| 11190488 |
Adaptive security filtering on a client device |
Daniel Marino, Brian Schlatter |
2021-11-30 |
| 11184169 |
Systems and methods for crowd-storing encrypiion keys |
Ilya Sokolov, Lei Gu |
2021-11-23 |
| 11176268 |
Systems and methods for generating user profiles |
Petros Efstathopoulos, Chris Gates |
2021-11-16 |
| 11172258 |
Protecting against an impersonation scam in a live video stream |
Acar Tamersoy, Kevin Roundy, Platon Kotzias |
2021-11-09 |
| 11163875 |
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data |
Kevin Roundy, Mahmood Sharif, Matteo Dell'Amico, Christopher Gates, Dong Chung |
2021-11-02 |
| 11128473 |
Systems and methods for assuring authenticity of electronic sensor data |
Christopher Gates, Acar Tamersoy, Daniel Marino |
2021-09-21 |
| 11102175 |
Systems and methods for categorizing web applications based on age restrictions in online content policies |
Trijimon Padmalayam Rajan, Manjunath Rajendrababu |
2021-08-24 |
| 11075951 |
Query learning for automated incident investigation and remediation |
Brian Schlatter, Michael Hart, Steven Meckl, Jung Hui Yoon, Matteo Dell'Amico |
2021-07-27 |
| 11030342 |
Systems and methods for controlling uploading of potentially sensitive information to the internet |
David Luz Silva, Petros Efstathopoulos, Daniel Marino |
2021-06-08 |
| 11012452 |
Systems and methods for establishing restricted interfaces for database applications |
Daniel Marino |
2021-05-18 |
| 10931670 |
Uniform resource locator (URL) transformation and redirection with access control |
Johann Roturier, David Luz Silva |
2021-02-23 |