| Systems and methods for detecting fraudulent shopping websites |
2021-12-01 |
2023-5-04 |
|
| Determining a number of secondary tracking attempts avoided by blocking a … |
2021-10-28 |
2022-12-06 |
2022-12-06 |
| Detecting malware by linking background intelligent transfer service (BITS) and … |
2021-9-30 |
2023-8-15 |
2023-8-15 |
| Systems and methods for protecting user data privacy against anti-tracking … |
2021-9-28 |
2023-3-30 |
|
| Systems and methods for enhancing user privacy |
2021-8-27 |
2023-8-21 |
|
| Identifying and removing a tracking capability from an external domain that … |
2021-8-19 |
2022-12-13 |
2022-12-13 |
| Systems and methods for protecting against misleading clicks on websites |
2021-8-11 |
2023-6-21 |
|
| Systems and methods for securing authentication procedures |
2021-6-24 |
2023-6-06 |
2023-6-06 |
| Systems and methods for identifying software vulnerabilities in embedded device … |
2021-5-03 |
2023-6-02 |
|
| Systems and methods for preventing potential phishing attacks by translating … |
2021-4-29 |
2023-9-05 |
2023-9-05 |
| Systems and methods for protecting users |
2021-3-18 |
2022-1-25 |
2022-1-25 |
| Systems and methods for restricting capture of self-portrait images on mobile … |
2021-3-18 |
2022-12-13 |
2022-12-13 |
| Mitigating website privacy issues by automatically identifying cookie sharing … |
2021-3-03 |
2023-5-02 |
2023-5-02 |
| Systems and methods for managing connections |
2021-3-02 |
2022-3-22 |
2022-3-22 |
| Systems and methods for performing load balancing and distributed high- … |
2021-3-02 |
2021-11-30 |
2021-11-30 |
| Protecting against an impersonation scam in a live video stream |
2021-1-26 |
2021-11-09 |
2021-11-09 |
| Systems and methods for authenticating application points of entry to prevent … |
2020-12-04 |
2023-3-14 |
2023-3-14 |
| Systems and methods for proactive call spam/scam protection using network … |
2020-11-09 |
2022-12-27 |
2022-12-27 |
| Systems and methods for retrieving driver safety scores by passenger devices |
2020-10-27 |
2021-9-21 |
2021-9-21 |
| Systems and methods for protecting user privacy |
2020-10-23 |
2022-9-06 |
2022-9-06 |
| Systems and methods for detecting certificate pinning |
2020-8-28 |
2021-6-22 |
2021-6-22 |
| Systems and methods for improving application analysis |
2020-8-28 |
2021-7-13 |
2021-7-13 |
| Protecting against potentially harmful app installation on a mobile device |
2020-8-17 |
2023-6-20 |
2023-6-20 |
| Systems and methods for improving application installation |
2020-8-11 |
2022-12-13 |
2022-12-13 |
| Systems and methods for protecting users from security threats |
2020-8-11 |
2022-2-22 |
2022-2-22 |
| Systems and methods for deep packet inspection of vulnerable network devices |
2020-7-17 |
2022-12-13 |
2022-12-13 |
| Systems and methods for detecting inter-personal attack applications |
2020-6-23 |
2023-1-17 |
2023-1-17 |
| Systems and methods for providing web tracking transparency to protect user … |
2020-6-15 |
2022-9-20 |
2022-9-20 |
| Protecting personally identifiable information submitted through a browser |
2020-5-21 |
2022-11-08 |
2022-11-08 |
| Employing beacon messages to restart an application on a mobile device |
2020-5-18 |
2022-1-04 |
2022-1-04 |
| Routing server communications through a nearby mobile device |
2020-5-18 |
2022-8-02 |
2022-8-02 |
| Employing SNI hostname extraction to populate a reverse DNS listing to protect … |
2020-5-07 |
2022-5-17 |
2022-5-17 |
| Systems and methods for protecting search privacy |
2020-3-31 |
2021-9-30 |
|
| Systems and methods for protecting user data privacy against web tracking … |
2020-3-31 |
2023-5-02 |
2023-5-02 |
| Systems and methods for selectively monitoring devices |
2020-3-30 |
2023-8-22 |
2023-8-22 |
| Systems and methods for managing digital personas for online services |
2020-3-26 |
2023-5-02 |
2023-5-02 |
| Protecting from automatic reconnection with Wi-Fi access points having bad … |
2020-1-28 |
2023-5-02 |
2023-5-02 |
| Thwarting one-time password theft |
2020-1-28 |
2021-9-07 |
2021-9-07 |
| Systems and methods for password breach monitoring and notification |
2019-12-23 |
2022-1-11 |
2022-1-11 |
| Systems and methods to mitigate stalkerware by rendering it useless |
2019-12-20 |
2022-6-21 |
2022-6-21 |
| Systems and methods for identifying security risks posed by application bundles |
2019-12-20 |
2022-10-04 |
2022-10-04 |
| Systems and methods for identifying malware locations based on analyses of … |
2019-12-19 |
2021-9-14 |
2021-9-14 |
| Systems and methods for protecting against password attacks by concealing the … |
2019-12-18 |
2022-9-06 |
2022-9-06 |
| Analyzing and mitigating website privacy issues by automatically classifying … |
2019-12-12 |
2022-7-05 |
2022-7-05 |
| Systems and methods for protecting users |
2019-11-27 |
2020-10-13 |
2020-10-13 |
| Systems and methods for adaptively managing data drift in a classifier |
2019-9-10 |
2022-7-19 |
2022-7-19 |
| Systems and methods for categorizing web applications based on age restrictions … |
2019-9-05 |
2021-8-24 |
2021-8-24 |
| Systems and methods for identifying and mitigating phishing attacks |
2019-9-04 |
2022-11-08 |
2022-11-08 |
| Systems and methods for providing persistent visual warnings for application … |
2019-8-15 |
2021-9-07 |
2021-9-07 |
| Systems and methods for protecting users |
2019-8-12 |
2020-4-21 |
2020-4-21 |
| Systems and methods for protecting users |
2019-7-30 |
2022-8-23 |
2022-8-23 |
| Identifying and protecting against evolving cyberattacks using temporal word … |
2019-7-30 |
2021-11-23 |
2021-11-23 |
| Systems and methods for crowdsourced application advisory |
2019-6-28 |
2021-10-12 |
2021-10-12 |
| Method for determining to grant or deny a permission request based on empirical … |
2019-6-26 |
2022-5-03 |
2022-5-03 |
| Virtual ad blocking on a computing device |
2019-6-25 |
2022-11-22 |
2022-11-22 |
| Systems and methods for selectively encrypting controlled information for … |
2019-6-24 |
2022-1-04 |
2022-1-04 |
| Analyzing and mitigating privacy issues on a computing device using cookie … |
2019-6-21 |
2022-6-07 |
2022-6-07 |
| Systems and methods for detecting malicious in application transactions |
2019-6-20 |
2022-7-12 |
2022-7-12 |
| Systems and methods for automatically adjusting parental controls of computing … |
2019-5-31 |
2020-10-06 |
2020-10-06 |
| Controlling access to a computing device with a wireless device using wireless … |
2019-4-24 |
2022-2-08 |
2022-2-08 |
| Systems and methods for detecting anomalous system command line data |
2019-3-31 |
2022-3-15 |
2022-3-15 |
| Systems and methods for restoring applications |
2019-3-29 |
2022-3-29 |
2022-3-29 |
| Systems and methods for verifying decentralized federated data using influence … |
2019-3-29 |
2022-1-18 |
2022-1-18 |
| Systems and methods for controlling access to a peripheral device |
2019-3-29 |
2021-4-28 |
|
| Systems and methods for issuing proactive parental control alerts |
2019-3-29 |
2021-6-22 |
2021-6-22 |
| Systems and methods for detecting potentially malicious content in … |
2019-3-28 |
2022-6-14 |
2022-6-14 |
| Realtime financial transaction approval |
2019-3-28 |
2022-5-24 |
2022-5-24 |
| Determining security vulnerabilities of Internet of Things devices |
2019-3-28 |
2021-9-28 |
2021-9-28 |
| Malware fingerprinting on encrypted transport layer security (TLS) traffic |
2019-3-27 |
2021-10-05 |
2021-10-05 |
| Systems and methods for controlling an application launch based on a security … |
2019-3-26 |
2022-12-21 |
2022-12-21 |
| Systems and methods for identifying data breaches |
2019-3-25 |
2021-4-14 |
|
| Detecting and preventing password leakage using a device-level network filter |
2019-3-25 |
2021-10-12 |
2021-10-12 |
| Systems and methods for authenticating digital media content |
2019-3-21 |
2022-10-11 |
2022-10-11 |
| Systems and methods for assuring authenticity of electronic sensor data |
2019-3-20 |
2021-9-21 |
2021-9-21 |
| Secure computer peripheral devices |
2019-3-19 |
2022-8-02 |
2022-8-02 |
| Systems and methods for enforcing secure shared access on computing devices by … |
2019-3-12 |
2021-9-28 |
2021-9-28 |
| Systems and methods for identifying cybersecurity status based on an ontology … |
2019-3-11 |
2021-11-02 |
2021-11-02 |
| Adaptive security filtering on a client device |
2019-3-07 |
2021-11-30 |
2021-11-30 |
| Systems and methods for identifying unsolicited communications on a computing … |
2019-3-05 |
2020-9-15 |
2020-9-15 |
| Systems and methods for categorizing security incidents |
2019-2-27 |
2020-7-21 |
2020-7-21 |
| Systems and methods for performing reputation-based identification of … |
2019-2-27 |
2020-10-27 |
2020-10-27 |
| Systems and methods for increasing cybersecurity protection |
2019-2-27 |
2022-9-06 |
2022-9-06 |
| Identifying and protecting against surveillance apps installed on client … |
2019-2-26 |
2022-4-05 |
2022-4-05 |
| Systems and methods for improving network efficiency |
2019-1-31 |
2020-12-29 |
2020-12-29 |
| Systems and methods for managing devices |
2019-1-30 |
2022-6-28 |
2022-6-28 |
| Systems and methods for securing communications |
2019-1-30 |
2022-5-03 |
2022-5-03 |
| Verifying that the influence of a user data point has been removed from a … |
2019-1-17 |
2019-8-27 |
2019-8-27 |
| Systems and methods for fingerprinting devices |
2018-12-27 |
2021-9-14 |
2021-9-14 |
| Systems and methods for delegating endpoint security operations to a nearby … |
2018-12-27 |
2021-8-17 |
2021-8-17 |
| Systems and methods for crowd-storing encrypiion keys |
2018-12-24 |
2021-11-23 |
2021-11-23 |
| Systems and methods for managing location-based access control lists |
2018-12-21 |
2021-2-16 |
2021-2-16 |
| Uniform resource locator (URL) transformation and redirection with access … |
2018-12-21 |
2021-2-23 |
2021-2-23 |
| Detecting abnormal user behavior via temporally regularized tensor … |
2018-12-21 |
2021-5-18 |
2021-5-18 |
| Systems and methods for controlling uploading of potentially sensitive … |
2018-12-21 |
2021-6-08 |
2021-6-08 |
| Systems and methods for identifying privacy leakage information |
2018-12-20 |
2021-12-21 |
2021-12-21 |
| Systems and methods for controlling access |
2018-12-20 |
2020-9-22 |
2020-9-22 |
| Remotely controlling access to a digital camera |
2018-12-20 |
2020-10-06 |
2020-10-06 |
| Systems and methods for system recovery from a system user interface process … |
2018-12-18 |
2021-3-30 |
2021-3-30 |
| Identifying and protecting against a computer security threat while preserving … |
2018-12-18 |
2021-4-20 |
2021-4-20 |
| Identifying and protecting against a computer security threat while preserving … |
2018-12-18 |
2022-6-14 |
2022-6-14 |