Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Systems and methods for detecting fraudulent shopping websites 2021-12-01 2023-5-04
Determining a number of secondary tracking attempts avoided by blocking a … 2021-10-28 2022-12-06 2022-12-06
Detecting malware by linking background intelligent transfer service (BITS) and … 2021-9-30 2023-8-15 2023-8-15
Systems and methods for protecting user data privacy against anti-tracking … 2021-9-28 2023-3-30
Systems and methods for enhancing user privacy 2021-8-27 2023-8-21
Identifying and removing a tracking capability from an external domain that … 2021-8-19 2022-12-13 2022-12-13
Systems and methods for protecting against misleading clicks on websites 2021-8-11 2023-6-21
Systems and methods for securing authentication procedures 2021-6-24 2023-6-06 2023-6-06
Systems and methods for identifying software vulnerabilities in embedded device … 2021-5-03 2023-6-02
Systems and methods for preventing potential phishing attacks by translating … 2021-4-29 2023-9-05 2023-9-05
Systems and methods for protecting users 2021-3-18 2022-1-25 2022-1-25
Systems and methods for restricting capture of self-portrait images on mobile … 2021-3-18 2022-12-13 2022-12-13
Mitigating website privacy issues by automatically identifying cookie sharing … 2021-3-03 2023-5-02 2023-5-02
Systems and methods for managing connections 2021-3-02 2022-3-22 2022-3-22
Systems and methods for performing load balancing and distributed high- … 2021-3-02 2021-11-30 2021-11-30
Protecting against an impersonation scam in a live video stream 2021-1-26 2021-11-09 2021-11-09
Systems and methods for authenticating application points of entry to prevent … 2020-12-04 2023-3-14 2023-3-14
Systems and methods for proactive call spam/scam protection using network … 2020-11-09 2022-12-27 2022-12-27
Systems and methods for retrieving driver safety scores by passenger devices 2020-10-27 2021-9-21 2021-9-21
Systems and methods for protecting user privacy 2020-10-23 2022-9-06 2022-9-06
Systems and methods for detecting certificate pinning 2020-8-28 2021-6-22 2021-6-22
Systems and methods for improving application analysis 2020-8-28 2021-7-13 2021-7-13
Protecting against potentially harmful app installation on a mobile device 2020-8-17 2023-6-20 2023-6-20
Systems and methods for improving application installation 2020-8-11 2022-12-13 2022-12-13
Systems and methods for protecting users from security threats 2020-8-11 2022-2-22 2022-2-22
Systems and methods for deep packet inspection of vulnerable network devices 2020-7-17 2022-12-13 2022-12-13
Systems and methods for detecting inter-personal attack applications 2020-6-23 2023-1-17 2023-1-17
Systems and methods for providing web tracking transparency to protect user … 2020-6-15 2022-9-20 2022-9-20
Protecting personally identifiable information submitted through a browser 2020-5-21 2022-11-08 2022-11-08
Employing beacon messages to restart an application on a mobile device 2020-5-18 2022-1-04 2022-1-04
Routing server communications through a nearby mobile device 2020-5-18 2022-8-02 2022-8-02
Employing SNI hostname extraction to populate a reverse DNS listing to protect … 2020-5-07 2022-5-17 2022-5-17
Systems and methods for protecting search privacy 2020-3-31 2021-9-30
Systems and methods for protecting user data privacy against web tracking … 2020-3-31 2023-5-02 2023-5-02
Systems and methods for selectively monitoring devices 2020-3-30 2023-8-22 2023-8-22
Systems and methods for managing digital personas for online services 2020-3-26 2023-5-02 2023-5-02
Protecting from automatic reconnection with Wi-Fi access points having bad … 2020-1-28 2023-5-02 2023-5-02
Thwarting one-time password theft 2020-1-28 2021-9-07 2021-9-07
Systems and methods for password breach monitoring and notification 2019-12-23 2022-1-11 2022-1-11
Systems and methods to mitigate stalkerware by rendering it useless 2019-12-20 2022-6-21 2022-6-21
Systems and methods for identifying security risks posed by application bundles 2019-12-20 2022-10-04 2022-10-04
Systems and methods for identifying malware locations based on analyses of … 2019-12-19 2021-9-14 2021-9-14
Systems and methods for protecting against password attacks by concealing the … 2019-12-18 2022-9-06 2022-9-06
Analyzing and mitigating website privacy issues by automatically classifying … 2019-12-12 2022-7-05 2022-7-05
Systems and methods for protecting users 2019-11-27 2020-10-13 2020-10-13
Systems and methods for adaptively managing data drift in a classifier 2019-9-10 2022-7-19 2022-7-19
Systems and methods for categorizing web applications based on age restrictions … 2019-9-05 2021-8-24 2021-8-24
Systems and methods for identifying and mitigating phishing attacks 2019-9-04 2022-11-08 2022-11-08
Systems and methods for providing persistent visual warnings for application … 2019-8-15 2021-9-07 2021-9-07
Systems and methods for protecting users 2019-8-12 2020-4-21 2020-4-21
Systems and methods for protecting users 2019-7-30 2022-8-23 2022-8-23
Identifying and protecting against evolving cyberattacks using temporal word … 2019-7-30 2021-11-23 2021-11-23
Systems and methods for crowdsourced application advisory 2019-6-28 2021-10-12 2021-10-12
Method for determining to grant or deny a permission request based on empirical … 2019-6-26 2022-5-03 2022-5-03
Virtual ad blocking on a computing device 2019-6-25 2022-11-22 2022-11-22
Systems and methods for selectively encrypting controlled information for … 2019-6-24 2022-1-04 2022-1-04
Analyzing and mitigating privacy issues on a computing device using cookie … 2019-6-21 2022-6-07 2022-6-07
Systems and methods for detecting malicious in application transactions 2019-6-20 2022-7-12 2022-7-12
Systems and methods for automatically adjusting parental controls of computing … 2019-5-31 2020-10-06 2020-10-06
Controlling access to a computing device with a wireless device using wireless … 2019-4-24 2022-2-08 2022-2-08
Systems and methods for detecting anomalous system command line data 2019-3-31 2022-3-15 2022-3-15
Systems and methods for restoring applications 2019-3-29 2022-3-29 2022-3-29
Systems and methods for verifying decentralized federated data using influence … 2019-3-29 2022-1-18 2022-1-18
Systems and methods for controlling access to a peripheral device 2019-3-29 2021-4-28
Systems and methods for issuing proactive parental control alerts 2019-3-29 2021-6-22 2021-6-22
Systems and methods for detecting potentially malicious content in … 2019-3-28 2022-6-14 2022-6-14
Realtime financial transaction approval 2019-3-28 2022-5-24 2022-5-24
Determining security vulnerabilities of Internet of Things devices 2019-3-28 2021-9-28 2021-9-28
Malware fingerprinting on encrypted transport layer security (TLS) traffic 2019-3-27 2021-10-05 2021-10-05
Systems and methods for controlling an application launch based on a security … 2019-3-26 2022-12-21 2022-12-21
Systems and methods for identifying data breaches 2019-3-25 2021-4-14
Detecting and preventing password leakage using a device-level network filter 2019-3-25 2021-10-12 2021-10-12
Systems and methods for authenticating digital media content 2019-3-21 2022-10-11 2022-10-11
Systems and methods for assuring authenticity of electronic sensor data 2019-3-20 2021-9-21 2021-9-21
Secure computer peripheral devices 2019-3-19 2022-8-02 2022-8-02
Systems and methods for enforcing secure shared access on computing devices by … 2019-3-12 2021-9-28 2021-9-28
Systems and methods for identifying cybersecurity status based on an ontology … 2019-3-11 2021-11-02 2021-11-02
Adaptive security filtering on a client device 2019-3-07 2021-11-30 2021-11-30
Systems and methods for identifying unsolicited communications on a computing … 2019-3-05 2020-9-15 2020-9-15
Systems and methods for categorizing security incidents 2019-2-27 2020-7-21 2020-7-21
Systems and methods for performing reputation-based identification of … 2019-2-27 2020-10-27 2020-10-27
Systems and methods for increasing cybersecurity protection 2019-2-27 2022-9-06 2022-9-06
Identifying and protecting against surveillance apps installed on client … 2019-2-26 2022-4-05 2022-4-05
Systems and methods for improving network efficiency 2019-1-31 2020-12-29 2020-12-29
Systems and methods for managing devices 2019-1-30 2022-6-28 2022-6-28
Systems and methods for securing communications 2019-1-30 2022-5-03 2022-5-03
Verifying that the influence of a user data point has been removed from a … 2019-1-17 2019-8-27 2019-8-27
Systems and methods for fingerprinting devices 2018-12-27 2021-9-14 2021-9-14
Systems and methods for delegating endpoint security operations to a nearby … 2018-12-27 2021-8-17 2021-8-17
Systems and methods for crowd-storing encrypiion keys 2018-12-24 2021-11-23 2021-11-23
Systems and methods for managing location-based access control lists 2018-12-21 2021-2-16 2021-2-16
Uniform resource locator (URL) transformation and redirection with access … 2018-12-21 2021-2-23 2021-2-23
Detecting abnormal user behavior via temporally regularized tensor … 2018-12-21 2021-5-18 2021-5-18
Systems and methods for controlling uploading of potentially sensitive … 2018-12-21 2021-6-08 2021-6-08
Systems and methods for identifying privacy leakage information 2018-12-20 2021-12-21 2021-12-21
Systems and methods for controlling access 2018-12-20 2020-9-22 2020-9-22
Remotely controlling access to a digital camera 2018-12-20 2020-10-06 2020-10-06
Systems and methods for system recovery from a system user interface process … 2018-12-18 2021-3-30 2021-3-30
Identifying and protecting against a computer security threat while preserving … 2018-12-18 2021-4-20 2021-4-20
Identifying and protecting against a computer security threat while preserving … 2018-12-18 2022-6-14 2022-6-14