2022
|
Invention
|
Systems and methods for protecting user data privacy against anti-tracking evasion techniques for... |
2021
|
Invention
|
Systems and methods for enhancing user privacy. The disclosed computer-implemented method for enh... |
|
Invention
|
Systems and methods for protecting against misleading clicks on websites. The disclosed computer-... |
|
Invention
|
Systems and methods for identifying software vulnerabilities in embedded device firmware. The dis... |
2017
|
Invention
|
Multi-second factor authentication. A method for securing and authorizing sensitive operations is... |
|
Invention
|
Systems and methods for maintaining encrypted search indexes on third-party storage systems. A co... |
2015
|
Invention
|
Using confidence about user intent in a reputation system.
Reputations of objects are determined... |
2014
|
Invention
|
Systems and methods for searching shared encrypted files on third-party storage systems. A comput... |
|
Invention
|
Systems and methods for securing data at third-party storage services. A computer-implemented met... |
2013
|
Invention
|
Using telemetry to reduce malware definition package size. Clients send telemetry data to a cloud... |
|
Invention
|
Secure app ecosystem with key and data exchange according to enterprise information control polic... |
|
Invention
|
Techniques for providing dynamic account and device management. Techniques for providing data in ... |
2012
|
Invention
|
Systems and methods for determining authorship of an unclassified notification message. A compute... |
|
Invention
|
Cluster wide consistent detection of interconnect failures. The failure of a specific link of a s... |
2011
|
Invention
|
Automatic user authentication, online checkout and electronic payments via mobile communication d... |
|
Invention
|
Method and device for providing improved perpetrator imaging. Techniques for providing improved p... |
|
Invention
|
Data loss monitoring of partial data streams. A method for detecting loss of sensitive informatio... |
2010
|
Invention
|
Applications processing in a network apparatus. A method and system for distributing flows betwee... |
|
Invention
|
Safely updating latent applications to reduce attack surface.
Executable content on an endpoint ... |
|
Invention
|
Adaptive user interface and application features based on user experience level. The behavior of ... |
|
G/S
|
Fraud detection and prevention services in the nature of
arranging secure authentication of pers... |
2009
|
Invention
|
Accelerated tcp network communications. The present invention relates to an accelerated process a... |
|
Invention
|
Just in time trust establishment and propagation. Trust relationships in an online service system... |
|
Invention
|
Deriving the content of a social network private site based on friend analysis. Content of a priv... |
2008
|
Invention
|
Apparatus and method for processing fragmented cryptographic keys.
A system includes a set of pr... |
|
Invention
|
Apparatus and method for secure administrator access to networked machines.
A secure access meth... |
|
Invention
|
Apparatus and method for preventing unauthorized access to secure information.
A computer readab... |
|
Invention
|
Control of website usage via online storage of restricted authentication credentials.
A client c... |
2007
|
Invention
|
Balanced consistent hashing for distributed resource management. A method, system, computer-reada... |
|
Invention
|
Apparatus and method for facilitating secure email services using multiple protocols.
A computer... |
|
Invention
|
Web site authentication. A web site can be authenticated by a third party authentication service.... |
|
Invention
|
Apparatus and method for cryptographic protection of directories and files.
A computer readable ... |
|
Invention
|
Certificate management system.
A system and method for generating and storing a large number of ... |
|
Invention
|
Time and event based one time password. A system and method for generating a One Time Password (O... |
|
Invention
|
Web services intermediary.
A proxy operates as an interface between application programs and web... |
|
Invention
|
Realtime feature adaptation responsive to dynamically gathered usability information. Application... |
|
Invention
|
System and method for network-based fraud and authentication services. A system and method for pr... |
2006
|
Invention
|
Heuristic detection and termination of fast spreading network worm attacks.
Methods, apparati, a... |
|
Invention
|
Adaptive liveness management for robust and efficient peer-to-peer storage. A peer-to-peer storag... |
|
Invention
|
Distributed platform for testing filtering rules. A distributed testing platform tests network tr... |
2005
|
Invention
|
Cost control system for access to mobile services. The cost control module 120 controls costs ass... |
|
Invention
|
Method and apparatus for network packet capture distributed storage system. This is invention com... |
|
Invention
|
Associating licensing information with software applications.
A license control module manages t... |
|
Invention
|
An algorithm to create and validate a one time password. A token calculates a one time password b... |
|
Invention
|
Automatically deriving order of initialization for computing services across multiple computing s... |
|
Invention
|
Methods and systems for detecting and preventing the spread of malware on instant messaging (im) ... |
|
Invention
|
System and method for building instant messaging applications.
Systems, methods and mediums for ... |
|
Invention
|
Systems and methods for creating and/or utilizing virtual automated agents.
The present inventio... |
|
Invention
|
Dynamic frame buster injection. A parsing module receives a web page from a network. The parsing ... |
2002
|
Invention
|
Detecting and breaking cycles in a computer network. Various embodiments of a system and method r... |