Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Computer-implemented systems and methods for application identification and … 2023-3-09 2023-7-06
Recovery of state, configuration, and content for virtualized instances 2023-2-27 2023-6-29
Native remote access to target resources and secretless connections 2022-12-21 2023-4-20
Discovering and remediating hidden secrets in code files 2022-12-09 2023-4-13
Static and dynamic correlation of software development pipeline events 2022-11-10 2023-7-04 2023-7-04
Securing development and operations pipelines 2022-9-30 2023-9-05 2023-9-05
Computer-implemented systems and methods for application identification and … 2022-9-15 2023-4-05
Authentication credential with embedded authentication information 2022-5-23 2022-9-08
Agent-based detection of fuzzing activity associated with a target program 2022-5-20 2023-4-04 2023-4-04
Analyzing scripts to create and enforce security policies in dynamic … 2022-5-11 2023-3-21 2023-3-21
Systems and methods for monitoring secure web sessions 2022-5-02 2022-6-29
Systems and methods for monitoring secure web sessions 2022-5-02 2023-5-04
Static and dynamic correlation of software development pipeline events 2022-4-28 2022-11-15 2022-11-15
Analyzing and addressing security threats in network resources 2022-4-20 2022-8-04
Mitigation of privilege escalation 2022-4-05 2023-5-30 2023-5-30
Deterministic cryptography deidentification with granular data destruction 2022-2-17 2023-8-17
Protections against security vulnerabilities associated with temporary access … 2022-2-16 2023-8-01 2023-8-01
Identity-based security layer for peripheral computing devices 2022-1-25 2023-8-29 2023-8-29
Centralized security analysis and management of source code in network … 2022-1-03 2022-4-28
Orchestration and generation of minimal surface optimized unikernels 2021-12-21 2023-6-22
Customizable and dynamically mutable operating systems 2021-12-21 2023-6-22
Systems and methods for securing virtualized execution instances 2021-12-20 2022-6-16
Detecting and preventing unauthorized credential change 2021-11-24 2022-3-17
Developing least-privilege permission sets based on global optimization 2021-10-27 2022-6-23
Computer-implemented systems and methods for application identification and … 2021-9-30 2023-3-30
Improving network security through real-time analysis of character similarities 2021-9-28 2023-6-27 2023-6-27
Automatic least-privilege access and control for target resources 2021-9-07 2021-12-30
Coordinated management of cryptographic keys for communication with peripheral … 2021-9-02 2022-3-09
Verification code injection at build time 2021-8-16 2022-8-09 2022-8-09
Decentralized management of data access and verification using data management … 2021-8-04 2022-2-23
Native remote access to target resources using secretless connections 2021-7-20 2022-2-23
End-to-end secure lifecycle of secrets with minimal footprint 2021-7-14 2022-3-08 2022-3-08
Detection of security risks based on secretless connection data 2021-7-06 2022-5-19
Recovery of state, configuration, and content for virtualized instances 2021-6-07 2023-3-21 2023-3-21
Distributed directory caching techniques for secure and efficient resource … 2021-5-07 2021-12-30
Risk assessment for network access control through data analytics 2021-4-28 2021-9-02
Coordinated management of cryptographic keys for communication with peripheral … 2021-3-31 2022-2-22 2022-2-22
Dynamically generating multi-factor entity risk assessments within virtualized … 2021-3-11 2021-7-01
Security protection against threats to network identity providers 2021-2-25 2021-12-09
Developing least-privilege permission sets based on global optimization 2020-12-22 2021-11-16 2021-11-16
Method and Apparatus for Network Fraud Detection and Remediation Through … 2020-12-01 2021-3-18
Secure remote access based on inspection and validation of remote access … 2020-11-25 2022-2-22 2022-2-22
Securing privileged virtualized execution instances 2020-11-17 2021-3-11
Understanding and mediating among diversely structured operational policies 2020-10-27 2022-3-01 2022-3-01
Seamless resource consumption with efficient caching providing reduced lag time 2020-10-14 2021-5-04 2021-5-04
Analyzing diversely structured operational policies 2020-10-14 2021-4-28
Decentralized management of data access and verification using data management … 2020-9-10 2021-2-23 2021-2-23
Decentralized management of data access and verification using data management … 2020-9-10 2021-5-18 2021-5-18
Verification of client identities based on non-distributed data 2020-8-04 2021-4-20 2021-4-20
Multidimensional vectors for analyzing and visually displaying identity … 2020-7-23 2020-12-29 2020-12-29
Agentless management and control of network sessions 2020-7-08 2021-1-21
Measuring and comparing security efficiency and importance in virtualized … 2020-6-15 2021-10-05 2021-10-05
Automatic detection and protection against file system privilege escalation and … 2020-6-04 2021-3-30 2021-3-30
Secure provisioning and validation of access tokens in network environments 2020-5-26 2020-7-29
Variable encryption techniques for secure and efficient searchable encryption 2020-4-30 2020-7-22
Customizing operating system kernels with secure kernel modules 2020-4-24 2023-7-12 2023-7-12
Client microservice for secure and efficient searchable encryption 2020-4-20 2021-1-05 2021-1-05
Variable encryption techniques for secure and efficient searchable encryption 2020-4-20 2021-5-04 2021-5-04
Secure, efficient, and flexible searchable-encryption techniques 2020-4-20 2022-2-01 2022-2-01
Efficient and secure provisioning and updating of identity credentials 2020-4-13 2022-5-10 2022-5-10
On-demand and proactive detection of application misconfiguration security … 2020-4-07 2021-10-07
Secure provisioning and validation of access tokens in network environments 2020-4-07 2021-6-08 2021-6-08
Enhancing secure client experience through selective encryption of cookies 2020-4-03 2021-1-19 2021-1-19
Adaptive response generation on an endpoint 2020-4-02 2020-7-23
Security risk assessment and control for code 2020-3-20 2020-11-19
Discovering and evaluating privileged entities in a network environment 2020-3-09 2020-8-04 2020-8-04
Detecting and protecting against security vulnerabilities in dynamic linkers … 2020-3-06 2020-12-08 2020-12-08
Centralized security assessments of scripts in network environments 2020-2-27 2020-9-16
Understanding and mediating among diversely structured operational policies 2020-2-26 2022-7-19 2022-7-19
Analyzing diversely structured operational policies 2020-2-26 2020-8-18 2020-8-18
Identifying computing processes on automation servers 2020-2-11 2020-7-01
Dynamic display capture to verify encoded visual codes and network address … 2020-2-05 2020-8-04 2020-8-04
Dynamic visualization of scripts based on centralized security assessments 2020-1-28 2022-1-25 2022-1-25
Analyzing and addressing least-privilege security threats on a composite basis 2019-12-18 2022-5-03 2022-5-03
Multi-context encoding and secure communication of data 2019-12-03 2020-6-03
Detecting and actively resolving security policy conflicts 2019-11-27 2020-3-24 2020-3-24
Secure authentication through visual codes containing unique metadata 2019-11-11 2021-4-06 2021-4-06
Automatic least-privilege access and control for target resources 2019-11-05 2021-9-21 2021-9-21
Manipulation and secure communication of encoded visual representations of data 2019-10-30 2020-4-28 2020-4-28
Multi-context encoding and secure communication of data 2019-10-30 2020-11-17 2020-11-17
Identity verification based on electronic file fingerprinting data 2019-10-15 2021-1-28
Monitoring and controlling risk compliance in network environments 2019-10-07 2020-8-25 2020-8-25
Application control 2019-10-01 2021-2-23 2021-2-23
Multi-factor authentication for applications and virtual instance identities 2019-9-09 2020-4-14 2020-4-14
Just-in-time and secure activation of software 2019-8-29 2020-3-03 2020-3-03
Discovering and controlling sensitive data available in temporary access memory 2019-8-19 2020-8-18 2020-8-18
Identification and control of suspicious connected identities and activities 2019-8-14 2021-2-18
Systems and methods for dynamically enrolling virtualized execution instances … 2019-6-25 2020-8-04 2020-8-04
Authentication based on unique encoded codes 2019-6-03 2020-6-03
Securing privileged virtualized execution instances 2019-5-31 2020-6-03
Secure transmission of data to systems using scannable codes 2019-5-31 2020-11-18
Adaptive and dynamic access control techniques for securely communicating … 2019-5-29 2020-2-13
Dynamic and secure coupling between auxiliary devices and endpoint resources 2019-5-29 2020-5-12 2020-5-12
Investigating and securing communications with applications having unknown … 2019-5-20 2020-10-27 2020-10-27
Secure generation and verification of machine-readable visual codes 2019-5-13 2021-4-06 2021-4-06
Secure and reconstructible distribution of data among network resources 2019-5-01 2020-2-04 2020-2-04
Secure authentication 2019-4-02 2020-10-21 2020-10-21
Dynamic authorization of requested actions using adaptive context-based … 2019-3-27 2021-7-07 2021-7-07
Secure offline caching and provisioning of secrets 2019-3-11 2020-2-13
Predicting and addressing harmful or sensitive network activity 2019-2-27 2019-10-15 2019-10-15