Loading...
Docoh

Proofpoint (PFPT)

Utility
Methods and systems for security analysis of applications on mobile devices brought into an enterprise network environment
17 May 22
Application security analysis including systems and methods for analyzing applications for risk is provided.
David Alexander Jevans, Suresh Kumar Basandra
Filed: 30 Dec 19
Utility
Executing Real-time Message Monitoring to Identify Potentially Malicious Messages and Generate Instream Alerts
12 May 22
Aspects of the disclosure relate to identifying potentially malicious messages and generating instream alerts based on real-time message monitoring.
Thomas Lee
Filed: 26 Jan 22
Utility
Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters
5 May 22
Aspects of the disclosure relate to detecting and protecting against cybersecurity attacks using unprintable tracking characters.
Thomas Lee
Filed: 19 May 21
Utility
Bulk Messaging Detection and Enforcement
5 May 22
Aspects of the disclosure relate to providing commercial and/or spam messaging detection and enforcement.
Thomas Lee, Sarah Solieman
Filed: 23 Jun 21
Utility
Detecting and Preventing Transmission of Spam Messages Using Modified Source Numbers
5 May 22
Aspects of the disclosure relate to detecting and preventing transmission of spam messages using modified source numbers.
Thomas Lee
Filed: 19 May 21
Utility
Secure URL Shortener For Character-Limited Messages
5 May 22
Aspects of the disclosure relate to providing secure shortened URLs in character-limited messages.
Thomas Lee
Filed: 4 Mar 21
Utility
Dynamically Injecting Security Awareness Training Prompts Into Enterprise User Flows
28 Apr 22
Aspects of the disclosure relate to dynamic cybersecurity event detection and training functions.
Sathish Krishna Raju, Sriram Ganesh
Filed: 12 Mar 21
Utility
Using Signed Tokens to Verify Short Message Service (SMS) Message Bodies
28 Apr 22
Aspects of the disclosure relate to message verification.
Thomas Lee, Kevin San Diego
Filed: 1 Oct 21
Utility
Assessing security risks of users in a computing network
19 Apr 22
Various embodiments assess security risks of users in computing networks.
Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
Filed: 24 Jun 20
Utility
Domain Name Processing Systems and Methods
24 Mar 22
Disclosed is a domain filter capable of determining an n-gram distance between a seed domain and each of a plurality of candidate domains.
Harold Nguyen, Ali Mesdaq, Kevin Dedon, Michael Fox, Gaurav Dalal
Filed: 1 Dec 21
Utility
Systems and Methods for Discovering Social Accounts
17 Mar 22
Methods and systems allow organizations to discover accounts, subscriptions, properties, sites and other online portals within each distinct social network platform and across disparate social network platforms, publishing platforms and networks that represent, claim to represent or are relevant to their organization and/or brands based on search terms and facilitate the statistical reporting and analysis of activities on the discovered properties.
Devin Redmond, Ray Kruck, Richard Sutton, Anthony Dorie
Filed: 29 Nov 21
Utility
Context Based Authorized External Device Copy Detection
17 Mar 22
A system and method monitors access of an external storage device connected to a target device.
Boris Traktirnik, Liliya Anissimov, Gabriel Kalmar, Nir Barak, Ariel Lemelson
Filed: 3 Jan 20
Utility
Detecting Paste and Other Types of User Activities In Computer Environment
10 Mar 22
A computer-based method includes: receiving an indication from a computer's operating system that a user has performed a first action that may have caused a context menu with a paste option to open on a screen of the computer, and subsequently receiving an indication from the computer's operating system that the user has performed a second action at the computer that may have amounted to a selection of the paste option on the context menu.
Guy Ziv, Doron Seijffers, Nir Barak, Lior Tal
Filed: 3 Jan 20
Utility
System and Method for Scalable File Filtering Using Wildcards
10 Mar 22
A system monitors access to a computer file via a dynamically changeable non¬ heterogeneous collection load balanced across two hash tables.
Alex Kortney, Nir Barak
Filed: 3 Jan 20
Utility
Domain Name Processing Systems and Methods
10 Mar 22
A domain processing system is enhanced with a first-pass domain filter configured for loading character strings representing a pair of domains consisting of a seed domain and a candidate domain in a computer memory, computing a similarity score and a dynamic threshold for the pair of domains, determining whether the similarity score exceeds the dynamic threshold, and iterating the loading, the computing, and the determining for each of a plurality of candidate domains paired with the seed domain.
Hung-Jen Chang, Ali Mesdaq, Gaurav Dalal, Kevin Dedon
Filed: 25 Mar 21
Utility
Executing real-time message monitoring to identify potentially malicious messages and generate instream alerts
8 Mar 22
Aspects of the disclosure relate to identifying potentially malicious messages and generating instream alerts based on real-time message monitoring.
Thomas Lee
Filed: 19 Sep 19
Utility
Processing External Messages Using a Secure Email Relay
3 Mar 22
Aspects of the disclosure relate to processing external messages using a secure email relay.
Ashley Harlow Valeski
Filed: 3 May 21
Utility
Using Neural Networks to Process Forensics and Generate Threat Intelligence Information
3 Mar 22
Aspects of the disclosure relate to generating threat intelligence information.
Zachary Mitchell Abzug, Kevin Patrick Blissett, Brian Sanford Jones
Filed: 25 Jun 21
Utility
Classifying social entities and applying unique policies on social entities based on crowd-sourced data
15 Feb 22
Technology is disclosed for detecting, classifying, and/or enforcing rules on social networking activity.
Richard Banks Sutton, Daniel Oshiro Nadir, Devin Hugh Redmond, Harold Nguyen, Anthony Lawrence Dorie, Jorge Iriso, Wenchang Yan
Filed: 12 Nov 19
Utility
Domain Name Classification Systems and Methods
3 Feb 22
Disclosed is a domain engineering analysis solution that determines relevance of a domain name to a brand name in which a domain name, brand name, and identification of a substring of the domain name may be provided to or obtained by a computer embodying a domain engineering analyzer.
Sharon Huffner, Ali Mesdaq
Filed: 13 Oct 21
Patents are sorted by USPTO publication date, most recent first