206 patents
Page 5 of 11
Utility
System and Method for Improving Detection of Bad Content by Analyzing Reported Content
8 Sep 22
Systems, methods and products for increasing efficiency of resource usage by determining the reliability of reporters of unwanted messages and prioritizing evaluation of messages based on the reliability scores.
Mark Stetzer, Dharmin Shah, Kehkashan Sadiq Fazal, Remy Bubulka, Luis Blando
Filed: 14 Feb 22
Utility
Hierarchical risk assessment and remediation of threats in mobile networking environment
6 Sep 22
Mobile device security techniques are described.
Ramana M. Mylavarapu, Ajay Nigam, Vipin Balkatta Hegde
Filed: 19 May 20
Utility
Neural Network Host Platform for Detecting Anomalies in Cybersecurity Modules
25 Aug 22
Aspects of the disclosure relate to anomaly detection in cybersecurity training modules.
Adam Jason
Filed: 10 May 22
Utility
Bulk messaging detection and enforcement
9 Aug 22
Aspects of the disclosure relate to providing commercial and/or spam messaging detection and enforcement.
Thomas Lee, Sarah Solieman
Filed: 23 Jun 21
Utility
Detecting Random and/or Algorithmically-Generated Character Sequences in Domain Names
4 Aug 22
Aspects of the disclosure relate to detecting random and/or algorithmically-generated character sequences in domain names.
Hung-Jen Chang, Gaurav Mitesh Dalal, Ali Mesdaq
Filed: 18 Nov 21
Utility
Systems and Methods for Ip Mass Host Verification
28 Jul 22
Systems, methods and products for identifying IP mass hosts and determining whether they are good or bad.
Bradley Scott Woodberg, Doyle Joseph Groves
Filed: 30 Mar 21
Utility
Systems and Methods for Sensor Trustworthiness
28 Jul 22
Systems, methods and products for determining the trustworthiness of anonymous sensors, including a sensor health check, a data ballpark check, a reputation comparison, and optional “last resort” procedures.
Bradley Scott Woodberg, Doyle Joseph Groves
Filed: 26 Mar 21
Utility
Apparatus and method for social account access control
12 Jul 22
A computer implemented method includes monitoring changes to an account accessible by a group of subscribers that form a social network.
Richard Banks Sutton, Anthony Lawrence Dorie, Michael Bixby Villa, Wenchang Yan, Devon Hugh Redmond, Raymond Kruck
Filed: 8 Nov 12
Utility
Systems and methods for dynamic DMARC enforcement
12 Jul 22
A dynamic Domain-based Message Authentication, Reporting, and Conformance (DMARC) enforcement solution is disclosed.
Alexander Scott Fryback, Robert Michael Fleming, Jr.
Filed: 30 Mar 20
Utility
Reduction of data transmissions based on end-user content
12 Jul 22
A computer-based method of reducing or limiting data transmissions from a computer to a remote network destination includes receiving an indication, at an agent on a computer, that a recent user activity has occurred at the computer.
Nir Barak, Alex Kremer, Tamir Pivnik, Yigal Meshulam, Igal Weinstein, Efim Kulmov
Filed: 30 Dec 20
Utility
Systems and Methods for In-process Url Condemnation
30 Jun 22
A universal resource locator (URL) collider processes a click event referencing a URL and directs a browser to a page at the URL.
Pranay Harsadbhai Patel, Juan Marcelo Da Cruz Pinto
Filed: 26 Mar 21
Utility
Assessing Security Risks of Users in a Computing Network
30 Jun 22
Various embodiments assess security risks of users in computing networks.
Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Frederick Wescoe, Jason R. Brubaker, Jason Hong
Filed: 14 Mar 22
Utility
Reduction of Data Transmissions Based on End-user Context
30 Jun 22
A computer-based method of reducing or limiting data transmissions from a computer to a remote network destination includes receiving an indication, at an agent on a computer, that a recent user activity has occurred at the computer.
Nir Barak, Alex Kremer, Tamir Pivnik, Yigal Meshulam, Igal Weinstein, Efim Kuimov
Filed: 30 Dec 20
Utility
Neural network host platform for detecting anomalies in cybersecurity modules
14 Jun 22
Aspects of the disclosure relate to anomaly detection in cybersecurity training modules.
Adam Jason
Filed: 30 Sep 20
Utility
Methods and systems for security analysis of applications on mobile devices brought into an enterprise network environment
17 May 22
Application security analysis including systems and methods for analyzing applications for risk is provided.
David Alexander Jevans, Suresh Kumar Basandra
Filed: 30 Dec 19
Utility
Executing Real-time Message Monitoring to Identify Potentially Malicious Messages and Generate Instream Alerts
12 May 22
Aspects of the disclosure relate to identifying potentially malicious messages and generating instream alerts based on real-time message monitoring.
Thomas Lee
Filed: 26 Jan 22
Utility
Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters
5 May 22
Aspects of the disclosure relate to detecting and protecting against cybersecurity attacks using unprintable tracking characters.
Thomas Lee
Filed: 19 May 21
Utility
Secure URL Shortener For Character-Limited Messages
5 May 22
Aspects of the disclosure relate to providing secure shortened URLs in character-limited messages.
Thomas Lee
Filed: 4 Mar 21
Utility
Bulk Messaging Detection and Enforcement
5 May 22
Aspects of the disclosure relate to providing commercial and/or spam messaging detection and enforcement.
Thomas Lee, Sarah Solieman
Filed: 23 Jun 21
Utility
Detecting and Preventing Transmission of Spam Messages Using Modified Source Numbers
5 May 22
Aspects of the disclosure relate to detecting and preventing transmission of spam messages using modified source numbers.
Thomas Lee
Filed: 19 May 21