| 12306940 |
Methods and apparatus to implement trusted transfer learning on transformer-based phishing detection |
Yonghong Huang, John Wagener |
2025-05-20 |
| 12120384 |
Methods and apparatus to improve deepfake detection with explainability |
Sherin M. Mathews, Shivangee Trivedi, Amanda House, Celeste R. Fralick, Steve Povolny |
2024-10-15 |
| 12093382 |
Methods and apparatus to implement a deterministic indicator and confidence scoring model |
Christiaan Beek, John Fokker |
2024-09-17 |
| 11907362 |
Trusted execution of an executable object on a local device |
Carl D. Woodward, James D. Beaney, Jr., Jimmy Scott Raynor |
2024-02-20 |
| 10678908 |
Trusted execution of an executable object on a local device |
Carl D. Woodward, James D. Beaney, Jr., Jimmy Scott Raynor |
2020-06-09 |
| 10103892 |
System and method for an endpoint hardware assisted network firewall in a security environment |
Raj Samani, Ofir Arkin, Sven Schrecker |
2018-10-16 |
| 9560014 |
System and method for an endpoint hardware assisted network firewall in a security environment |
Raj Samani, Ofir Arkin, Sven Schrecker |
2017-01-31 |
| 8615757 |
Negotiated assignment of resources to a virtual machine in a multi-virtual machine environment |
Carl Klotz, Vedvyas Shanbhogue |
2013-12-24 |
| 8612753 |
Method and apparatus for protected code execution on clients |
Yasser Rasheed |
2013-12-17 |
| 8452954 |
Methods and systems to bind a device to a computer system |
Robert W. Strong, Craig T. Owen |
2013-05-28 |