Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Determining a number of secondary tracking attempts avoided by blocking a … 2021-10-28 2022-12-06 2022-12-06
Systems and methods for enhancing user privacy 2021-8-27 2022-3-03
Systems and methods for protecting against misleading clicks on websites 2021-8-11 2022-2-17
Systems and methods for identifying software vulnerabilities in embedded device … 2021-5-03 2021-11-11
Systems and methods for protecting users 2021-3-18 2022-1-25 2022-1-25
Systems and methods for managing connections 2021-3-02 2022-3-22 2022-3-22
Systems and methods for performing load balancing and distributed high- … 2021-3-02 2021-11-30 2021-11-30
Probabilistic Set Membership Using Bloom Filters 2021-2-04 2021-5-27
Protecting against an impersonation scam in a live video stream 2021-1-26 2021-11-09 2021-11-09
Systems and methods for retrieving driver safety scores by passenger devices 2020-10-27 2021-9-21 2021-9-21
Systems and methods for protecting user privacy 2020-10-23 2022-9-06 2022-9-06
Systems and methods for improving application analysis 2020-8-28 2021-7-13 2021-7-13
Systems and methods for detecting certificate pinning 2020-8-28 2021-6-22 2021-6-22
Systems and methods for protecting users from security threats 2020-8-11 2022-2-22 2022-2-22
Systems and methods for providing web tracking transparency to protect user … 2020-6-15 2022-9-20 2022-9-20
Protecting personally identifiable information submitted through a browser 2020-5-21 2022-11-08 2022-11-08
Routing server communications through a nearby mobile device 2020-5-18 2022-8-02 2022-8-02
Employing beacon messages to restart an application on a mobile device 2020-5-18 2022-1-04 2022-1-04
Employing SNI hostname extraction to populate a reverse DNS listing to protect … 2020-5-07 2022-5-17 2022-5-17
Systems and methods for protecting search privacy 2020-3-31 2021-9-30
Thwarting one-time password theft 2020-1-28 2021-9-07 2021-9-07
Systems and methods for password breach monitoring and notification 2019-12-23 2022-1-11 2022-1-11
Systems and methods for identifying security risks posed by application bundles 2019-12-20 2022-10-04 2022-10-04
Systems and methods to mitigate stalkerware by rendering it useless 2019-12-20 2022-6-21 2022-6-21
Systems and methods for identifying malware locations based on analyses of … 2019-12-19 2021-9-14 2021-9-14
Systems and methods for protecting against password attacks by concealing the … 2019-12-18 2022-9-06 2022-9-06
Analyzing and mitigating website privacy issues by automatically classifying … 2019-12-12 2022-7-05 2022-7-05
Systems and methods for protecting users 2019-11-27 2020-10-13 2020-10-13
Systems and methods for managing a need-to-know domain name system 2019-9-19 2022-5-17 2022-5-17
Systems and methods for protecting a cloud computing device from malware 2019-9-18 2022-8-09 2022-8-09
Systems and methods for adaptively managing data drift in a classifier 2019-9-10 2022-7-19 2022-7-19
Systems and methods for categorizing web applications based on age restrictions … 2019-9-05 2021-8-24 2021-8-24
Systems and methods for identifying and mitigating phishing attacks 2019-9-04 2022-11-08 2022-11-08
Systems and methods for safely executing unreliable malware 2019-9-04 2021-12-21 2021-12-21
Isolating an iframe of a webpage 2019-8-26 2021-8-10 2021-8-10
Systems and methods for providing persistent visual warnings for application … 2019-8-15 2021-9-07 2021-9-07
Identifying and protecting against an attack against an anomaly detector … 2019-8-15 2022-4-05 2022-4-05
Systems and methods for protecting users 2019-8-12 2020-4-21 2020-4-21
Identifying and protecting against evolving cyberattacks using temporal word … 2019-7-30 2021-11-23 2021-11-23
Systems and methods for protecting users 2019-7-30 2022-8-23 2022-8-23
Systems and methods for crowdsourced application advisory 2019-6-28 2021-10-12 2021-10-12
Method for determining to grant or deny a permission request based on empirical … 2019-6-26 2022-5-03 2022-5-03
Virtual ad blocking on a computing device 2019-6-25 2022-11-22 2022-11-22
Systems and methods for selectively encrypting controlled information for … 2019-6-24 2022-1-04 2022-1-04
Analyzing and mitigating privacy issues on a computing device using cookie … 2019-6-21 2022-6-07 2022-6-07
Systems and methods for detecting malicious in application transactions 2019-6-20 2022-7-12 2022-7-12
Systems and methods for automatically adjusting parental controls of computing … 2019-5-31 2020-10-06 2020-10-06
Controlling access to a computing device with a wireless device using wireless … 2019-4-24 2021-6-29 2021-6-29
Systems and methods for detecting anomalous system command line data 2019-3-31 2022-3-15 2022-3-15
Systems and methods for restoring applications 2019-3-29 2022-3-29 2022-3-29
Systems and methods for issuing proactive parental control alerts 2019-3-29 2021-6-22 2021-6-22
Systems and methods for controlling access to a peripheral device 2019-3-29 2021-4-28
Systems and methods for verifying decentralized federated data using influence … 2019-3-29 2022-1-18 2022-1-18
Realtime financial transaction approval 2019-3-28 2022-5-24 2022-5-24
Systems and methods for detecting potentially malicious content in … 2019-3-28 2022-6-14 2022-6-14
Determining security vulnerabilities of Internet of Things devices 2019-3-28 2021-9-28 2021-9-28
Malware fingerprinting on encrypted transport layer security (TLS) traffic 2019-3-27 2021-10-05 2021-10-05
Systems and methods for controlling an application launch based on a security … 2019-3-26 2021-3-31
Detecting and preventing password leakage using a device-level network filter 2019-3-25 2021-10-12 2021-10-12
Systems and methods for identifying data breaches 2019-3-25 2022-8-17 2022-8-17
Systems and methods for authenticating digital media content 2019-3-21 2022-10-11 2022-10-11
Systems and methods for assuring authenticity of electronic sensor data 2019-3-20 2021-9-21 2021-9-21
Secure computer peripheral devices 2019-3-19 2022-8-02 2022-8-02
Systems and methods to protect against unauthorized network intrusions 2019-3-19 2020-9-30 2020-9-30
Systems and methods for enforcing secure shared access on computing devices by … 2019-3-12 2021-9-28 2021-9-28
Systems and methods for identifying cybersecurity status based on an ontology … 2019-3-11 2021-11-02 2021-11-02
Adaptive security filtering on a client device 2019-3-07 2021-11-30 2021-11-30
Systems and methods for identifying unsolicited communications on a computing … 2019-3-05 2020-9-15 2020-9-15
Systems and methods for performing reputation-based identification of … 2019-2-27 2020-10-27 2020-10-27
Systems and methods for categorizing security incidents 2019-2-27 2020-7-21 2020-7-21
Systems and methods for increasing cybersecurity protection 2019-2-27 2022-9-06 2022-9-06
Identifying and protecting against surveillance apps installed on client … 2019-2-26 2022-4-05 2022-4-05
Systems and methods for improving network efficiency 2019-1-31 2020-12-29 2020-12-29
Systems and methods for managing devices 2019-1-30 2022-6-28 2022-6-28
Systems and methods for securing communications 2019-1-30 2022-5-03 2022-5-03
Verifying that the influence of a user data point has been removed from a … 2019-1-17 2019-8-27 2019-8-27
Systems and methods for fingerprinting devices 2018-12-27 2021-9-14 2021-9-14
Systems and methods for delegating endpoint security operations to a nearby … 2018-12-27 2021-8-17 2021-8-17
Systems and methods for crowd-storing encrypiion keys 2018-12-24 2021-11-23 2021-11-23
Systems and methods for controlling uploading of potentially sensitive … 2018-12-21 2021-6-08 2021-6-08
Uniform resource locator (URL) transformation and redirection with access … 2018-12-21 2021-2-23 2021-2-23
Systems and methods for managing location-based access control lists 2018-12-21 2021-2-16 2021-2-16
Detecting abnormal user behavior via temporally regularized tensor … 2018-12-21 2021-5-18 2021-5-18
Systems and methods for controlling access 2018-12-20 2020-9-22 2020-9-22
Remotely controlling access to a digital camera 2018-12-20 2020-10-06 2020-10-06
Systems and methods for identifying privacy leakage information 2018-12-20 2021-12-21 2021-12-21
Identifying and protecting against a computer security threat while preserving … 2018-12-18 2021-4-20 2021-4-20
Identifying and protecting against a computer security threat while preserving … 2018-12-18 2022-6-14 2022-6-14
User-based cyber risk communications using personalized notifications 2018-12-18 2021-12-07 2021-12-07
Systems and methods for system recovery from a system user interface process … 2018-12-18 2021-3-30 2021-3-30
Systems and methods for identifying potentially risky traffic destined for … 2018-12-17 2021-5-25 2021-5-25
Reputation-based transaction security 2018-12-17 2021-5-11 2021-5-11
Systems and methods for virtual boundary enforcement using network filters 2018-12-13 2021-3-30 2021-3-30
Systems and methods to detect and prevent auto-click attacks 2018-12-06 2021-10-26 2021-10-26
Systems and methods for preventing decentralized malware attacks 2018-12-03 2021-6-01 2021-6-01
Systems and methods for generating user profiles 2018-11-28 2021-11-16 2021-11-16
Systems and methods for preventing system level browser attacks through mobile … 2018-11-08 2021-4-20 2021-4-20
Systems and methods for stateless asynchronous database loading while … 2018-11-02 2022-6-28 2022-6-28
Systems and methods for real-time scam protection on phones 2018-10-26 2019-10-22 2019-10-22
Systems and methods for anonymizing user accounts 2018-9-28 2022-6-08 2022-6-08