY HARVESTING

#118
20240169058
2024-05-23

Deterrence devices and techniques

#119
20240169056
2024-05-23

MANAGING AND CLASSIFYING COMPUTER PROCESSES

#120
20240169052
2024-05-23

On-Demand Trusted Extended Reality Environments

#121
20240160756
2024-05-16

SECURE DATA DELIVERY SYSTEM USING AN AUTONOMOUS VEHICLE

#122
20240160741
2024-05-16

DATA PROCESSING SYSTEM CAPABLE OF PREVENTING SYSTEM TIME FROM BEING TAMPERED IN OFF-LINE STATUS

#123
20240160733
2024-05-16

GRAPH COMPARISON-BASED BEHAVIOR ANALYSIS

#124
20240160732
2024-05-16

MEMORY DEVICE, OPERATING METHOD OF MEMORY DEVICE, AND MEMORY SYSTEM

#125
20240160731
2024-05-16

PROTECTING COMPUTER SYSTEMS

#126
20240160730
2024-05-16

APPARATUSES, COMPUTER-IMPLEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING INITIATION OF AN AUTOMATED HEALING PROCESS FOR OPERATIONAL TECHNOLOGY DEVICES IN A NETWORK

#127
20240160729
2024-05-16

System and method for remote users activities administration

#128
20240160728
2024-05-16

Snapset Restricted Utilization and Preservation

#129
20240160727
2024-05-16

Detecting anomalous Application Programming Interface (API) behaviors

#130
20240160725
2024-05-16

APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION

#131
20240160724
2024-05-16

SYSTEM AND METHOD FOR AUTOMATED SECURITY TOOL INTEGRATION

#132
20240154996
2024-05-09

Secure Notification on Networked Devices

#133
20240152885
2024-05-09

SECURED INTEGRATION OF THIRD-PARTY LOGIC IN ELECTRONIC TRANSACTION PROCESSING

#134
20240152656
2024-05-09

Systems and Methods for Non-Destructive Detection of Hardware Anomalies

#135
20240152618
2024-05-09

METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOF

#136
20240152616
2024-05-09

DETECTION OF RANSOMWARE

#137
20240152610
2024-05-09

METHODS AND SYSTEMS FOR DETECTING AND BLOCKING MALICIOUS ACTIONS IN OPERATING SYSTEM

#138
20240152609
2024-05-09

EVENT-DRIVEN MONITORING OF RESOURCES IN A CLOUD COMPUTING ENVIRONMENT

#139
20240152608
2024-05-09

METHOD FOR SUPPORTING DECISION-MAKING IN SECURITY CONTROL ENVIRONMENT BASED ON ARTIFICIAL INTELLIGENCE

#140
20240152607
2024-05-09

DETECTION DEVICE, DETECTION METHOD AND DETECTION PROGRAM

#141
20240152606
2024-05-09

LABEL RECOMMENDATION FOR CYBERSECURITY CONTENT

#142
20240152605
2024-05-09

BOT ACTIVITY DETECTION FOR EMAIL TRACKING

#143
20240147234
2024-05-02

Method, Device, and System of Differentiating Between a Cyber-Attacker and a Legitimate User

#144
20240143752
2024-05-02

AUTOMATED USER-ASSISTED WORKFLOWS FOR CLOUD-BASED COMPUTER FORENSIC ANALYSIS

#145
20240143751
2024-05-02

APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION

#146
20240143750
2024-05-02

Case Tampering Detection Device and Method for Computer System

#147
20240143749
2024-05-02

RANSOMWARE PROTECTION SYSTEMS AND METHODS LEVERAGING SMART NETWORK INTERFACE CONTROLLERS

#148
20240143748
2024-05-02

Virtual Machine Image Management System

#149
20240143747
2024-05-02

SYSTEM AND METHOD FOR AUTOMATIC BINARY SEGMENTATION

#150
20240143746
2024-05-02

CONTEXT AWARE BEHAVIORAL ANOMALY DETECTION IN COMPUTING SYSTEMS

#151
20240143745
2024-05-02

ARTIFICIAL INTELLIGENCE-ASSISTED SECURITY DATA EXPLORATION ON A FEDERATED SEARCH ENVIRONMENT

#152
20240143744
2024-05-02

SYSTEM AND METHOD FOR COLLABORATIVE SMART EVIDENCE GATHERING AND INVESTIGATION FOR INCIDENT RESPONSE, ATTACK SURFACE MANAGEMENT, AND FORENSICS IN A COMPUTING ENVIRONMENT

#153
20240143743
2024-05-02

Method, system, and apparatus for security assurance, protection, monitoring and analysis of integrated circuits and electronic systems in relation to hardware trojans

#154
20240143739
2024-05-02

INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS

#155
20240137370
2024-04-25

METHOD TO IMPROVE ANTI-MALWARE SCAN RESPONSIVENESS AND EFFECTIVENESS USING USER SYMPTOMS FEEDBACK

#156
20240135019
2024-04-25

MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENT

#157
20240134982
2024-04-25

TECHNIQUES FOR A MEMORY MODULE PER ROW ACTIVATE COUNTER

#158
20240134973
2024-04-25

PROTECTION OF MASKED DATA

#159
20240134972
2024-04-25

OPTIMIZING INTELLIGENT THRESHOLD ENGINES IN MACHINE LEARNING OPERATIONS SYSTEMS

#160
20240134960
2024-04-25

SENTINEL SYSTEM FOR AN ONLINE DEVICE

#161
20240126875
2024-04-18

SYSTEMS AND METHODS FOR CYBER SECURITY THREAT DETECTION AND EXPEDITED GENERATION OF INVESTIGATION STORYBOARDS USING INTELLIGENT CYBER SECURITY AUTOMATIONS

#162
20240126874
2024-04-18

SECURITY PROCESSING DEVICE, METHOD AND ELECTRONIC DEVICE FOR HANDLING ATTACKS

#163
20240126873
2024-04-18

Endpoint Threat Inoculation Computing System

#164
20240126872
2024-04-18

LABELING METHOD FOR INFORMATION SECURITY DETECTION RULES AND TACTIC, TECHNIQUE AND PROCEDURE LABELING DEVICE FOR THE SAME

#165
20240126871
2024-04-18

VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTS

#166
20240121263
2024-04-11

AUTONOMOUS REPORT COMPOSER

#167
20240119146
2024-04-11

SENSOR FUSION IN SECURITY SYSTEMS

#168
20240119145
2024-04-11

SYSTEM AND METHOD FOR CYBERSECURITY THREAT DETECTION UTILIZING STATIC AND RUNTIME DATA

#169
20240119144
2024-04-11

THREAT MITIGATION SYSTEM AND METHOD

#170
20240119143
2024-04-11

A HYPER-SCALE CLOUD ENVIRONMENT STANDARD CONTROL DEVIATION REMEDIATION APPLICATION

#171
20240119142
2024-04-11

Defense Generator, Method for Preventing an Attack on an AI Unit, and Computer-Readable Storage Medium

#172
20240114042
2024-04-04

METHOD AND SYSTEM FOR ANALYZING CYBERSECURITY THREATS AND IMPROVING DEFENSIVE INTELLIGENCE

#173
20240112115
2024-04-04

ENTERPRISE NETWORK THREAT DETECTION

#174
20240111880
2024-04-04

MULTI-MODAL, MODULAR DATA SECURITY AND MONETIZATION SYSTEM AND METHOD

#175
20240111868
2024-04-04

DELAYED INFERENCE ATTACK DETECTION FOR IMAGE SEGMENTATION-BASED VIDEO SURVEILLANCE APPLICATIONS

#176
20240111866
2024-04-04

A CYBER RECOVERY FORENSICS KIT CONFIGURED TO MAINTAIN COMMUNICATION AND SEND RETURN MALWARE

#177
20240111862
2024-04-04

DETECTING AND RESPONDING TO ENVIRONMENTAL CONDITION-INDUCED SECURITY ATTACKS ON SEMICONDUCTOR PACKAGES

#178
20240111861
2024-04-04

USING BACKUP META-DATA AND ANALYTICS FOR DETECTING CYBER-ATTACKS

#179
20240111860
2024-04-04

Systems and methods for preventing hollowing attack

#180
20240111859
2024-04-04

LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM

#181
20240111857
2024-04-04

SECURE EXECUTION OF A FILE ON A COPY DEVICE IN A VIRTUALIZED COMPUTING ENVIRONMENT

#182
20240111809
2024-04-04

SYSTEM EVENT DETECTION SYSTEM AND METHOD

#183
20240104209
2024-03-28

MEMORY DEVICE FOR PERFORMING TARGET REFRESH OPERATION AND OPERATING METHOD THEREOF

#184
20240104205
2024-03-28

MALWARE DETECTION BASED ON USER INTERACTIONS

#185
20240104203
2024-03-28

System and Method for Operating an Endpoint Agent at an Endpoint Device

#186
20240104202
2024-03-28

POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK

#187
20240104201
2024-03-28

ANOMALY DETECTION SYSTEM

#188
20240104186
2024-03-28

TECHNIQUES FOR IDENTIFYING VETTED SOFTWARE APPLICATIONS THAT PROVIDE UNAUTHORIZED FEATURES

#189
20240095411
2024-03-21

FAULT-INJECTION PROTECTION CIRCUIT FOR PROTECTING AGAINST LASER FAULT INJECTION

#190
20240095383
2024-03-21

MUTUAL TRANSPORT LAYER SECURITY (TLS) VERIFICATION USING AN AUTHORIZED VIEWER

#191
20240095376
2024-03-21

HELPER DATA INTEGRITY CHECK AND TAMPER DETECTION USING SRAM-BASED PHYSICALLY UNCLONABLE FUNCTION

#192
20240095358
2024-03-21

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR SNAPSHOT CLASSIFICATION

#193
20240095355
2024-03-21

SYSTEMS AND METHODS FOR MACHINE LEARNING ENHANCED INTELLIGENT BUILDING ACCESS ENDPOINT SECURITY MONITORING AND MANAGEMENT

#194
20240095354
2024-03-21

ASSURANCE MODEL FOR AN AUTONOMOUS ROBOTIC SYSTEM

#195
20240095353
2024-03-21

SYSTEM AND METHOD FOR DETECTING CYCLIC ACTIVITY IN AN EVENT FLOW FOR DYNAMIC APPLICATION ANALYSIS

#196
20240095352
2024-03-21

DETECTING UPLOADS OF MALICIOUS FILES TO CLOUD STORAGE

#197
20240095351
2024-03-21

HYPERVISOR-ASSISTED DATA BACKUP AND RECOVERY FOR NEXT GENERATION ANTI-VIRUS (NGAV) SYSTEMS

#198
20240095350
2024-03-21

THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS

#199
20240095349
2024-03-21

Detecting and mitigating application security threats based on threat change patterns

#200
20240095348
2024-03-21

INSTANT DETECTION OF A HOMOGLYPH ATTACK WHEN REVIEWING CODE IN AN AUGMENTED REALITY DISPLAY

#201
20240095346
2024-03-21

ANOMALOUS COMMAND LINE ENTRY DETECTION

#202
20240095344
2024-03-21

COMPUTER IMPLEMENTED METHOD

#203
20240095075
2024-03-21

NODE LEVEL CONTAINER MUTATION DETECTION

#204
20240086531
2024-03-14

MEMORY SYSTEM

#205
20240086530
2024-03-14

DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTION

#206
20240086529
2024-03-14

Preventing User Interaction Hijacking Attacks By Blocking Interactions With Obscured Components

#207
20240086528
2024-03-14

ELECTRONIC DEVICE LOCK ADJUSTMENTS

#208
20240086527
2024-03-14

DETECTING POTENTIAL MALWARE IN HOST MEMORY

#209
20240086526
2024-03-14

MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES

#210
20240086525
2024-03-14

SECURITY BREACH AUTO-CONTAINMENT AND AUTO-REMEDIATION IN A MULTI-TENANT CLOUD ENVIRONMENT FOR BUSINESS CONTINUITY

#211
20240086524
2024-03-14

SYSTEM AND METHOD FOR AGENTLESS HOST CONFIGURATION DETECTION IN A COMPUTING ENVIRONMENT

#212
20240086523
2024-03-14

Information processing device, display method, and non-transitory computer readable medium

#213
20240080339
2024-03-07

Device, System, and Method of Detecting Vishing Attacks

#214
20240078338
2024-03-07

INTERFACE INVOCATION REQUEST PROCESSING METHODS AND APPARATUSES

#215
20240078311
2024-03-07

ATTACK DETECTION METHOD, ATTACK RESPONSE METHOD, AND STORAGE DEVICE

#216
20240078310
2024-03-07

Calendar-Based Device Security

#217
20240073242
2024-02-29

CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORK

#218
20240070297
2024-02-29

Secure firewall configurations

#219
20240070288
2024-02-29

MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT

#220
20240070274
2024-02-29

METHODS AND APPARATUS TO MITIGATE FIRMWARE MALWARE

#221
20240070272
2024-02-29

DETECTING A CURRENT ATTACK BASED ON SIGNATURE GENERATION TECHNIQUE IN A COMPUTERIZED ENVIRONMENT

#222
20240070271
2024-02-29

METHODS, SYSTEMS AND COMPUTER PROGRAMS FOR DETECTING POTENTIALLY SUSPICIOUS RESOURCE ACCESS EVENTS

#223
20240070270
2024-02-29

GENERATING SECURITY LANGUAGE QUERIES

#224
20240070269
2024-02-29

AUTOMATIC SELECTION OF DATA FOR TARGET MONITORING

#225
20240070268
2024-02-29

Aggregate Event Profiles for Detecting Malicious Mobile Applications

#226
20240070265
2024-02-29

BACKUP PROTECTION SYSTEM AND METHOD

#227
20240070264
2024-02-29

DATA STORAGE DEVICE PERFORMING DATA PROTECTION AND HOST DEVICE SUPPORTING A DATA PROTECTION FUNCTION USING A PROGRAM CONTEXT

#228
20240069976
2024-02-29

Serverless computing-based, continuous gateway watch for data change

#229
20240064168
2024-02-22

INCORPORATING SOFTWARE-AS-A-SERVICE DATA INTO A CYBER THREAT DEFENSE SYSTEM

#230
20240062133
2024-02-22

COMPUTER AUGMENTED THREAT EVALUATION

#231
20240061934
2024-02-22

TECHNIQUES FOR MITIGATING MANIPULATIONS OF AN ONBOARD NETWORK OF A VEHICLE

#232
20240061933
2024-02-22

Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for javascript-enabled applications

#233
20240061932
2024-02-22

A Method of Training a Submodule and Preventing Capture of an AI Module

#234
20240061931
2024-02-22

EXECUTABLE FILE UNPACKING SYSTEM AND METHOD FOR STATIC ANALYSIS OF MALICIOUS CODE

#235
20240054234
2024-02-15

METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING

#236
20240054218
2024-02-15

REAL-TIME JAVASCRIPT CLASSIFIER

#237
20240054215
2024-02-15

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

#238
20240054214
2024-02-15

COMPUTERIZED SYSTEM FOR AUTONOMOUS DETECTION OF UNAUTHORIZED ACCESS ACCORDING TO OUTBOUND ADDRESSES

#239
20240048573
2024-02-08

Security Monitoring at Operating System Kernel Level

#240
20240045981
2024-02-08

SYSTEM AND METHOD FOR FILE RECOVERY FROM MALICIOUS ATTACKS

#241
20240045970
2024-02-08

ANALYSIS DEVICE

#242
20240045961
2024-02-08

Methods and Systems for Analyzing Environment-Sensitive Malware with Coverage-Guided Fuzzing

#243
20240045953
2024-02-08

SESSION RECORDING

#244
20240045952
2024-02-08

PROTECTION OF NEURAL NETWORKS AGAINST CLONING ATTACKS

#245
20240045951
2024-02-08

SECURING DIGITAL DATA BY AUTOMATIC MECHANISM INCAPACITATING DATA STORAGE DEVICE

#246
20240037995
2024-02-01

DETECTING WRAPPED ATTACKS ON FACE RECOGNITION

#247
20240037477
2024-02-01

Endpoint with remotely programmable data recorder

#248
20240037259
2024-02-01

Volume Dependencies in a Storage System

#249
20240037230
2024-02-01

REFRESH CONTROL METHOD, REFRESH CONTROL CIRCUIT AND MEMORY

#250
20240037229
2024-02-01

Monitoring for Security Threats in a Container System

#251
20240037228
2024-02-01

SYSTEMS AND METHODS FOR REAL-TIME CYBER INCIDENT DETECTION IN DATA SPARSE ENVIRONMENTS USING ARTIFICIAL INTELLIGENCE

#252
20240037227
2024-02-01

TECHNIQUES FOR SECURING DEPLOYMENT OF INFRASTRUCTURE AS CODE

#253
20240037226
2024-02-01

MULTI-TENANT SECURITY

#254
20240037221
2024-02-01

PROCESSOR AND ATTACK DETECTION METHOD THEREOF

#255
20240031397
2024-01-25

SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON SEVERITY RATING

#256
20240031381
2024-01-25

SYSTEMS AND METHODS FOR FACILITATING DETECTION OF A SECURITY EVENT ASSOCIATED WITH AN IOT DEVICE

#257
20240031375
2024-01-25

FRAUDULENT HOST DEVICE CONNECTION DETECTION

#258
20240029360
2024-01-25

Visual content verification in extended and augmented reality

#259
20240028773
2024-01-25

SINGLE-CHIP SYSTEM, METHOD FOR OPERATING A SINGLE-CHIP SYSTEM, AND MOTOR VEHICLE

#260
20240028746
2024-01-25

EXPLOIT DETECTION VIA INDUCED EXCEPTIONS

#261
20240028745
2024-01-25

SYSTEM AND METHOD FOR HUNT, INCIDENT RESPONSE, AND FORENSIC ACTIVITIES ON AN AGNOSTIC PLATFORM

#262
20240028725
2024-01-25

Data Processing Arrangement and Method for Detecting Ransomware in a File Catalog

#263
20240028717
2024-01-25

Deception-Based Responses to Security Attacks

#264
20240028714
2024-01-25

SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND INTELLIGENT VERIFICATION-INFORMED HANDLING OF CYBER SECURITY EVENTS THROUGH AUTOMATED VERIFICATION WORKFLOWS

#265
20240028713
2024-01-25

TRUST-BASED WORKSPACE INSTANTIATION

#266
20240022595
2024-01-18

METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY

#267
20240022110
2024-01-18

ELECTRONICS IN HIERARCHICAL CIRCUIT ARCHITECTURES THAT CONTROL HIGH VOLTAGES AND PROVIDE CYBER INTRUSION DETECTIONS

#268
20240020476
2024-01-18

DETERMINING LINKED SPAM CONTENT

#269
20240020384
2024-01-18

DETECTING MALICIOUS SCRIPTS IN A WEB PAGE

#270
20240020382
2024-01-18

SYSTEM AND METHOD FOR CRYPTOGRAPHIC SECURITY THROUGH PROCESS DIVERSITY

#271
20240012949
2024-01-11

METHOD AND APPARATUS FOR PRODUCING RECORDING MEDIUM AND COMPUTER PROGRAM

#272
20240012906
2024-01-11

DATA BREACH SYSTEM AND METHOD

#273
20240012905
2024-01-11

SYSTEMS AND METHODS FOR MACHINE LEARNING ENHANCED INTELLIGENT BUILDING ACCESS ENDPOINT SECURITY MONITORING AND MANAGEMENT

#274
20240005041
2024-01-04

SCREEN CAPTURE DATA PROTECTION FOR MANAGED DEVICES

#275
20240004996
2024-01-04

Cyberanalysis workflow acceleration

#276
20240004995
2024-01-04

SYSTEM AND METHOD FOR COMBINING CYBER-SECURITY THREAT DETECTIONS AND ADMINISTRATOR FEEDBACK

#277
20240004994
2024-01-04

Method for protecting a machine learning model from a side channel attack

#278
20240004993
2024-01-04

MALWARE DETECTION IN CONTAINERIZED ENVIRONMENTS

#279
20240004992
2024-01-04

RESOURCE PROTECTION

#280
20240004991
2024-01-04

EXECUTION PROTECTION USING DATA COLOURING

#281
20230421602
2023-12-28

MALICIOUS SITE DETECTION FOR A CYBER THREAT RESPONSE SYSTEM

#282
20230418985
2023-12-28

SECURITY SUBSYSTEM FOR REMOTE ATTESTATION

#283
20230418964
2023-12-28

GENERATING CUSTOMIZED POLICY DECISION POINT SERVICES FOR CONTROLLING ACCESS TO COMPUTING RESOURCES

#284
20230418947
2023-12-28

PRE-BOOT CONTEXT-BASED SECURITY MITIGATION

#285
20230418940
2023-12-28

ANTIVIRUS SCANNING ARCHITECTURE FOR UPLOADED FILES

#286
20230418938
2023-12-28

ATTACK KILL CHAIN GENERATION AND UTILIZATION FOR THREAT ANALYSIS

#287
20230418937
2023-12-28

Privileged Firmware Mode Protection

#288
20230418936
2023-12-28

SECURITY SUBSYSTEM FOR EXECUTION VERIFICATION

#289
20230418935
2023-12-28

DETECTING TAMPERING IN DATA PROCESSING PIPELINES

#290
20230418796
2023-12-28

SEARCHABLE INVESTIGATION HISTORY FOR EVENT DATA STORE

#291
20230412192
2023-12-21

System and method for data compression with intrusion detection

#292
20230409710
2023-12-21

ALLOW LIST OF CONTAINER IMAGES BASED ON DEPLOYMENT CONFIGURATION AT A CONTAINER ORCHESTRATION SERVICE

#293
20230409707
2023-12-21

STORAGE SYSTEM AND UNAUTHORIZED ACCESS DETECTION METHOD

#294
20230409706
2023-12-21

Ransomware-based data protection parameter modification

#295
20230409705
2023-12-21

SEMICONDUCTOR MEMORY DEVICE AND METHOD FOR GENERATING MESSAGE AUTHENTICATION CODE THEREOF

#296
20230409704
2023-12-21

CONTROL SYSTEM HAVING ISOLATED USER COMPUTING UNIT AND CONTROL METHOD THEREFOR

#297
20230409703
2023-12-21

Prediction model selection for cyber security

#298
20230409702
2023-12-21

BROWSER SIGNAL COLLECTION FOR DETECTION OF AUTOMATED ACTIVITY IN BROWSER SESSION

#299
20230403577
2023-12-14

Using orchestrators for false positive detection and root cause analysis

#300
20230401322
2023-12-14

METHOD FOR REMEDIATING VULNERABILITIES OF A DATA PROCESSING SYSTEM