Patents
Document/ Patent Number | Title | Inventor Name | Publication Date | Pages |
---|---|---|---|---|
Attack surface identification | Sumpter; Jason Emile et al. | 2022-11-29 | 21 | |
Configurable system for detecting social media threats | McEachern; Kavan B. et al. | 2022-11-15 | 24 | |
Systems and methods for threat disruption | Small; Samuel Kevin et al. | 2022-09-20 | 17 | |
Malicious social media account identification | Foster; James et al. | 2022-08-16 | 48 | |
Troll account detection | Foster; James et al. | 2022-08-02 | 48 | |
Methods and systems for detecting impersonating social media profiles | McEachern; Kavan B. | 2022-07-26 | 19 | |
Social media rule engine | Price; Michael et al. | 2022-07-19 | 40 | |
Detection impersonation attempts social media messaging | Singh; Jasmeet et al. | 2022-06-14 | 14 | |
End user social network protection portal | Price; Michael et al. | 2022-02-22 | 43 | |
CONFIGURABLE SYSTEM FOR DETECTING SOCIAL MEDIA THREATS | McEachern; Kavan B. et al. | 2021-11-18 | 23 | |
Social threat correlation | Cullison; Christopher B. et al. | 2021-11-02 | 43 | |
Methods and systems for enriching data | Price; Matthew Alan | 2021-10-12 | 17 | |
Automated social account removal | Foster; James et al. | 2021-09-28 | 50 | |
METHODS AND SYSTEMS FOR DETECTING IMPERSONATING SOCIAL MEDIA PROFILES | McEachern; Kavan B. | 2021-09-09 | 19 | |
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES | Price; Michael Morgan et al. | 2021-05-13 | 15 | |
SYSTEM AND METHODS FOR MANAGING HIGH VOLUMES OF ALERTS | Small; Samuel Kevin et al. | 2021-05-13 | 22 | |
METHODS AND SYSTEMS FOR ENRICHING DATA | Price; Matthew Alan | 2021-05-06 | 17 | |
Identification of vulnerability to social phishing | Foster; James et al. | 2021-05-04 | 20 | |
Methods and systems for detecting deepfakes | Price; Michael Morgan et al. | 2021-02-23 | 16 | |
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES | Price; Michael Morgan et al. | 2021-02-11 | 15 | |
Method of Managing a Personal Payment Platform | Mcleod; Martin Thomas et al. | 2020-12-17 | 58 | |
Organizational social threat reporting | Cullison; Christopher B. et al. | 2020-12-15 | 46 | |
Identification of Vulnerability to Social Phishing | Foster; James et al. | 2020-03-19 | 18 | |
Identification of vulnerability to social phishing | Foster; James et al. | 2019-12-24 | 19 | |
Social network security monitoring | Foster; James C. et al. | 2019-11-26 | 15 | |
AUTOMATED SOCIAL ACCOUNT REMOVAL | Foster; James et al. | 2019-04-25 | 49 | |
TROLL ACCOUNT DETECTION | Foster; James et al. | 2019-02-28 | 47 | |
Malicious social media account identification | Foster; James et al. | 2019-02-28 | 47 | |
Social threat correlation | Cullison; Christopher B. et al. | 2019-02-21 | 42 | |
ORGANIZATIONAL SOCIAL THREAT REPORTING | Cullison; Christopher B. et al. | 2019-01-31 | 46 | |
SOCIAL NETWORK PAGE PROTECTION | Cullison; Christopher B. et al. | 2019-01-31 | 46 | |
METHODS FOR AUTOMATED SOCIAL PHISHING | Foster; James et al. | 2019-01-10 | 40 | |
SOCIAL MEDIA RULE ENGINE | Price; Michael et al. | 2018-10-04 | 39 | |
END USER SOCIAL NETWORK PROTECTION PORTAL | Price; Michael et al. | 2018-08-02 | 42 | |
Systems and methods for determining the risk of information leaks from cloud-based services | Roturier; Johann et al. | 2018-05-15 | 20 | |
Social network data removal | Foster; James et al. | 2017-06-06 | 37 | |
Social network profile data removal | Foster; James et al. | 2017-06-06 | 39 | |
Systems and methods for detecting information leakage by an organizational insider | Roundy; Kevin Alejandro et al. | 2017-05-16 | 18 | |
SOCIAL NETWORK SECURITY MONITORING | Foster; James et al. | 2017-05-04 | 11 | |
Identification of Vulnerability to Social Phishing | Foster; James et al. | 2017-01-12 | 18 | |
Social network security monitoring | Foster; James et al. | 2017-01-10 | 13 | |
SOCIAL NETWORK SECURITY MONITORING | Foster; James et al. | 2016-06-16 | 12 | |
Protecting against suspect social entities | Foster; James et al. | 2015-11-17 | 19 | |
Social Network Data Removal | Foster; James et al. | 2015-08-13 | 36 | |
SOCIAL NETWORK PROFILE DATA REMOVAL | Foster; James et al. | 2015-08-13 | 37 | |
Social network scanning | Foster; James et al. | 2015-06-09 | 12 | |
Social threat scoring | Foster; James et al. | 2015-05-05 | 28 | |
Social Threat Scoring | Foster; James et al. | 2014-11-13 | 27 | |
SOCIAL RISK MANAGEMENT | Foster; James et al. | 2014-11-13 | 27 | |
PROTECTING AGAINST SUSPECT SOCIAL ENTITIES | Foster; James et al. | 2014-10-30 | 18 |