Shape Security, Inc.

États‑Unis d’Amérique


 
Quantité totale PI 173
Rang # Quantité totale PI 7 298
Note d'activité PI 2,8/5.0    97
Rang # Activité PI 7 213
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

112 8
2 7
35 8
1
 
Dernier brevet 2024 - Detecting malicious scripts in a...
Premier brevet 2012 - System for finding code in a dat...
Dernière marque 2020 - SHAPE DEFENSE
Première marque 2014 - SHAPE SECURITY

Industrie (Classification de Nice)

Derniers inventions, produits et services

2023 Invention Detecting malicious scripts in a web page. Techniques are provided for detecting a malicious scr...
2022 Invention Code modification for detecting abnormal activity. Techniques for code modification for detectin...
2021 Invention Mitigating malicious client-side scripts. Technology related to detecting and/or mitigating malic...
Invention Detecting compromised credentials in a credential stuffing attack. Techniques are provided for d...
2020 Invention Security measures for extended sessions using multi-domain data. A security server device, method...
P/S Computer software as a service (SAAS) services featuring software for use by others for detectin...
Invention Facilitating secure client data transfer. This technology receive first telemetry data collected ...
Invention Methods for security and privacy-enforced affinity scoring and devices thereof. This technology m...
Invention Methods for automatically preventing data exfiltration and devices thereof. Methods, non-transito...
Invention Obfuscating programs using different instruction set architectures. Technology related to obfusca...
P/S Computer software as a service (SaaS) services featuring software for use by others for detectin...
Invention Advanced interstitial techniques for web security. A method non-transitory computer readable medi...
Invention Detecting malicious scripts in a web page. Techniques are provided for detecting a malicious scri...
Invention Security scoring based on multi domain telemetry data. A method, non-transitory compute r readabl...
Invention Detecting compromised credentials by improved private set intersection. In an embodiment, a metho...
Invention Deterministic reproduction of system state using seeded pseudo-random number generators. Compute...
2019 Invention Flexible caching. Techniques are provided for flexible caching.
Invention Security code for integration with an application. Techniques are provided for security code for ...
Invention Delayed serving of protected content. Techniques are described for delayed serving of protected c...
Invention Request modification for web security challenge. Techniques are provided for request modification...
Invention Code modification for detecting abnormal activity. Techniques for code modification for detecting...
Invention Detecting compromised web pages in a runtime environment. Techniques are provided for detecting ...
Invention Decision tree training using a database system. In an embodiment, a method for training a decisio...
Invention Execution of trained neural networks using a database system. In an embodiment, a computer-implem...
P/S Computer software as a service (saas) services featuring software for use by others for detecting...
P/S Computer software as a service (SAAS) services featuring software for use by others for detecting...
Invention Proof-of-work based on runtime compilation. Techniques are provided for proof-of-work based on ru...
P/S Computer software as a service (SAAS) services featuring software for use by others featuring sof...
Invention Mitigating attacks on server computers by enforcing platform policies on client computers. In an...
Invention Mitigating security vulnerabilities in web content. Methods and apparatus are described for auto...
Invention Using individualized apis to block automated attacks on native apps and/or purposely exposed apis...
Invention Polymorphic obfuscation of executable code. This document generally relates to systems, method, ...
Invention Evaluating and modifying countermeasures based on aggregate transaction status. Techniques are pr...
Invention Quarantining malicious injected code. Methods and apparatus are described for quarantining malic...
Invention Security systems for mitigating attacks from a headless browser executing on a client computer. C...
Invention Authenticated bypass of default security countermeasures. Techniques for authenticated bypass of...
Invention Detecting and deploying countermeasures against an autonomous browser. A computer system configu...
P/S Computer software as a service (SAAS) services featuring software for use by others featuring so...
Invention Systems for detecting a headless browser executing on a client computer. In an embodiment, a comp...
Invention Count-based challenge-response credential pairs for client/server request validation. A server c...
2018 Invention Deterministic reproduction of client/server computer state or output sent to one or more client c...
Invention Split serving of computer code. A computer-implemented method for securing a content server syste...
Invention Intercepting and injecting calls into operations and objects. A computer implemented method for ...
Invention Security policy for browser extensions. Techniques are provided for a security policy for browser...
Invention Using instrumentation code to detect bots or malware. Techniques are provided for using instrume...
Invention Stateless web content anti-automation. A computer-implemented method for coordinating content tr...
Invention Decision tree training using a database system. In an embodiment, a computer-implemented method f...
Invention Execution of trained neural networks using a database system. In an embodiment, a computer-imple...
Invention Reputation tracking based on token exchange. Techniques are provided for reputation tracking bas...
Invention Detection of malicious activity using behavior data. Techniques are provided for detection of mal...
2017 Invention Unsupervised and supervised machine learning approaches to detecting bots and other types of brow...
2016 Invention Caching for re-coding techniques. This document describes, among other things, a computer-impleme...
Invention Deterministic reproduction of system state using seeded pseudo-random number generators. Computer...