2023
|
Invention
|
Detecting malicious scripts in a web page.
Techniques are provided for detecting a malicious scr... |
2022
|
Invention
|
Code modification for detecting abnormal activity.
Techniques for code modification for detectin... |
2021
|
Invention
|
Mitigating malicious client-side scripts. Technology related to detecting and/or mitigating malic... |
|
Invention
|
Detecting compromised credentials in a credential stuffing attack.
Techniques are provided for d... |
2020
|
Invention
|
Security measures for extended sessions using multi-domain data. A security server device, method... |
|
P/S
|
Computer software as a service (SAAS) services featuring
software for use by others for detectin... |
|
Invention
|
Facilitating secure client data transfer. This technology receive first telemetry data collected ... |
|
Invention
|
Methods for security and privacy-enforced affinity scoring and devices thereof. This technology m... |
|
Invention
|
Methods for automatically preventing data exfiltration and devices thereof. Methods, non-transito... |
|
Invention
|
Obfuscating programs using different instruction set architectures. Technology related to obfusca... |
|
P/S
|
Computer software as a service (SaaS) services featuring
software for use by others for detectin... |
|
Invention
|
Advanced interstitial techniques for web security. A method non-transitory computer readable medi... |
|
Invention
|
Detecting malicious scripts in a web page. Techniques are provided for detecting a malicious scri... |
|
Invention
|
Security scoring based on multi domain telemetry data. A method, non-transitory compute r readabl... |
|
Invention
|
Detecting compromised credentials by improved private set intersection. In an embodiment, a metho... |
|
Invention
|
Deterministic reproduction of system state using seeded pseudo-random number generators.
Compute... |
2019
|
Invention
|
Flexible caching.
Techniques are provided for flexible caching. |
|
Invention
|
Security code for integration with an application. Techniques are provided for security code for ... |
|
Invention
|
Delayed serving of protected content. Techniques are described for delayed serving of protected c... |
|
Invention
|
Request modification for web security challenge. Techniques are provided for request modification... |
|
Invention
|
Code modification for detecting abnormal activity. Techniques for code modification for detecting... |
|
Invention
|
Detecting compromised web pages in a runtime environment.
Techniques are provided for detecting ... |
|
Invention
|
Decision tree training using a database system. In an embodiment, a method for training a decisio... |
|
Invention
|
Execution of trained neural networks using a database system. In an embodiment, a computer-implem... |
|
P/S
|
Computer software as a service (saas) services featuring software for use by others for detecting... |
|
P/S
|
Computer software as a service (SAAS) services featuring software for use by others for detecting... |
|
Invention
|
Proof-of-work based on runtime compilation. Techniques are provided for proof-of-work based on ru... |
|
P/S
|
Computer software as a service (SAAS) services featuring software for use by others featuring sof... |
|
Invention
|
Mitigating attacks on server computers by enforcing platform policies on client computers.
In an... |
|
Invention
|
Mitigating security vulnerabilities in web content.
Methods and apparatus are described for auto... |
|
Invention
|
Using individualized apis to block automated attacks on native apps and/or purposely exposed apis... |
|
Invention
|
Polymorphic obfuscation of executable code.
This document generally relates to systems, method, ... |
|
Invention
|
Evaluating and modifying countermeasures based on aggregate transaction status. Techniques are pr... |
|
Invention
|
Quarantining malicious injected code.
Methods and apparatus are described for quarantining malic... |
|
Invention
|
Security systems for mitigating attacks from a headless browser executing on a client computer. C... |
|
Invention
|
Authenticated bypass of default security countermeasures.
Techniques for authenticated bypass of... |
|
Invention
|
Detecting and deploying countermeasures against an autonomous browser.
A computer system configu... |
|
P/S
|
Computer software as a service (SAAS) services featuring
software for use by others featuring so... |
|
Invention
|
Systems for detecting a headless browser executing on a client computer. In an embodiment, a comp... |
|
Invention
|
Count-based challenge-response credential pairs for client/server request validation.
A server c... |
2018
|
Invention
|
Deterministic reproduction of client/server computer state or output sent to one or more client c... |
|
Invention
|
Split serving of computer code. A computer-implemented method for securing a content server syste... |
|
Invention
|
Intercepting and injecting calls into operations and objects.
A computer implemented method for ... |
|
Invention
|
Security policy for browser extensions. Techniques are provided for a security policy for browser... |
|
Invention
|
Using instrumentation code to detect bots or malware.
Techniques are provided for using instrume... |
|
Invention
|
Stateless web content anti-automation.
A computer-implemented method for coordinating content tr... |
|
Invention
|
Decision tree training using a database system. In an embodiment, a computer-implemented method f... |
|
Invention
|
Execution of trained neural networks using a database system.
In an embodiment, a computer-imple... |
|
Invention
|
Reputation tracking based on token exchange.
Techniques are provided for reputation tracking bas... |
|
Invention
|
Detection of malicious activity using behavior data. Techniques are provided for detection of mal... |
2017
|
Invention
|
Unsupervised and supervised machine learning approaches to detecting bots and other types of brow... |
2016
|
Invention
|
Caching for re-coding techniques. This document describes, among other things, a computer-impleme... |
|
Invention
|
Deterministic reproduction of system state using seeded pseudo-random number generators. Computer... |