2023
|
Invention
|
Machine learning model protection.
A machine learning model protection method comprising: genera... |
|
Invention
|
Method and apparatus for increasing the security of software code through execution path diversi... |
|
Invention
|
Protection of neural networks against cloning attacks.
A method of protecting an implementation ... |
|
P/S
|
Electronic and/or multi-media communication, recording, transmission, broadcasting, storage, disp... |
|
Invention
|
Fuzzy testing a software system.
A method for a testing system to perform fuzzy testing of a sof... |
2022
|
Invention
|
Systems, methods, and storage media for creating secured computer code.
Systems, methods, and st... |
|
Invention
|
Identifying, or checking integrity of, a machine-learning classification model.
A method for ide... |
|
Invention
|
Method and system for preventing and detecting security threats.
A system and method is provided... |
|
Invention
|
Secured performance of a cryptographic process.
A method of performing a cryptographic process i... |
|
Invention
|
Secured performance of an elliptic curve cryptographic process.
A method for performing an ellip... |
|
P/S
|
Downloadable computer software applications for smart phones and tablet devices, namely, software... |
|
P/S
|
Computer software applications for smart phones and tablet devices; electronic apparatus for broa... |
|
Invention
|
Systems and methods for determining execution state.
There is described a method of enabling ide... |
|
Invention
|
Systems, methods, and storage media for generating synthesized depth data.
Disclosed implementat... |
|
Invention
|
Systems, methods, and storage media for creating image data embeddings to be used for image recog... |
|
Invention
|
Secured computer code and systems, methods, and storage media for creating the secured computer c... |
|
Invention
|
Providing and managing mobile network operator profiles. SIMSIMSIM; (d) generating an MNO profile... |
|
Invention
|
Method and apparatus for policy-based management of assets. A method and system for managing shar... |
|
Invention
|
Systems and methods for keyless operation. There is provided systems and methods for operating a ... |
|
Invention
|
Securing software routines. A method of securing a software routine implemented in a software ins... |
2021
|
Invention
|
Method and system for preventing and detecting security threats. A system and method is provided ... |
|
Invention
|
Protecting an item of software.
A method for a computer to execute an item of software, the meth... |
|
Invention
|
Protected data packages. There is described a method of generating a protected data package from ... |
|
Invention
|
System and method for continuous user authentication.
Methods and systems for continuously authe... |
|
Invention
|
Obtaining a user input. There are described computer-implemented methods of obtaining a user inpu... |
|
Invention
|
Apparatus for monitoring and/or controlling mechanical equipment. vibration0vibration00, to cause... |
|
Invention
|
Systems, methods, and storage media for creating secured transformed code from input code using a... |
|
Invention
|
Systems, methods, and storage media for creating secured computer code having entangled transform... |
|
Invention
|
Fuzzy testing a software system. The disclosure is directed to a method, system and a computer re... |
2020
|
Invention
|
Securing webpages, webapps and applications. A method for securing a webpage or a webapp processe... |
|
Invention
|
Detection of modification of an item of content. A method for detection of modification of an ite... |
|
Invention
|
Device and method for gpu-based watermarking.
A method and system for watermarking content utili... |
|
Invention
|
Systems, methods, and storage media for producing verifiable protected code. Systems, methods, an... |
|
Invention
|
System and method for context-sensitive access control. Methods and systems for providing secure ... |
|
Invention
|
Biometric authentication. A method of performing biometric authentication for a first user, the m... |
|
Invention
|
Biometric authentication using two thresholds. A method of performing biometric authentication fo... |
|
Invention
|
Apparatus for monitoring and/or controlling mechanical equipment. 0, to cause relative oscillatio... |
|
Invention
|
Method and apparatus for implementing a white-box cipher. An apparatus method and computer media ... |
|
Invention
|
Systems, methods, and storage media for obfuscating a computer program by representing the contro... |
2019
|
Invention
|
Change-tolerant method of generating an identifier for a collection of assets in a computing envi... |
|
Invention
|
Method and apparatus for feedback-based piracy detection. Watermarking of a content stream is acc... |
2018
|
Invention
|
Identifying an object within content.
A method for identifying an object within a video sequence... |
|
Invention
|
System and method for watermarking software. Systems, methods, and storage media implemented by a... |
|
Invention
|
Data protection. A computer-implemented method, in which an access request in relation to data is... |
2017
|
Invention
|
Account access. A method for facilitating a user to subsequently access, via an application execu... |
2016
|
Invention
|
Software integrity verification. A method comprising, during runtime of an item of software that ... |
|
P/S
|
Computer software development for others |
|
P/S
|
Design, installation, maintenance and repair of computer software; maintenance and updating of co... |
2015
|
P/S
|
Electronic apparatus for broadcasting, recording, transmitting, and reproduction of sound and ima... |
|
P/S
|
Electronic apparatus for broadcasting, recording, transmitting, or reproduction of sound or image... |
2011
|
P/S
|
Providing electronic tracking of intellectual and industrial property assets to others. Technical... |
|
P/S
|
Providing electronic tracking of intellectual and industrial property assets to others; Technical... |
|
P/S
|
Providing electronic tracking of intellectual and industrial property assets to others Technical ... |
2010
|
P/S
|
Computers, computer chips Telecommunication services namely, transmission of voice, images, video... |
2006
|
P/S
|
Apparatus and instruments for the recording, transmission,
broadcasting, reception, storage, dis... |
2000
|
P/S
|
Computer software; computer software programs; CD-ROMS. Printed matter; manuals and brochures; in... |
1999
|
P/S
|
COMPUTER SOFTWARE USED TO PRODUCE EXECUTABLE SOFTWARE THAT IS RESISTANT TO TAMPERING AND REVERSE ... |
|
P/S
|
Computer software program used to produce executable software that is resistant to tampering and ... |