|
US-11516232-B1
|
Attack surface identification
|
Sumpter; Jason Emile et al.
|
2022-11-29
|
21
|
|
US-11500983-B2
|
Configurable system for detecting social media threats
|
McEachern; Kavan B. et al.
|
2022-11-15
|
24
|
|
US-11451564-B1
|
Systems and methods for threat disruption
|
Small; Samuel Kevin et al.
|
2022-09-20
|
17
|
|
US-11418527-B2
|
Malicious social media account identification
|
Foster; James et al.
|
2022-08-16
|
48
|
|
US-11403400-B2
|
Troll account detection
|
Foster; James et al.
|
2022-08-02
|
48
|
|
US-11397869-B2
|
Methods and systems for detecting impersonating social media profiles
|
McEachern; Kavan B.
|
2022-07-26
|
19
|
|
US-11394722-B2
|
Social media rule engine
|
Price; Michael et al.
|
2022-07-19
|
40
|
|
US-11363038-B2
|
Detection impersonation attempts social media messaging
|
Singh; Jasmeet et al.
|
2022-06-14
|
14
|
|
US-11256812-B2
|
End user social network protection portal
|
Price; Michael et al.
|
2022-02-22
|
43
|
|
US-20210357498-A1
|
CONFIGURABLE SYSTEM FOR DETECTING SOCIAL MEDIA THREATS
|
McEachern; Kavan B. et al.
|
2021-11-18
|
23
|
|
US-11165801-B2
|
Social threat correlation
|
Cullison; Christopher B. et al.
|
2021-11-02
|
43
|
|
US-11146652-B2
|
Methods and systems for enriching data
|
Price; Matthew Alan
|
2021-10-12
|
17
|
|
US-11134097-B2
|
Automated social account removal
|
Foster; James et al.
|
2021-09-28
|
50
|
|
US-20210279502-A1
|
METHODS AND SYSTEMS FOR DETECTING IMPERSONATING SOCIAL MEDIA PROFILES
|
McEachern; Kavan B.
|
2021-09-09
|
19
|
|
US-20210142065-A1
|
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
|
Price; Michael Morgan et al.
|
2021-05-13
|
15
|
|
US-20210141666-A1
|
SYSTEM AND METHODS FOR MANAGING HIGH VOLUMES OF ALERTS
|
Small; Samuel Kevin et al.
|
2021-05-13
|
22
|
|
US-20210136169-A1
|
METHODS AND SYSTEMS FOR ENRICHING DATA
|
Price; Matthew Alan
|
2021-05-06
|
17
|
|
US-10999130-B2
|
Identification of vulnerability to social phishing
|
Foster; James et al.
|
2021-05-04
|
20
|
|
US-10929677-B1
|
Methods and systems for detecting deepfakes
|
Price; Michael Morgan et al.
|
2021-02-23
|
16
|
|
US-20210042529-A1
|
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
|
Price; Michael Morgan et al.
|
2021-02-11
|
15
|
|
US-20200394638-A1
|
Method of Managing a Personal Payment Platform
|
Mcleod; Martin Thomas et al.
|
2020-12-17
|
58
|
|
US-10868824-B2
|
Organizational social threat reporting
|
Cullison; Christopher B. et al.
|
2020-12-15
|
46
|
|
US-20200092164-A1
|
Identification of Vulnerability to Social Phishing
|
Foster; James et al.
|
2020-03-19
|
18
|
|
US-10516567-B2
|
Identification of vulnerability to social phishing
|
Foster; James et al.
|
2019-12-24
|
19
|
|
US-10491623-B2
|
Social network security monitoring
|
Foster; James C. et al.
|
2019-11-26
|
15
|
|
US-20190124109-A1
|
AUTOMATED SOCIAL ACCOUNT REMOVAL
|
Foster; James et al.
|
2019-04-25
|
49
|
|
US-20190065748-A1
|
TROLL ACCOUNT DETECTION
|
Foster; James et al.
|
2019-02-28
|
47
|
|
US-20190068632-A1
|
Malicious social media account identification
|
Foster; James et al.
|
2019-02-28
|
47
|
|
US-20190058721-A1
|
Social threat correlation
|
Cullison; Christopher B. et al.
|
2019-02-21
|
42
|
|
US-20190036960-A1
|
ORGANIZATIONAL SOCIAL THREAT REPORTING
|
Cullison; Christopher B. et al.
|
2019-01-31
|
46
|
|
US-20190036937-A1
|
SOCIAL NETWORK PAGE PROTECTION
|
Cullison; Christopher B. et al.
|
2019-01-31
|
46
|
|
US-20190014148-A1
|
METHODS FOR AUTOMATED SOCIAL PHISHING
|
Foster; James et al.
|
2019-01-10
|
40
|
|
US-20180288070-A1
|
SOCIAL MEDIA RULE ENGINE
|
Price; Michael et al.
|
2018-10-04
|
39
|
|
US-20180218157-A1
|
END USER SOCIAL NETWORK PROTECTION PORTAL
|
Price; Michael et al.
|
2018-08-02
|
42
|
|
US-9973525-B1
|
Systems and methods for determining the risk of information leaks from cloud-based services
|
Roturier; Johann et al.
|
2018-05-15
|
20
|
|
US-9674212-B2
|
Social network data removal
|
Foster; James et al.
|
2017-06-06
|
37
|
|
US-9674214-B2
|
Social network profile data removal
|
Foster; James et al.
|
2017-06-06
|
39
|
|
US-9652597-B2
|
Systems and methods for detecting information leakage by an organizational insider
|
Roundy; Kevin Alejandro et al.
|
2017-05-16
|
18
|
|
US-20170126732-A1
|
SOCIAL NETWORK SECURITY MONITORING
|
Foster; James et al.
|
2017-05-04
|
11
|
|
US-20170013014-A1
|
Identification of Vulnerability to Social Phishing
|
Foster; James et al.
|
2017-01-12
|
18
|
|
US-9544325-B2
|
Social network security monitoring
|
Foster; James et al.
|
2017-01-10
|
13
|
|
US-20160173520-A1
|
SOCIAL NETWORK SECURITY MONITORING
|
Foster; James et al.
|
2016-06-16
|
12
|
|
US-9191411-B2
|
Protecting against suspect social entities
|
Foster; James et al.
|
2015-11-17
|
19
|
|
US-9191411-B2
|
Social Network Data Removal
|
Foster; James et al.
|
2015-08-13
|
36
|
|
US-20150229666-A1
|
SOCIAL NETWORK PROFILE DATA REMOVAL
|
Foster; James et al.
|
2015-08-13
|
37
|
|
US-9055097-B1
|
Social network scanning
|
Foster; James et al.
|
2015-06-09
|
12
|
|
US-9027134-B2
|
Social threat scoring
|
Foster; James et al.
|
2015-05-05
|
28
|
|
US-20140337972-A1
|
Social Threat Scoring
|
Foster; James et al.
|
2014-11-13
|
27
|
|
US-20140337973-A1
|
SOCIAL RISK MANAGEMENT
|
Foster; James et al.
|
2014-11-13
|
27
|
|
US-20140325662-A1
|
PROTECTING AGAINST SUSPECT SOCIAL ENTITIES
|
Foster; James et al.
|
2014-10-30
|
18
|