System and method for cybersecurity threat detection utilizing static and runtime data
A Fogel, U Reitblat, A Schindel, A Luttwak… - US Patent …, 2023 - Google Patents
G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, eg
of processors, firmware or operating systems during program execution, eg stack integrity; …
of processors, firmware or operating systems during program execution, eg stack integrity; …
Detection of anomalous count of new entities
HH Neuvirth, DA Burns, A Karpovsky… - US Patent 11,652,833, 2023 - Google Patents
2020-07-24 Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC. reassignment
MICROSOFT TECHNOLOGY LICENSING, LLC. ASSIGNMENT OF ASSIGNORS INTEREST …
MICROSOFT TECHNOLOGY LICENSING, LLC. ASSIGNMENT OF ASSIGNORS INTEREST …
Systems and methods for creating virtual devices
Y Lou, M Tan, Y Zhang, D Song - US Patent 11,374,819, 2022 - Google Patents
(57) ABSTRACT A virtual device management system for creating and imple menting virtual
devices and associated methods are provided herein. The system presents to a user a list of …
devices and associated methods are provided herein. The system presents to a user a list of …
Similarity analysis for automated disposition of security alerts
GI Givental, A Bhatia, K Proctor, R Hajduk - US Patent 11,663,329, 2023 - Google Patents
2021-03-09 Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION
reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF …
reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF …
On-call scheduling and enhanced contact preference management
S Srinivasan, V Cardoso, S Mitra - US Patent 11,232,410, 2022 - Google Patents
Scheduling information for each of plural shifts of an on-call schedule is set based on user
operation at design-time within an on-call scheduling user interface. The scheduling infor …
operation at design-time within an on-call scheduling user interface. The scheduling infor …
System and method for agentless detection of sensitive data in computing environments
R Herzberg, AT Lichtenstein, R Reznik… - US Patent …, 2024 - Google Patents
A system and method for agentless detection of sensitive data in a cloud computing
environment. The method includes detecting a first data object including a data schema and …
environment. The method includes detecting a first data object including a data schema and …
Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity
S Rand, E Abramov, Y Shaked, E Gabay - US Patent 12,219,053, 2025 - Google Patents
A system and method reduces use of restricted operations in a cloud computing
environment during cybersecurity threat inspection. The method includes: detecting an …
environment during cybersecurity threat inspection. The method includes: detecting an …
Systems and methods for creating virtual devices
Y Lou, M Tan, Y Zhang, D Song - US Patent 12,107,733, 2024 - Google Patents
A virtual device management system for creating and implementing virtual devices and
associated methods are provided herein. The system presents to a user a list of devices …
associated methods are provided herein. The system presents to a user a list of devices …
Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources
DH Shemesh, Y Miran, R Reznik, A Luttwak… - US Patent …, 2025 - Google Patents
A system and method for detecting cybersecurity risk on a resource in a computing
environment utilizes static analysis of a cloned resource and runtime data from the live …
environment utilizes static analysis of a cloned resource and runtime data from the live …
Centralized security event generation policy
DE Huffman, T Jasper, J Visoky - US Patent 12,052,137, 2024 - Google Patents
A model-based industrial security policy configuration system implements a plant-wide
industrial asset security policy in accordance with security policy definitions provided by a …
industrial asset security policy in accordance with security policy definitions provided by a …