G06F21/577 - CPC Classification

Classification description:

Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems; Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities Assessing vulnerabilities and evaluating computer system security

Recent Application in this class:
#1
20240296233
2024-09-05

METHOD FOR DETECTING VULNERABILITIES OF TARGET APPLICATIONS, DEVICE, AND MEDIUM THEREOF

#2
20240296232
2024-09-05

ANALYZING QR CODE RISK

#3
20240296231
2024-09-05

AUTOMATED ATTRIBUTE SCRAPING FOR SECURITY FEATURE IMPLEMENTATION PREDICTION

#4
20240296030
2024-09-05

CODE DEPLOYMENT

#5
20240289465
2024-08-29

RETRAINING MACHINE LEARNING MODEL FOR COMPUTER VULNERABILITY EXPLOITATION DETECTION

#6
20240289464
2024-08-29

TECHNIQUES FOR THE UNIFICATION OF RAW CYBER DATA COLLECTED FROM DIFFERENT SOURCES FOR VULNERABILITY MANAGEMENT

#7
20240289463
2024-08-29

MODIFICATION OF VULNERABLE PODS

#8
20240289462
2024-08-29

SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR REMEDIATING SECURITY VULNERABILITIES

#9
20240289458
2024-08-29

Method and Device Relating to Decision-Making Threshold

#10
20240289451
2024-08-29

CIRCUIT AND METHOD FOR PROTECTING AN APPLICATION AGAINST A SIDE CHANNEL ATTACK

#11
20240289450
2024-08-29

AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS

#12
20240289443
2024-08-29

SYSTEMS AND METHODS FOR INDICATING ONLOOKER VULNERABILITY

#13
20240281726
2024-08-22

Complex Application Attack Quantification, Testing, Detection and Prevention

#14
20240281542
2024-08-22

Custom Patching Automation with Machine Learning Integration

#15
20240281541
2024-08-22

FUNCTION ALLOCATION CONTROL APPARATUS, FUNCTION ALLOCATION CONTROL METHOD AND PROGRAM

#16
20240281540
2024-08-22

RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER-READABLE MEDIUM

#17
20240281539
2024-08-22

SYSTEM AND METHOD FOR DETECTING VULNERABILITIES IN OBJECT-ORIENTED PROGRAM CODE USING AN OBJECT PROPERTY GRAPH

#18
20240281538
2024-08-22

SYSTEMS AND METHODS FOR SECURITY STATE OPTIMIZATION OF SPDM-ENABLED DEVICES

#19
20240281349
2024-08-22

AUTO-CORRECTING DEFICIENCIES OF A SYSTEM

#20
20240275764
2024-08-15

SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATION

#21
20240273303
2024-08-15

SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS

#22
20240273233
2024-08-15

SYSTEMS AND METHODS FOR TRAINING SET OBFUSCATION UTILIZING AN INVERTED THREAT MODEL IN A ZERO-TRUST COMPUTING ENVIRONMENT

#23
20240273232
2024-08-15

SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT

#24
20240273217
2024-08-15

Security Configuration Optimizer Systems and Methods

#25
20240273216
2024-08-15

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

#26
20240273215
2024-08-15

SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS

#27
20240273214
2024-08-15

ARTIFICIAL-INTELLIGENCE-BASED SYSTEM AND METHOD FOR QUESTIONNAIRE / SECURITY POLICY CROSS-CORRELATION AND COMPLIANCE LEVEL ESTIMATION FOR CYBER RISK ASSESSMENTS

#28
20240273213
2024-08-15

SYSTEMS AND METHODS FOR MODEL OVERFITTING REDUCTION UTILIZING DATA SUBSET TRAINING IN A ZERO-TRUST COMPUTING ENVIRONMENT

#29
20240273212
2024-08-15

SECURITY VULNERABILITY DETECTION FOR IMAGE FILES

#30
20240273211
2024-08-15

INTELLIGENT APPARATUS TO MONITOR AND AUTO DEPLOY SECURITY POLICY RULES ON CONTAINER BASED CLOUD INFRASTRUCTURE LEVERAGING NFT & QUANTUM KNOWLEDGE GRAPH

#31
20240273203
2024-08-15

Systems and Methods for Detecting Attack Vectors to Application Data

#32
20240273181
2024-08-15

SECURITY POLICIES FOR SOFTWARE CALL STACKS

#33
20240273179
2024-08-15

STATIC ANALYSIS CORRELATION SCANNERS

#34
20240265115
2024-08-08

ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE

#35
20240265114
2024-08-08

AN APPARATUS AND METHOD FOR ENHANCING CYBERSECURITY OF AN ENTITY

#36
20240265113
2024-08-08

Systems and Methods to Determine Attack Paths to Application Assets

#37
20240265112
2024-08-08

Systems and Methods to Map Attack Paths to Applications Assets in a Visualization Interface

#38
20240265111
2024-08-08

METHODS AND SYSTEMS FOR INTELLIGENT DATA SLICE MONITORING

#39
20240259465
2024-08-01

SYSTEM FOR INTENT-BASED WORKLOAD ORCHESTRATION

#40
20240259404
2024-08-01

PROCESS TREE AND TAGS

#41
20240256780
2024-08-01

GENERATING SECURITY REPORTS

#42
20240256678
2024-08-01

SYSTEMS AND METHODS FOR PROTECTION MODELING

#43
20240256677
2024-08-01

COMPARATIVE REAL-TIME END-TO-END SECURITY VULNERABILITIES DETERMINATION AND VISUALIZATION

#44
20240256676
2024-08-01

METHOD FOR IDENTIFYING ONE OR MORE EXPLOITABLE VULNERABILITIES IN DEVICE FIRMWARE OF AN IOT DEVICE

#45
20240256675
2024-08-01

System and method for security threat identification and resolution

#46
20240256668
2024-08-01

Detecting and Preventing Installation and Execution of Malicious Browser Extensions

#47
20240256659
2024-08-01

CONTAINER SECURITY IN A CLOUD ENVIRONMENT

#48
20240249152
2024-07-25

DETECTING OUT-OF-DISTRIBUTION DATA SAMPLE IN A MACHINE LEARNING OPERATION

#49
20240249010
2024-07-25

SYSTEMS AND METHODS FOR SUBORDINATE WORKSPACES

#50
20240248997
2024-07-25

BROWSER SESSION SECURITY SYSTEM

#51
20240248996
2024-07-25

WORKSPACE INSTANTIATION USING CONTINUOUS VULNERABILITY INTELLIGENCE FEEDBACK LOOPS

#52
20240248995
2024-07-25

SECURITY VULNERABILITY LIFECYCLE SCOPE IDENTIFICATION

#53
20240248233
2024-07-25

TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION

#54
20240241990
2024-07-18

SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK

#55
20240241967
2024-07-18

METHOD TO INTELLIGENTLY MANAGE THE END TO END CONTAINER COMPLIANCE IN CLOUD ENVIRONMENTS

#56
20240241966
2024-07-18

REMEDIATION OF REGULATORY NON-COMPLIANCE

#57
20240241965
2024-07-18

TELEMETRY COLLECTION AUTO-TUNING FOR WORKSPACES

#58
20240241964
2024-07-18

DEPICTING A RELATIVE EXTENT OF VULNERABILITY ASSOCIATED WITH A WEB APPLICATION DEPLOYED ON A DOMAIN

#59
20240241963
2024-07-18

LEARNING BASED IDENTIFICATION OF VULNERABLE FUNCTIONS IN RELATION TO COMMON VULNERABILITIES AND EXPOSURES (CVE)

#60
20240241962
2024-07-18

PREVENTING VULNERABLE CODE UPLOAD/DOWNLOAD

#61
20240241923
2024-07-18

ADVANCED DATA COLLECTION BLOCK IDENTIFICATION

#62
20240241718
2024-07-18

APPLICATION AND INFRASTRUCTURE TEMPLATE MANAGEMENT TO EASILY CREATE SECURE APPLICATIONS FOR ENTERPRISES

#63
20240232430
2024-07-11

SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK

#64
20240232385
2024-07-11

A SCENARIO-BASED CYBER SECURITY SYSTEM AND METHOD

#65
20240232384
2024-07-11

METHOD FOR ASCERTAINING A RELEVANCE OF SECURITY-RELEVANT VULNERABILITIES OF A PRODUCT

#66
20240232383
2024-07-11

SEMICONDUCTOR DEVICE AND METHOD OF MANAGING SECRET INFORMATION

#67
20240232382
2024-07-11

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

#68
20240232381
2024-07-11

SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICS

#69
20240232380
2024-07-11

METHOD AND DEVICE FOR BUILDING VULNERABILITY DATABASE

#70
20240232379
2024-07-11

SYSTEMS AND METHODS FOR AGGREGATED VULNERABILITY PROOFING OF AN IHS

#71
20240232378
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING MACHINE LEARNING RECOMMENDATIONS

#72
20240232377
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING INTERDEPENDENT IHS COMPONENTS

#73
20240232376
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING DURING IHS PROVISIONING

#74
20240232375
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS

#75
20240232374
2024-07-11

SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING

#76
20240232373
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN USING A BOOTABLE IMAGE

#77
20240232372
2024-07-11

SYSTEMS AND METHODS FOR CONTEXT-AWARE VULNERABILITY RISK SCORES

#78
20240232371
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN GENERATING IHS UPDATES

#79
20240232370
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN UPDATING AN IHS

#80
20240232369
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN BOOTING AN IHS

#81
20240232368
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN ADDING AND REPLACING IHS HARDWARE

#82
20240232367
2024-07-11

MONITORING AND REMEDIATION OF CYBERSECURITY RISK BASED ON CALCULATION OF CYBER-RISK DOMAIN SCORES

#83
20240232354
2024-07-11

Systems and Methods for API Security Integration

#84
20240231808
2024-07-11

Software Composition Analysis on Target Source Code

#85
20240220674
2024-07-04

CONVERGED MODEL BASED RISK ASSESSMENT AND AUDIT GENERATION

#86
20240220637
2024-07-04

MANAGING THE LOADING OF SENSITIVE MODULES

#87
20240220636
2024-07-04

SECURITY DESIGN FLAW DETECTION METHOD BASED ON UNIT TEST CASE, RECORDING MEDIUM AND DEVICE FOR PERFORMING THE SAME

#88
20240220635
2024-07-04

Systems And Methods For Assessing Security In A Computing Device Environment

#89
20240220634
2024-07-04

ENHANCING APPLICATION SECURITY BY PERFORMING APPLICATION VULNERABILITY REDUCTION BASED ON STATIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING

#90
20240220633
2024-07-04

ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON STATIC AND DYNAMIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING

#91
20240220632
2024-07-04

ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON STATIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING

#92
20240220631
2024-07-04

SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT

#93
20240220630
2024-07-04

TYPOSQUATTING DETECTION VIA METADATA-BASED TRUSTWORTHINESS SCORING AND PACKAGE IDENTIFIER SIMILARITY

#94
20240220629
2024-07-04

INCIDENT CONFIDENCE LEVEL

#95
20240220628
2024-07-04

HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN

#96
20240220627
2024-07-04

METHOD FOR EXTRACTING ARTIFICIAL NEURAL NETWORK BY USING MELTDOWN VULNERABILITY

#97
20240220616
2024-07-04

ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON LIBRARY AND/OR FUNCTION REMOVAL AND SYSTEM CALL BLOCKING

#98
20240211623
2024-06-27

DYNAMIC CROSS-STANDARD COMPLIANCE COVERAGE

#99
20240211608
2024-06-27

SYSTEMS AND METHODS FOR MANAGING SOFTWARE SECURITY

#100
20240211607
2024-06-27

METHOD AND DEVICE FOR IDENTIFYING RISKS OF CYBERATTACKS

#101
20240211606
2024-06-27

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

#102
20240211605
2024-06-27

Automation Platform for Pentest Collaboration

#103
20240211604
2024-06-27

BINDING CONFIGURATION STATE TO A BLOCKCHAIN

#104
20240211599
2024-06-27

METHOD AND SYSTEM FOR INFERRING DOCUMENT SENSITIVITY

#105
20240202345
2024-06-20

ATTACK SCENARIO GENERATION APPARATUS, ATTACK SCENARIO GENERATION METHOD, AND COMPUTER READABLE MEDIUM

#106
20240202344
2024-06-20

USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTS

#107
20240202343
2024-06-20

SUPPRESSING A VULNERABILITY OF A CONTINUOUS INTEGRATION PIPELINE WITH AUDIT FUNCTIONALITY

#108
20240202340
2024-06-20

TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS

#109
20240195821
2024-06-13

Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity Data

#110
20240193280
2024-06-13

RISK SCORING SYSTEM FOR VULNERABILITY MITIGATION

#111
20240193279
2024-06-13

Vetting and/or Functional Validation of Software Components

#112
20240193278
2024-06-13

VULNERABILITY ANALYSIS OF A COMPUTER DRIVER

#113
20240193277
2024-06-13

AI BASED PATCH MANAGEMENT

#114
20240193276
2024-06-13

Comprehensive Software Supply Chain Analysis

#115
20240193262
2024-06-13

COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING AND SANDBOXING EXTERNAL RESOURCES AND METHODS OF USE THEREOF

#116
20240187423
2024-06-06

INTERACTIVE SHELL EVENT DETECTION

#117
20240184894
2024-06-06

METHOD FOR DEPLOYING CONTAINERIZED SECURITY TECHNOLOGIES ON EMBEDDED DEVICES

#118
20240184893
2024-06-06

SYSTEM AND METHOD FOR IDENTIFYING CYBERTHREATS FROM UNSTRUCTURED SOCIAL MEDIA CONTENT

#119
20240184892
2024-06-06

DIRECTED FUZZING FOR VULNERABILITY DETECTION

#120
20240184891
2024-06-06

DIRECTED FUZZING FOR VULNERABILITY DETECTION

#121
20240184883
2024-06-06

Privacy Border for a Portion of Resources on a Computing Machine

#122
20240176894
2024-05-30

A CRITICAL INFRASTRUCTURE SIMULATION AND EMULATION SYSTEM AND METHOD

#123
20240176893
2024-05-30

BROWSER EXTENSION ANALYSIS

#124
20240176892
2024-05-30

AUTOMATED APPLICATION PROGRAMMING INTERFACE (API) TESTING

#125
20240176891
2024-05-30

COMPARATIVE ANALYSIS OF BINARIES FOR SOFTWARE SUPPLY CHAIN SECURITY

#126
20240176890
2024-05-30

SYSTEMS AND METHODS FOR AN AT-RISK SYSTEM IDENTIFICATION VIA ANALYSIS OF ONLINE HACKER COMMUNITY DISCUSSIONS

#127
20240176889
2024-05-30

HISTORICAL RISK ASSESSMENT FOR RISK MITIGATION IN ONLINE ACCESS CONTROL

#128
20240176888
2024-05-30

METHOD OF DETECTING VULNERABILITIES OF CONTAINER IMAGES AT RUNTIME

#129
20240176879
2024-05-30

Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning

#130
20240176874
2024-05-30

PRESERVING DLL HOOKS

#131
20240176608
2024-05-30

REDUCING THE SIZE OF IMAGE FILES USABLE FOR DEPLOYING SOFTWARE IN COMPUTING ENVIRONMENTS

#132
20240171604
2024-05-23

ENTITY IP MAPPING

#133
20240171590
2024-05-23

Using an Entity Behavior Profile When Performing Human-Centric Risk Modeling Operations

#134
20240169071
2024-05-23

DEVICE RISK-BASED TRUSTED DEVICE VERIFICATION AND REMOTE ACCESS PROCESSING SYSTEM

#135
20240169070
2024-05-23

INFORMATION ANALYSIS APPARATUS, INFORMATION ANALYSIS METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

#136
20240169069
2024-05-23

METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATION

#137
20240169068
2024-05-23

A CYBERSECURITY VULNERABILITY MANAGEMENT SYSTEM AND METHOD THEREOF

#138
20240169067
2024-05-23

TESTING DEVICE, TESTING METHOD, AND TESTING PROGRAM

#139
20240160748
2024-05-16

Method And System For Data Flow Monitoring To Identify Application Security Vulnerabilities And To Detect And Prevent Attacks

#140
20240160747
2024-05-16

SYSTEMS AND METHODS FOR IDENTIFYING DATA PROCESSING ACTIVITIES BASED ON DATA DISCOVERY RESULTS

#141
20240160746
2024-05-16

ANALYSIS CONDITION GENERATING APPARATUS, ANALYSIS SYSTEM, ANALYSIS CONDITION GENERATING PROGRAM, ANALYSIS PROGRAM, ANALYSIS CONDITION GENERATING METHOD, AND ANALYSIS METHOD

#142
20240160745
2024-05-16

TESTING OF SECURITY SYSTEMS IN INTEGRATED CIRCUITS

#143
20240160744
2024-05-16

IDENTIFYING AND ASSESSING COSTS ASSOCIATED WITH CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS

#144
20240160727
2024-05-16

Detecting anomalous Application Programming Interface (API) behaviors

#145
20240160726
2024-05-16

RESOURCE CONSERVATION SYSTEM FOR SCALABLE IDENTIFICATION OF A SUBSET OF INPUTS FROM AMONG A GROUP OF INPUTS THAT CONTRIBUTED TO AN OUTPUT

#146
20240154989
2024-05-09

SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE

#147
20240152627
2024-05-09

Method for Determining the Integrity of a Data Processing Operation, Device, and Data Processing Installations

#148
20240152626
2024-05-09

Security Event Modeling and Threat Detection Using Behavioral, Analytical, and Threat Intelligence Attributes

#149
20240152625
2024-05-09

Locating Potentially-Exploitable Software Dependencies

#150
20240152624
2024-05-09

VULNERABILITY REDUCTION FOR SYNTACTICALLY INCOMPLETE CODE

#151
20240152623
2024-05-09

System and Method for Evaluating Penetration Testing Tools

#152
20240152622
2024-05-09

SYSTEM AND METHOD FOR SCORING SECURITY ALERTS INCORPORATING ANOMALY AND THREAT SCORES

#153
20240152599
2024-05-09

SYSTEMS AND METHODS FOR MANAGING MULTIPLE VALID ONE TIME PASSWORD (OTP) FOR A SINGLE IDENTITY

#154
20240152354
2024-05-09

SELF-HEALING LEARNING SYSTEM FOR ONE OR MORE CONTROLLERS

#155
20240143912
2024-05-02

SYSTEM AND METHOD FOR IMPLEMENTING TECHNOLOGY INFRASTRUCTURE UPGRADES USING AN AUTOMATED ELECTRONIC DATA AGGREGATION TOOL

#156
20240143788
2024-05-02

MODULAR SECURITY EVALUATION OF SOFTWARE ON DEVICES

#157
20240143787
2024-05-02

MATCHING SOFTWARE SYSTEMS WITH USERS FOR IDENTIFYING SYSTEM DEFECTS

#158
20240143786
2024-05-02

SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTING

#159
20240143785
2024-05-02

SYSTEM AND METHOD FOR EVALUATING AN ORGANIZATION'S RISK FOR EXPOSURE TO CYBER SECURITY EVENTS

#160
20240143784
2024-05-02

METHOD, APPARATUS, SYSTEM, AND COMPUTER PROGRAM FOR MANAGING SOFTWARE COMPONENT

#161
20240143781
2024-05-02

SYSTEMS, DEVICES, AND METHODS FOR ANALYZING RANSOMWARE THREAT INTELLIGENCE

#162
20240143780
2024-05-02

SUPPORTING SECURE WORKSPACES IN HETEROGENOUS ENVIRONMENTS

#163
20240143779
2024-05-02

SECURE PEER-TO-PEER FILE DISTRIBUTION IN AN ENTERPRISE ENVIRONMENT

#164
20240143778
2024-05-02

Input validation using mathematical expressions

#165
20240143777
2024-05-02

INSTRUMENTING OBSERVABILITY CONTROLS

#166
20240143776
2024-05-02

VULNERABILITY MANAGEMENT FOR DISTRIBUTED SOFTWARE SYSTEMS

#167
20240143775
2024-05-02

AUTOMATED GENERATION OF ADAPTIVE-SECURITY AND COMPLIANCE-AWARE DISTRIBUTED SOFTWARE DELIVERY PIPELINES

#168
20240143774
2024-05-02

ATTRIBUTE BASED DATA ACCESS CONTROL

#169
20240143751
2024-05-02

APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION

#170
20240143739
2024-05-02

INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS

#171
20240143735
2024-05-02

DATA MANAGEMENT USING SECURE BROWSERS

#172
20240135035
2024-04-25

SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK

#173
20240135005
2024-04-25

SEMICONDUCTOR DEVICE AND METHOD OF MANAGING SECRET INFORMATION

#174
20240135004
2024-04-25

SYSTEMS AND METHODS FOR CYBERTHREAT-RISK EDUCATION AND AWARENESS

#175
20240135003
2024-04-25

METHOD AND DEVICE FOR BUILDING VULNERABILITY DATABASE

#176
20240135002
2024-04-25

SYSTEMS AND METHODS FOR AGGREGATED VULNERABILITY PROOFING OF AN IHS

#177
20240135001
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING MACHINE LEARNING RECOMMENDATIONS

#178
20240135000
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING INTERDEPENDENT IHS COMPONENTS

#179
20240134999
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING DURING IHS PROVISIONING

#180
20240134998
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS

#181
20240134997
2024-04-25

SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING

#182
20240134996
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN USING A BOOTABLE IMAGE

#183
20240134995
2024-04-25

SYSTEMS AND METHODS FOR CONTEXT-AWARE VULNERABILITY RISK SCORES

#184
20240134994
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN GENERATING IHS UPDATES

#185
20240134993
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN UPDATING AN IHS

#186
20240134992
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN BOOTING AN IHS

#187
20240134991
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN ADDING AND REPLACING IHS HARDWARE

#188
20240134990
2024-04-25

MONITORING AND REMEDIATION OF CYBERSECURITY RISK BASED ON CALCULATION OF CYBER-RISK DOMAIN SCORES

#189
20240134979
2024-04-25

Systems and Methods for API Security Integration

#190
20240134728
2024-04-25

SYSTEMS AND METHODS FOR PREDICTING WHICH SOFTWARE VULNERABILITIES WILL BE EXPLOITED BY MALICIOUS HACKERS TO PRIORITIZE FOR PATCHING

#191
20240134636
2024-04-25

Software Composition Analysis on Target Source Code

#192
20240129342
2024-04-18

INTEGRATED SECURITY AND THREAT PREVENTION AND DETECTION PLATFORM

#193
20240126918
2024-04-18

TECHNIQUES FOR DATA CLASSIFICATION AND FOR PROTECTING CLOUD ENVIRONMENTS FROM CYBERSECURITY THREATS USING DATA CLASSIFICATION

#194
20240126917
2024-04-18

AUTOMATED REMEDIATION OF EXPOSED SECRETS

#195
20240126910
2024-04-18

PROVIDING A GRAPHICAL REPRESENTATION OF ANOMALOUS EVENTS

#196
20240126897
2024-04-18

ACCESS CONTROL METHOD AND RELATED APPARATUS

#197
20240126892
2024-04-18

System and Method for Displaying a Scalable Cyber-Risk Assessment of a Computer System

#198
20240126891
2024-04-18

Predicting and Quantifying Weaponization of Software Weaknesses

#199
20240126890
2024-04-18

APPARATUS FOR VERIFYING SOFTWARE INTEGRITY OF VEHICLE CONTROLLER AND METHOD THEREOF

#200
20240126889
2024-04-18

THREAT DETECTION AND MITIGATION IN A NETWORKED ENVIRONMENT

#201
20240126888
2024-04-18

SYSTEMS AND METHODS FOR INTRODUCING DATA QUALITY AWARENESS IN SECURITY ANALYTICS SOLUTIONS

#202
20240126883
2024-04-18

MEASURING CONTAINERS

#203
20240126878
2024-04-18

SCANNING OF PARTIAL DOWNLOADS

#204
20240126871
2024-04-18

VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTS

#205
20240121265
2024-04-11

Authoritative Domain Name System (DNS) Server Responding to DNS Requests With IP Addresses Selected from a Larger Pool Of IP Addresses

#206
20240119161
2024-04-11

ONE OR MORE DEVICES PROVIDING IMPROVED SECURITY FOR ANY DATABASE INCLUDING DISTRIBUTED APPLICATIONS AND SMART CONTRACTS

#207
20240119160
2024-04-11

GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE

#208
20240119159
2024-04-11

Automated Software Code Validation and Deployment

#209
20240119140
2024-04-11

A SYSTEM AND METHODS FOR SANDBOXED SOFTWARE ANALYSIS WITH AUTOMATED VULNERABILITY DETECTION AND PATCH DEVELOPMENT, DEPLOYMENT AND VALIDATION

#210
20240114042
2024-04-04

METHOD AND SYSTEM FOR ANALYZING CYBERSECURITY THREATS AND IMPROVING DEFENSIVE INTELLIGENCE

#211
20240113940
2024-04-04

EVALUATION OF SECURITY RISK BASED ON COMPARING DATA FOR NEW SOFTWARE APPLICATIONS TO HISTORICAL APPLICATION DATA

#212
20240111878
2024-04-04

COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE, AND METHOD PERFORMED BY COMMUNICATION DEVICE

#213
20240111877
2024-04-04

DELIVERING AUGMENTED THREAT ASSESSMENT VALUES TO A SECURITY THREAT MANAGEMENT FACILITY

#214
20240111876
2024-04-04

K-ANONYMOUS VULNERABILITY DETECTION

#215
20240111875
2024-04-04

TRANSPARENT WEB CONTENT VALIDATION TREE

#216
20240111874
2024-04-04

Asset Grouping Rules for Vulnerability Detection and Management in IT Systems

#217
20240111873
2024-04-04

Determining Trend Records for Vulnerability Detection and Management in IT Systems

#218
20240111870
2024-04-04

Systems and Methods For Protecting Against Malware Attacks

#219
20240111869
2024-04-04

METHODS AND APPARATUS TO DISABLE SELECT PROCESSES FOR MALWARE PREVENTION

#220
20240111862
2024-04-04

DETECTING AND RESPONDING TO ENVIRONMENTAL CONDITION-INDUCED SECURITY ATTACKS ON SEMICONDUCTOR PACKAGES

#221
20240111613
2024-04-04

METHOD FOR GENERATING AND EXECUTING A DATA PROCESSING PIPELINE

#222
20240111512
2024-04-04

RECOMMENDING VERSION UPDATES FOR SOFTWARE PACKAGES

#223
20240104221
2024-03-28

AUTOMATED TESTING OF OPERATING SYSTEM (OS) KERNEL HELPER FUNCTIONS ACCESSIBLE THROUGH EXTENDED BPF (eBPF) FILTERS

#224
20240104220
2024-03-28

COMPUTER SYSTEM AND EVALUATION METHOD FOR CYBER SECURITY INFORMATION

#225
20240098101
2024-03-21

CLOUD SCANNER WITH DATABASE SCHEMA DETECTION

#226
20240095373
2024-03-21

COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATION

#227
20240095372
2024-03-21

OFFLINE PLATFORM INFORMATION TECHNOLOGY CYBER-PHYSICAL RISK MITIGATION

#228
20240095371
2024-03-21

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

#229
20240095370
2024-03-21

PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS

#230
20240095369
2024-03-21

MONITORING SECURITY RISK OF A COMPUTING DEVICE

#231
20240095368
2024-03-21

AUTOMATED TRUST CENTER FOR REAL-TIME SECURITY AND COMPLIANCE MONITORING

#232
20240095367
2024-03-21

VERIFYING ENCRYPTION OF DATA TRAFFIC

#233
20240095344
2024-03-21

COMPUTER IMPLEMENTED METHOD

#234
20240089298
2024-03-14

SYSTEM FOR PROCESSING CONTENT IN SCAN AND REMEDIATION PROCESSING

#235
20240089121
2024-03-14

SYSTEMS AND METHODS FOR DIGITAL CERTIFICATE SECURITY

#236
20240086548
2024-03-14

ANOMALY DETECTION SYSTEM, ANOMALY DETECTION METHOD, AND RECORDING MEDIUM

#237
20240086547
2024-03-14

METHOD AND SYSTEM FOR PATCHING WEBSITES RUNNING IN A .NET FRAMEWORK ENVIRONMENT

#238
20240086546
2024-03-14

MEDIA PRIVACY WITHOUT COMPROMISING MONITORING EFFECTIVENESS

#239
20240086521
2024-03-14

Vertically Integrated Automatic Threat Level Determination For Containers And Hosts In A Containerization Environment

#240
20240080327
2024-03-07

CONTEXT PROFILING FOR MALWARE DETECTION

#241
20240078320
2024-03-07

METHOD AND APPARATUS OF ANOMALY DETECTION OF SYSTEM LOGS BASED ON SELF-SUPERVISED LEARNING

#242
20240078319
2024-03-07

EBPF-BASED HOT PATCH ENGINE DEVICE FOR PROTECTING KERNEL VULNERABILITIES, SYSTEM AND METHOD INCLUDING THE SAME

#243
20240078318
2024-03-07

TRANSFER ANOMALY DETECTION USING ONLINE DEEP SETS

#244
20240078309
2024-03-07

SYSTEMS AND METHODS FOR MONITORING A PLURALITY OF VEHICLES

#245
20240078161
2024-03-07

GENERATION OF A BUSINESS ENVIRONMENT EVALUATION REGARDING A SYSTEM ASPECT OF A SYSTEM

#246
20240070293
2024-02-29

ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS

#247
20240070292
2024-02-29

Computing Platform for the Secure Execution of Penetration Tests and for the Secure Validation of Cybersecurity of Computer Resources of Embedded Systems

#248
20240070290
2024-02-29

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND SYSTEM

#249
20240070289
2024-02-29

SOFTWARE VULNERABILITY REMEDIATION

#250
20240070288
2024-02-29

MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT

#251
20240070287
2024-02-29

FASTER WEB APPLICATION SCANS OF WEB PAGE DATA BASED ON DEDUPLICATION

#252
20240070286
2024-02-29

SUPERVISED ANOMALY DETECTION IN FEDERATED LEARNING

#253
20240070276
2024-02-29

MALWARE SCANS

#254
20240061940
2024-02-22

SCANNING A BACKUP FOR VULNERABILITIES

#255
20240061939
2024-02-22

THREAT CHANGE ANALYSIS SYSTEM

#256
20240054234
2024-02-15

METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING

#257
20240054233
2024-02-15

Device, System, and Method for Protecting Machine Learning (ML) Units, Artificial Intelligence (AI) Units, Large Language Model (LLM) Units, and Deep Learning (DL) Units

#258
20240054232
2024-02-15

BUILD PROCESS SECURITY FRAMEWORK

#259
20240054231
2024-02-15

CLOUD-AGNOSTIC CODE ANALYSIS

#260
20240054230
2024-02-15

ELECTRONIC SYSTEM FOR SECURITY ANALYSIS AND VALIDATION DURING CONSTRUCTION AND DEPLOYMENT OF DYNAMIC NETWORK COMPONENTS

#261
20240054229
2024-02-15

TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS

#262
20240054228
2024-02-15

TECHNIQUES FOR TECHNOLOGY STACK DISCOVERY USING EXTERNAL EXPOSURE IN CLOUD ENVIRONMENTS

#263
20240054227
2024-02-15

IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY

#264
20240054226
2024-02-15

Hierarchical health index evaluation method and apparatus for intelligent substation

#265
20240054225
2024-02-15

INTELLIGENT SERVICE SECURITY ENFORCEMENT SYSTEM

#266
20240053973
2024-02-15

DEPLOYABLE CONTAINER SCHEDULING AND EXECUTION ON CLOUD DEVELOPMENT ENVIRONMENT

#267
20240045974
2024-02-08

TESTING ADVERSARIAL ROBUSTNESS OF SYSTEMS WITH LIMITED ACCESS

#268
20240045973
2024-02-08

SYMBOL NARROWING-DOWN APPARATUS, PROGRAM ANALYSIS APPARATUS, SYMBOL EXTRACTION METHOD, PROGRAM ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

#269
20240045972
2024-02-08

BUILDING MANAGEMENT SYSTEM WITH CYBER HEALTH DASHBOARD

#270
20240045971
2024-02-08

SCALABLE SOURCE CODE VULNERABILITY REMEDIATION

#271
20240045949
2024-02-08

INFORMATION COLLECTION CONTROL APPARATUS, INFORMATION COLLECTION SYSTEM, INFORMATION COLLECTION CONTROL METHOD, AND INFORMATION COLLECTION CONTROL PROGRAM

#272
20240045668
2024-02-08

ORCHESTRATOR REPORTING OF PROBABILITY OF DOWNTIME FROM MACHINE LEARNING PROCESS

#273
20240037266
2024-02-01

ACTIVITY-BASED CONTENT OBJECT ACCESS PERMISSIONS

#274
20240037248
2024-02-01

ARTIFICIAL INTELLIGENCE ARCHITECTURE FOR MANAGING MULTI-STAGE PROCESSES

#275
20240037247
2024-02-01

SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACE FOR BROWSER DATA PROTECTION

#276
20240037246
2024-02-01

SYSTEMS AND METHODS FOR COMBATING ONLINE SECURITY RISKS

#277
20240037245
2024-02-01

VULNERABILITY RISK PREDICTION ENGINE

#278
20240037244
2024-02-01

METHOD FOR PROVIDING SECURITY POSTURE, FUNCTIONAL UPDATES FOR ENTERPRISE ITDM

#279
20240037243
2024-02-01

ARTIFICIAL INTELLIGENCE BASED SECURITY REQUIREMENTS IDENTIFICATION AND TESTING

#280
20240037242
2024-02-01

INTELLIGENT PRE-BOOT INDICATORS OF VULNERABILITY

#281
20240037235
2024-02-01

Systems, Methods and Devices for Memory Analysis and Visualization

#282
20240036857
2024-02-01

DETECTING ANOMALIES ONLINE USING CONTROLLER PROCESSING ACTIVITY

#283
20240031377
2024-01-25

REAL-TIME SCANNING OF IP ADDRESSES

#284
20240028746
2024-01-25

EXPLOIT DETECTION VIA INDUCED EXCEPTIONS

#285
20240028745
2024-01-25

SYSTEM AND METHOD FOR HUNT, INCIDENT RESPONSE, AND FORENSIC ACTIVITIES ON AN AGNOSTIC PLATFORM

#286
20240028744
2024-01-25

Dynamic network risk predicting method based on a graph neural network

#287
20240028743
2024-01-25

CONTROL FLOW INTEGRITY INSTRUCTION POINTER PATCHING

#288
20240028742
2024-01-25

LEARNED CONTROL FLOW MONITORING AND ENFORCEMENT OF UNOBSERVED TRANSITIONS

#289
20240028741
2024-01-25

CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS

#290
20240028740
2024-01-25

SOURCE CODE VULNERABILITY DETECTION AND REPAIR THROUGH MACHINE LEARNING

#291
20240028739
2024-01-25

PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESS

#292
20240028716
2024-01-25

METHOD AND APPARATUS FOR CREATING A MALWARE DETECTION DATASET

#293
20240028501
2024-01-25

VULNERABILITY DETECTION METHOD AND DEVICE

#294
20240028321
2024-01-25

METHOD AND SYSTEM FOR EXECUTING AN APPLICATION UPGRADE USING NETWORK SLICING

#295
20240020428
2024-01-18

METHODS AND APPARATUS FOR SYSTEM FIREWALLS

#296
20240020417
2024-01-18

SYSTEMS AND METHODS FOR FEDERATED FEEDBACK AND SECURE MULTI-MODEL TRAINING WITHIN A ZERO-TRUST ENVIRONMENT

#297
20240020391
2024-01-18

LOG-BASED VULNERABILITIES DETECTION AT RUNTIME

#298
20240020390
2024-01-18

VULNERABILITY ASSESSMENT OF MACHINE IMAGES IN DEVELOPMENT PHASE

#299
20240020389
2024-01-18

FUZZING GUIDED BINARY HARDENING

#300
20240020212
2024-01-18

SYSTEMS AND METHODS FOR MODERNIZING WORKSPACE AND HARDWARE LIFECYCLE MANAGEMENT IN AN ENTERPRISE PRODUCTIVITY ECOSYSTEM