Patents
Document/ Patent Number | Title | Inventor Name | Publication Date | Pages |
---|---|---|---|---|
Attack surface identification
|
Sumpter; Jason Emile et al.
|
2022-11-29
|
21
|
|
Configurable system for detecting social media threats
|
McEachern; Kavan B. et al.
|
2022-11-15
|
24
|
|
Systems and methods for threat disruption
|
Small; Samuel Kevin et al.
|
2022-09-20
|
17
|
|
Malicious social media account identification
|
Foster; James et al.
|
2022-08-16
|
48
|
|
Troll account detection
|
Foster; James et al.
|
2022-08-02
|
48
|
|
Methods and systems for detecting impersonating social media profiles
|
McEachern; Kavan B.
|
2022-07-26
|
19
|
|
Social media rule engine
|
Price; Michael et al.
|
2022-07-19
|
40
|
|
Detection impersonation attempts social media messaging
|
Singh; Jasmeet et al.
|
2022-06-14
|
14
|
|
End user social network protection portal
|
Price; Michael et al.
|
2022-02-22
|
43
|
|
CONFIGURABLE SYSTEM FOR DETECTING SOCIAL MEDIA THREATS
|
McEachern; Kavan B. et al.
|
2021-11-18
|
23
|
|
Social threat correlation
|
Cullison; Christopher B. et al.
|
2021-11-02
|
43
|
|
Methods and systems for enriching data
|
Price; Matthew Alan
|
2021-10-12
|
17
|
|
Automated social account removal
|
Foster; James et al.
|
2021-09-28
|
50
|
|
METHODS AND SYSTEMS FOR DETECTING IMPERSONATING SOCIAL MEDIA PROFILES
|
McEachern; Kavan B.
|
2021-09-09
|
19
|
|
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
|
Price; Michael Morgan et al.
|
2021-05-13
|
15
|
|
SYSTEM AND METHODS FOR MANAGING HIGH VOLUMES OF ALERTS
|
Small; Samuel Kevin et al.
|
2021-05-13
|
22
|
|
METHODS AND SYSTEMS FOR ENRICHING DATA
|
Price; Matthew Alan
|
2021-05-06
|
17
|
|
Identification of vulnerability to social phishing
|
Foster; James et al.
|
2021-05-04
|
20
|
|
Methods and systems for detecting deepfakes
|
Price; Michael Morgan et al.
|
2021-02-23
|
16
|
|
METHODS AND SYSTEMS FOR DETECTING DEEPFAKES
|
Price; Michael Morgan et al.
|
2021-02-11
|
15
|
|
Method of Managing a Personal Payment Platform
|
Mcleod; Martin Thomas et al.
|
2020-12-17
|
58
|
|
Organizational social threat reporting
|
Cullison; Christopher B. et al.
|
2020-12-15
|
46
|
|
Identification of Vulnerability to Social Phishing
|
Foster; James et al.
|
2020-03-19
|
18
|
|
Identification of vulnerability to social phishing
|
Foster; James et al.
|
2019-12-24
|
19
|
|
Social network security monitoring
|
Foster; James C. et al.
|
2019-11-26
|
15
|
|
AUTOMATED SOCIAL ACCOUNT REMOVAL
|
Foster; James et al.
|
2019-04-25
|
49
|
|
TROLL ACCOUNT DETECTION
|
Foster; James et al.
|
2019-02-28
|
47
|
|
Malicious social media account identification
|
Foster; James et al.
|
2019-02-28
|
47
|
|
Social threat correlation
|
Cullison; Christopher B. et al.
|
2019-02-21
|
42
|
|
ORGANIZATIONAL SOCIAL THREAT REPORTING
|
Cullison; Christopher B. et al.
|
2019-01-31
|
46
|
|
SOCIAL NETWORK PAGE PROTECTION
|
Cullison; Christopher B. et al.
|
2019-01-31
|
46
|
|
METHODS FOR AUTOMATED SOCIAL PHISHING
|
Foster; James et al.
|
2019-01-10
|
40
|
|
SOCIAL MEDIA RULE ENGINE
|
Price; Michael et al.
|
2018-10-04
|
39
|
|
END USER SOCIAL NETWORK PROTECTION PORTAL
|
Price; Michael et al.
|
2018-08-02
|
42
|
|
Systems and methods for determining the risk of information leaks from cloud-based services
|
Roturier; Johann et al.
|
2018-05-15
|
20
|
|
Social network data removal
|
Foster; James et al.
|
2017-06-06
|
37
|
|
Social network profile data removal
|
Foster; James et al.
|
2017-06-06
|
39
|
|
Systems and methods for detecting information leakage by an organizational insider
|
Roundy; Kevin Alejandro et al.
|
2017-05-16
|
18
|
|
SOCIAL NETWORK SECURITY MONITORING
|
Foster; James et al.
|
2017-05-04
|
11
|
|
Identification of Vulnerability to Social Phishing
|
Foster; James et al.
|
2017-01-12
|
18
|
|
Social network security monitoring
|
Foster; James et al.
|
2017-01-10
|
13
|
|
SOCIAL NETWORK SECURITY MONITORING
|
Foster; James et al.
|
2016-06-16
|
12
|
|
Protecting against suspect social entities
|
Foster; James et al.
|
2015-11-17
|
19
|
|
Social Network Data Removal
|
Foster; James et al.
|
2015-08-13
|
36
|
|
SOCIAL NETWORK PROFILE DATA REMOVAL
|
Foster; James et al.
|
2015-08-13
|
37
|
|
Social network scanning
|
Foster; James et al.
|
2015-06-09
|
12
|
|
Social threat scoring
|
Foster; James et al.
|
2015-05-05
|
28
|
|
Social Threat Scoring
|
Foster; James et al.
|
2014-11-13
|
27
|
|
SOCIAL RISK MANAGEMENT
|
Foster; James et al.
|
2014-11-13
|
27
|
|
PROTECTING AGAINST SUSPECT SOCIAL ENTITIES
|
Foster; James et al.
|
2014-10-30
|
18
|