| Determining a number of secondary tracking attempts avoided by blocking a … |
2021-10-28 |
2022-12-06 |
2022-12-06 |
| Systems and methods for enhancing user privacy |
2021-8-27 |
2022-3-03 |
|
| Systems and methods for protecting against misleading clicks on websites |
2021-8-11 |
2022-2-17 |
|
| Systems and methods for identifying software vulnerabilities in embedded device … |
2021-5-03 |
2021-11-11 |
|
| Systems and methods for protecting users |
2021-3-18 |
2022-1-25 |
2022-1-25 |
| Systems and methods for managing connections |
2021-3-02 |
2022-3-22 |
2022-3-22 |
| Systems and methods for performing load balancing and distributed high- … |
2021-3-02 |
2021-11-30 |
2021-11-30 |
| Probabilistic Set Membership Using Bloom Filters |
2021-2-04 |
2021-5-27 |
|
| Protecting against an impersonation scam in a live video stream |
2021-1-26 |
2021-11-09 |
2021-11-09 |
| Systems and methods for retrieving driver safety scores by passenger devices |
2020-10-27 |
2021-9-21 |
2021-9-21 |
| Systems and methods for protecting user privacy |
2020-10-23 |
2022-9-06 |
2022-9-06 |
| Systems and methods for improving application analysis |
2020-8-28 |
2021-7-13 |
2021-7-13 |
| Systems and methods for detecting certificate pinning |
2020-8-28 |
2021-6-22 |
2021-6-22 |
| Systems and methods for protecting users from security threats |
2020-8-11 |
2022-2-22 |
2022-2-22 |
| Systems and methods for providing web tracking transparency to protect user … |
2020-6-15 |
2022-9-20 |
2022-9-20 |
| Protecting personally identifiable information submitted through a browser |
2020-5-21 |
2022-11-08 |
2022-11-08 |
| Routing server communications through a nearby mobile device |
2020-5-18 |
2022-8-02 |
2022-8-02 |
| Employing beacon messages to restart an application on a mobile device |
2020-5-18 |
2022-1-04 |
2022-1-04 |
| Employing SNI hostname extraction to populate a reverse DNS listing to protect … |
2020-5-07 |
2022-5-17 |
2022-5-17 |
| Systems and methods for protecting search privacy |
2020-3-31 |
2021-9-30 |
|
| Thwarting one-time password theft |
2020-1-28 |
2021-9-07 |
2021-9-07 |
| Systems and methods for password breach monitoring and notification |
2019-12-23 |
2022-1-11 |
2022-1-11 |
| Systems and methods for identifying security risks posed by application bundles |
2019-12-20 |
2022-10-04 |
2022-10-04 |
| Systems and methods to mitigate stalkerware by rendering it useless |
2019-12-20 |
2022-6-21 |
2022-6-21 |
| Systems and methods for identifying malware locations based on analyses of … |
2019-12-19 |
2021-9-14 |
2021-9-14 |
| Systems and methods for protecting against password attacks by concealing the … |
2019-12-18 |
2022-9-06 |
2022-9-06 |
| Analyzing and mitigating website privacy issues by automatically classifying … |
2019-12-12 |
2022-7-05 |
2022-7-05 |
| Systems and methods for protecting users |
2019-11-27 |
2020-10-13 |
2020-10-13 |
| Systems and methods for managing a need-to-know domain name system |
2019-9-19 |
2022-5-17 |
2022-5-17 |
| Systems and methods for protecting a cloud computing device from malware |
2019-9-18 |
2022-8-09 |
2022-8-09 |
| Systems and methods for adaptively managing data drift in a classifier |
2019-9-10 |
2022-7-19 |
2022-7-19 |
| Systems and methods for categorizing web applications based on age restrictions … |
2019-9-05 |
2021-8-24 |
2021-8-24 |
| Systems and methods for identifying and mitigating phishing attacks |
2019-9-04 |
2022-11-08 |
2022-11-08 |
| Systems and methods for safely executing unreliable malware |
2019-9-04 |
2021-12-21 |
2021-12-21 |
| Isolating an iframe of a webpage |
2019-8-26 |
2021-8-10 |
2021-8-10 |
| Systems and methods for providing persistent visual warnings for application … |
2019-8-15 |
2021-9-07 |
2021-9-07 |
| Identifying and protecting against an attack against an anomaly detector … |
2019-8-15 |
2022-4-05 |
2022-4-05 |
| Systems and methods for protecting users |
2019-8-12 |
2020-4-21 |
2020-4-21 |
| Identifying and protecting against evolving cyberattacks using temporal word … |
2019-7-30 |
2021-11-23 |
2021-11-23 |
| Systems and methods for protecting users |
2019-7-30 |
2022-8-23 |
2022-8-23 |
| Systems and methods for crowdsourced application advisory |
2019-6-28 |
2021-10-12 |
2021-10-12 |
| Method for determining to grant or deny a permission request based on empirical … |
2019-6-26 |
2022-5-03 |
2022-5-03 |
| Virtual ad blocking on a computing device |
2019-6-25 |
2022-11-22 |
2022-11-22 |
| Systems and methods for selectively encrypting controlled information for … |
2019-6-24 |
2022-1-04 |
2022-1-04 |
| Analyzing and mitigating privacy issues on a computing device using cookie … |
2019-6-21 |
2022-6-07 |
2022-6-07 |
| Systems and methods for detecting malicious in application transactions |
2019-6-20 |
2022-7-12 |
2022-7-12 |
| Systems and methods for automatically adjusting parental controls of computing … |
2019-5-31 |
2020-10-06 |
2020-10-06 |
| Controlling access to a computing device with a wireless device using wireless … |
2019-4-24 |
2021-6-29 |
2021-6-29 |
| Systems and methods for detecting anomalous system command line data |
2019-3-31 |
2022-3-15 |
2022-3-15 |
| Systems and methods for restoring applications |
2019-3-29 |
2022-3-29 |
2022-3-29 |
| Systems and methods for issuing proactive parental control alerts |
2019-3-29 |
2021-6-22 |
2021-6-22 |
| Systems and methods for controlling access to a peripheral device |
2019-3-29 |
2021-4-28 |
|
| Systems and methods for verifying decentralized federated data using influence … |
2019-3-29 |
2022-1-18 |
2022-1-18 |
| Realtime financial transaction approval |
2019-3-28 |
2022-5-24 |
2022-5-24 |
| Systems and methods for detecting potentially malicious content in … |
2019-3-28 |
2022-6-14 |
2022-6-14 |
| Determining security vulnerabilities of Internet of Things devices |
2019-3-28 |
2021-9-28 |
2021-9-28 |
| Malware fingerprinting on encrypted transport layer security (TLS) traffic |
2019-3-27 |
2021-10-05 |
2021-10-05 |
| Systems and methods for controlling an application launch based on a security … |
2019-3-26 |
2021-3-31 |
|
| Detecting and preventing password leakage using a device-level network filter |
2019-3-25 |
2021-10-12 |
2021-10-12 |
| Systems and methods for identifying data breaches |
2019-3-25 |
2022-8-17 |
2022-8-17 |
| Systems and methods for authenticating digital media content |
2019-3-21 |
2022-10-11 |
2022-10-11 |
| Systems and methods for assuring authenticity of electronic sensor data |
2019-3-20 |
2021-9-21 |
2021-9-21 |
| Secure computer peripheral devices |
2019-3-19 |
2022-8-02 |
2022-8-02 |
| Systems and methods to protect against unauthorized network intrusions |
2019-3-19 |
2020-9-30 |
2020-9-30 |
| Systems and methods for enforcing secure shared access on computing devices by … |
2019-3-12 |
2021-9-28 |
2021-9-28 |
| Systems and methods for identifying cybersecurity status based on an ontology … |
2019-3-11 |
2021-11-02 |
2021-11-02 |
| Adaptive security filtering on a client device |
2019-3-07 |
2021-11-30 |
2021-11-30 |
| Systems and methods for identifying unsolicited communications on a computing … |
2019-3-05 |
2020-9-15 |
2020-9-15 |
| Systems and methods for performing reputation-based identification of … |
2019-2-27 |
2020-10-27 |
2020-10-27 |
| Systems and methods for categorizing security incidents |
2019-2-27 |
2020-7-21 |
2020-7-21 |
| Systems and methods for increasing cybersecurity protection |
2019-2-27 |
2022-9-06 |
2022-9-06 |
| Identifying and protecting against surveillance apps installed on client … |
2019-2-26 |
2022-4-05 |
2022-4-05 |
| Systems and methods for improving network efficiency |
2019-1-31 |
2020-12-29 |
2020-12-29 |
| Systems and methods for managing devices |
2019-1-30 |
2022-6-28 |
2022-6-28 |
| Systems and methods for securing communications |
2019-1-30 |
2022-5-03 |
2022-5-03 |
| Verifying that the influence of a user data point has been removed from a … |
2019-1-17 |
2019-8-27 |
2019-8-27 |
| Systems and methods for fingerprinting devices |
2018-12-27 |
2021-9-14 |
2021-9-14 |
| Systems and methods for delegating endpoint security operations to a nearby … |
2018-12-27 |
2021-8-17 |
2021-8-17 |
| Systems and methods for crowd-storing encrypiion keys |
2018-12-24 |
2021-11-23 |
2021-11-23 |
| Systems and methods for controlling uploading of potentially sensitive … |
2018-12-21 |
2021-6-08 |
2021-6-08 |
| Uniform resource locator (URL) transformation and redirection with access … |
2018-12-21 |
2021-2-23 |
2021-2-23 |
| Systems and methods for managing location-based access control lists |
2018-12-21 |
2021-2-16 |
2021-2-16 |
| Detecting abnormal user behavior via temporally regularized tensor … |
2018-12-21 |
2021-5-18 |
2021-5-18 |
| Systems and methods for controlling access |
2018-12-20 |
2020-9-22 |
2020-9-22 |
| Remotely controlling access to a digital camera |
2018-12-20 |
2020-10-06 |
2020-10-06 |
| Systems and methods for identifying privacy leakage information |
2018-12-20 |
2021-12-21 |
2021-12-21 |
| Identifying and protecting against a computer security threat while preserving … |
2018-12-18 |
2021-4-20 |
2021-4-20 |
| Identifying and protecting against a computer security threat while preserving … |
2018-12-18 |
2022-6-14 |
2022-6-14 |
| User-based cyber risk communications using personalized notifications |
2018-12-18 |
2021-12-07 |
2021-12-07 |
| Systems and methods for system recovery from a system user interface process … |
2018-12-18 |
2021-3-30 |
2021-3-30 |
| Systems and methods for identifying potentially risky traffic destined for … |
2018-12-17 |
2021-5-25 |
2021-5-25 |
| Reputation-based transaction security |
2018-12-17 |
2021-5-11 |
2021-5-11 |
| Systems and methods for virtual boundary enforcement using network filters |
2018-12-13 |
2021-3-30 |
2021-3-30 |
| Systems and methods to detect and prevent auto-click attacks |
2018-12-06 |
2021-10-26 |
2021-10-26 |
| Systems and methods for preventing decentralized malware attacks |
2018-12-03 |
2021-6-01 |
2021-6-01 |
| Systems and methods for generating user profiles |
2018-11-28 |
2021-11-16 |
2021-11-16 |
| Systems and methods for preventing system level browser attacks through mobile … |
2018-11-08 |
2021-4-20 |
2021-4-20 |
| Systems and methods for stateless asynchronous database loading while … |
2018-11-02 |
2022-6-28 |
2022-6-28 |
| Systems and methods for real-time scam protection on phones |
2018-10-26 |
2019-10-22 |
2019-10-22 |
| Systems and methods for anonymizing user accounts |
2018-9-28 |
2022-6-08 |
2022-6-08 |