US2021120010A1
|
|
Security measures for extended sessions
|
US2020250296A1
|
|
Detecting compromised credentials by improved private set intersection
|
US2020210584A1
|
|
Deterministic Reproduction of Client/Server Computer State or Output Sent to One or More Client Computers
|
US2020193332A1
|
|
Decision tree training using a database system
|
US2020184311A1
|
|
Execution of trained neural networks using a database system
|
US2020153827A1
|
|
Reputation tracking based on token exchange
|
WO2019010100A1
|
|
Detecting compromised credentials in a credential stuffing attack
|
WO2019010101A1
|
|
Secure detection and management of compromised credentials
|
US2019166141A1
|
|
Detection of malicious activity using behavior data
|
US2018159830A1
|
|
Obfuscating Source Code Sent, from a Server Computer, to a Browser on a Client Computer
|
EP3479543A1
|
|
Client-side security key generation
|
US2017264623A1
|
|
Applying bytecode obfuscation techniques to programs written in an interpreted language
|
WO2017139709A1
|
|
Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer
|
US10225255B1
|
|
Count-based challenge-response credential pairs for client/server request validation
|
WO2017007936A1
|
|
Split serving of computer code
|
WO2017007705A1
|
|
Asymmetrical challenges for web security
|
WO2016186817A1
|
|
Client/server security by an intermediary executing instructions received from a server and rendering client application instructions
|
US10216488B1
|
|
Intercepting and injecting calls into operations and objects
|
US10129289B1
|
|
Mitigating attacks on server computers by enforcing platform policies on client computers
|
US2017257383A1
|
|
Deterministic reproduction of client/server computer state or output sent to one or more client computers
|