Movatterモバイル変換


[0]ホーム

URL:


USD926200S1 - Display screen or portion thereof with a graphical user interface - Google Patents

Display screen or portion thereof with a graphical user interface
Download PDF

Info

Publication number
USD926200S1
USD926200S1US29/693,957US201929693957FUSD926200SUS D926200 S1USD926200 S1US D926200S1US 201929693957 FUS201929693957 FUS 201929693957FUS D926200 SUSD926200 SUS D926200S
Authority
US
United States
Prior art keywords
user interface
display screen
graphical user
ornamental design
graphical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US29/693,957
Inventor
Brian P. Murphy
Joe Partlow
Colin O'CONNOR
Jason Pfeiffer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reliaquest Holdings LLC
Original Assignee
Reliaquest Holdings LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reliaquest Holdings LLCfiledCriticalReliaquest Holdings LLC
Priority to US29/693,957priorityCriticalpatent/USD926200S1/en
Priority to CA191609Fprioritypatent/CA191609S/en
Assigned to RELIAQUEST HOLDINGS, LLCreassignmentRELIAQUEST HOLDINGS, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PARTLOW, Joe, PFEIFFER, Jason, O'Connor, Colin, MURPHY, BRIAN P.
Assigned to SIXTH STREET SPECIALTY LENDING, INC., AS COLLATERAL AGENTreassignmentSIXTH STREET SPECIALTY LENDING, INC., AS COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RELIAQUEST HOLDINGS, LLC
Application grantedgrantedCritical
Publication of USD926200S1publicationCriticalpatent/USD926200S1/en
Assigned to GOLUB CAPITAL LLC, AS COLLATERAL AGENTreassignmentGOLUB CAPITAL LLC, AS COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RELIAQUEST HOLDINGS, LLC
Assigned to RELIAQUEST HOLDINGS, LLCreassignmentRELIAQUEST HOLDINGS, LLCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: SIXTH STREET SPECIALTY LENDING, INC.
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Description

The FIGURE is a front view of a display screen or portion thereof with a graphical user interface showing the claimed design.
The broken lines are included for the purpose of illustrating portions of the display screen or portion thereof with a graphical user interface that form no part of the claimed design.

Claims (1)

    CLAIM
  1. The ornamental design for a display screen or portion thereof with a graphical user interface, as shown and described.
US29/693,9572019-06-062019-06-06Display screen or portion thereof with a graphical user interfaceActiveUSD926200S1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US29/693,957USD926200S1 (en)2019-06-062019-06-06Display screen or portion thereof with a graphical user interface
CA191609FCA191609S (en)2019-06-062019-12-04Display screen with a graphical user interface

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US29/693,957USD926200S1 (en)2019-06-062019-06-06Display screen or portion thereof with a graphical user interface

Publications (1)

Publication NumberPublication Date
USD926200S1true USD926200S1 (en)2021-07-27

Family

ID=76943347

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US29/693,957ActiveUSD926200S1 (en)2019-06-062019-06-06Display screen or portion thereof with a graphical user interface

Country Status (2)

CountryLink
US (1)USD926200S1 (en)
CA (1)CA191609S (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USD942488S1 (en)*2020-06-012022-02-01Foresight Works LtdDisplay screen or a portion thereof with construction contracts-focused graphical user interface
USD942487S1 (en)*2020-06-012022-02-01Foresight Works LtdDisplay screen or a portion thereof with construction costs-focused graphical user interface
US11320978B2 (en)2018-12-202022-05-03Nutanix, Inc.User interface for database management services
USD956776S1 (en)*2018-12-142022-07-05Nutanix, Inc.Display screen or portion thereof with a user interface for a database time-machine
USD959453S1 (en)*2018-04-022022-08-02Illumina, Inc.Display screen or portion thereof with graphical user interface
US11604762B2 (en)2018-12-272023-03-14Nutanix, Inc.System and method for provisioning databases in a hyperconverged infrastructure system
US11604806B2 (en)2020-12-282023-03-14Nutanix, Inc.System and method for highly available database service
US11604705B2 (en)2020-08-142023-03-14Nutanix, Inc.System and method for cloning as SQL server AG databases in a hyperconverged system
US11640340B2 (en)2020-10-202023-05-02Nutanix, Inc.System and method for backing up highly available source databases in a hyperconverged system
US11803368B2 (en)2021-10-012023-10-31Nutanix, Inc.Network learning to control delivery of updates
US11816066B2 (en)2018-12-272023-11-14Nutanix, Inc.System and method for protecting databases in a hyperconverged infrastructure system
US11892918B2 (en)2021-03-222024-02-06Nutanix, Inc.System and method for availability group database patching
US11907167B2 (en)2020-08-282024-02-20Nutanix, Inc.Multi-cluster database management services
USD1035675S1 (en)*2021-05-142024-07-16Helio SilvaDisplay screen with a graphical user interface
US12105683B2 (en)2021-10-212024-10-01Nutanix, Inc.System and method for creating template for database services
US12164541B2 (en)2020-08-282024-12-10Nutanix, Inc.Multi-cluster database management system
US12174856B2 (en)2021-10-252024-12-24Nutanix, Inc.Database group management
USD1066406S1 (en)*2023-10-052025-03-11Amba Health and Care LimitedDisplay screen or portion thereof with transitional graphical user interface
US12306819B2 (en)2022-06-222025-05-20Nutanix, Inc.Database as a service on cloud

Citations (308)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USD418495S (en)*1997-11-052000-01-04The United States Of America As Represented By The Secretary Of The ArmyComputer/generated image for a computer monitor
US6381556B1 (en)*1999-08-022002-04-30Ciena CorporationData analyzer system and method for manufacturing control environment
US20020087882A1 (en)2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US6530024B1 (en)1998-11-202003-03-04Centrax CorporationAdaptive feedback security system and method
US20040010697A1 (en)2002-03-132004-01-15Conor WhiteBiometric authentication system and method
US20040193912A1 (en)2003-03-312004-09-30Intel CorporationMethods and systems for managing security policies
US20040193598A1 (en)2000-06-302004-09-30Masataka KanMethod and system for display data in a database system
US20050055330A1 (en)2001-05-152005-03-10Britton Colin P.Surveillance, monitoring and real-time events platform
US20050125694A1 (en)2003-12-052005-06-09Fakes Thomas F.Security policy update supporting at least one security service provider
US20050165631A1 (en)*2004-01-282005-07-28Microsoft CorporationTime management representations and automation for allocating time to projects and meetings within an online calendaring system
US20050235206A1 (en)2004-04-152005-10-20Udo ArendUser interface for a quick activity window
US20060095967A1 (en)2004-10-292006-05-04David DurhamPlatform-based identification of host software circumvention
US20060123022A1 (en)2003-03-122006-06-08Intotality Pty Ltd, AustraliaAutomated application discovery and analysis system and method
US7152240B1 (en)2000-07-252006-12-19Green Stuart DMethod for communication security and apparatus therefor
US20070143827A1 (en)2005-12-212007-06-21FiberlinkMethods and systems for intelligently controlling access to computing resources
US20070180509A1 (en)2005-12-072007-08-02Swartz Alon RPractical platform for high risk applications
US20070199070A1 (en)2006-02-172007-08-23Hughes William ASystems and methods for intelligent monitoring and response to network threats
USD552121S1 (en)2006-07-202007-10-02Xerion Avionix, LlcComputer-generated icon for a portion of an engine instrument display
US20070245238A1 (en)2006-03-222007-10-18Fugitt Jesse ATimeline visualizations linked with other visualizations of data in a thin client
US7487544B2 (en)2001-07-302009-02-03The Trustees Of Columbia University In The City Of New YorkSystem and methods for detection of new malicious executables
US20090077666A1 (en)2007-03-122009-03-19University Of Southern CaliforniaValue-Adaptive Security Threat Modeling and Vulnerability Ranking
US20090089701A1 (en)2007-09-272009-04-02Rockwell Automation Technologies, Inc.Distance-wise presentation of industrial automation data as a function of relevance to user
US20090178139A1 (en)2008-01-092009-07-09Global Dataguard, Inc.Systems and Methods of Network Security and Threat Management
US20090208910A1 (en)2008-02-192009-08-20Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US20090220929A1 (en)2006-03-172009-09-03Daniel Warren CPc-based simulator training system and methods
US20090320137A1 (en)2008-06-182009-12-24Eads Na Defense Security And Systems Solutions Inc.Systems and methods for a simulated network attack generator
US20090328219A1 (en)2008-06-272009-12-31Juniper Networks, Inc.Dynamic policy provisioning within network security devices
US20100067390A1 (en)*2008-05-212010-03-18Luis Filipe Pereira ValenteSystem and method for discovery of network entities
US20100077078A1 (en)2007-06-222010-03-25Fortisphere, Inc.Network traffic analysis using a dynamically updating ontological network description
US20100156630A1 (en)2008-12-182010-06-24Robert AinsburyContextual Risk Indicators in Connection with Threat Level Management
US20100169948A1 (en)2008-12-312010-07-01Hytrust, Inc.Intelligent security control system for virtualized ecosystems
US20100205136A1 (en)2009-02-092010-08-12Southwest Research InstituteSystem and Method for Modeling and Predicting Security Threats
US7818797B1 (en)2001-10-112010-10-19The Trustees Of Columbia University In The City Of New YorkMethods for cost-sensitive modeling for intrusion detection and response
US20110029450A1 (en)2009-07-312011-02-03Accenture Global Services GmbhComputer-implemented method, system, and computer program product for connecting contract management and claim management
USD636779S1 (en)2009-10-072011-04-26Dfs Services LlcGraphical user interface for a spending analysis tool for a computer display
US20110288692A1 (en)2010-05-202011-11-24Accenture Global Services GmbhMalicious attack detection and analysis
US20110289308A1 (en)2010-05-182011-11-24Sobko Andrey VTeam security for portable information devices
US20110320307A1 (en)2010-06-182011-12-29Google Inc.Context-influenced application recommendations
US20120072968A1 (en)2007-02-162012-03-22Wysopal Christopher JAssessment and analysis of software security flaws in virtual machines
US8146146B1 (en)2005-12-232012-03-27At&T Intellectual Property Ii, L.P.Method and apparatus for integrated network security alert information retrieval
US20120079433A1 (en)2010-09-282012-03-29J-MEX, Inc.Device and system and method for interacting with target in operation area
US20120079596A1 (en)2010-08-262012-03-29Verisign, Inc.Method and system for automatic detection and analysis of malware
US20120083706A1 (en)2009-02-262012-04-05Draeger Medical Systems, Inc.Ecg data display method for rapid detection of myocardial ischemia
US8191147B1 (en)2008-04-242012-05-29Symantec CorporationMethod for malware removal based on network signatures and file system artifacts
US20120154169A1 (en)2010-12-152012-06-21Edo Vincent HoekstraToilet management systems, methods, and techniques
USD665412S1 (en)*2011-03-092012-08-14Microsoft CorporationDisplay screen with graphical user interface
US8253747B2 (en)2004-04-162012-08-28Apple Inc.User interface for controlling animation of an object
US20120240233A1 (en)2011-03-172012-09-20Skunk Worx B.V.Method and system for detecting malicious web content
US8291500B1 (en)2012-03-292012-10-16Cyber Engineering Services, Inc.Systems and methods for automated malware artifact retrieval and analysis
US20130014264A1 (en)2005-01-272013-01-10Scott Cruickshanks KennedySystems and Methods For Implementing and Scoring Computer Network Defense Exercises
USD674404S1 (en)*2011-10-262013-01-15Mcafee, Inc.Computer having graphical user interface
US20130031555A1 (en)2011-07-262013-01-31Salesforce.Com, Inc.System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time
US20130081141A1 (en)2010-05-252013-03-28Hewlett-Packard Development Company, L.P.Security threat detection associated with security events and an actor category model
USD681662S1 (en)2012-01-052013-05-07Flextronics Ap, LlcDisplay panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
US20130117847A1 (en)2011-11-072013-05-09William G. FriedmanStreaming Method and System for Processing Network Metadata
USD685391S1 (en)2011-06-272013-07-02Specialty Minerals (Michigan) Inc.Graphical user interface for a display screen or a portion thereof for evaluating refractory data
USD685813S1 (en)2011-05-192013-07-09Nxn Tech, LlcDisplay screen with a results graphical user interface
US20130179938A1 (en)2012-01-092013-07-11International Business Machines CorporationSecurity policy management using incident analysis
US8490149B1 (en)2008-08-202013-07-16Juniper Networks, Inc.Secure session handling in a device after a policy update
US8539385B2 (en)2010-01-262013-09-17Apple Inc.Device, method, and graphical user interface for precise positioning of objects
US8549626B1 (en)2009-03-202013-10-01Symantec CorporationMethod and apparatus for securing a computer from malicious threats through generic remediation
US20130275770A1 (en)2011-12-222013-10-17Michael BergerAlways-available embedded theft reaction subsystem
US20130291087A1 (en)2012-04-302013-10-31Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US20140007264A1 (en)2011-12-222014-01-02Michael BergerAlways-available embedded theft reaction subsystem
USD697080S1 (en)2010-02-262014-01-07Draeger Medical Systems, Inc.Display screen with an icon
US20140009289A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140013454A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140013455A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140020123A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140020122A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140020121A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140046709A1 (en)2012-08-082014-02-13Mark Clement KwapiszeskiMethods and systems for evaluating technology assets
US20140053273A1 (en)2012-08-182014-02-20Lume Systems, Inc.System and method for limiting exploitable or potentially exploitable sub-components in software components
US20140096181A1 (en)2012-09-282014-04-03Tripwire, Inc.Event integration frameworks
US20140156711A1 (en)2011-08-012014-06-05Dhiraj SharanAsset model import connector
US20140172706A1 (en)2012-12-182014-06-19Michael CondrySecurity broker
US20140189870A1 (en)2011-09-082014-07-03Anurag SinglaVisual component and drill down mapping
US20140195502A1 (en)2011-08-262014-07-10Wei HuangMultidimension column-based partitioning and storage
US20140201836A1 (en)2012-08-232014-07-17David B. AmslerAutomated Internet Threat Detection and Mitigation System and Associated Methods
US20140208447A1 (en)2011-12-222014-07-24Michael BergerAlways-available embedded theft reaction subsystem
US20140223555A1 (en)2011-02-102014-08-07Telefonica, S.A.Method and system for improving security threats detection in communication networks
US20140240122A1 (en)2014-02-272014-08-28Fitbit, Inc.Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device
US8832148B2 (en)2010-06-292014-09-09International Business Machines CorporationEnterprise evidence repository
US20140280075A1 (en)2011-08-262014-09-18Hewlett-Packard Development Company, L.P.Multidimension clusters for data partitioning
US20140297495A1 (en)2010-03-182014-10-02Pankaj B. DalalMultidimensional risk analysis
USD716328S1 (en)2012-07-202014-10-28Desire2Learn IncorporatedDisplay screen with graphical user interface
US20140330816A1 (en)2011-11-182014-11-06Debabrata DashQuery summary generation using row-column data storage
USD717328S1 (en)*2013-03-052014-11-11Xian Qian LinDisplay screen or portion thereof with graphical user interface
US20150015504A1 (en)*2013-07-122015-01-15Microsoft CorporationInteractive digital displays
US20150033340A1 (en)2013-07-232015-01-29Crypteia Networks S.A.Systems and methods for self-tuning network intrusion detection and prevention
US8947374B2 (en)*2011-02-072015-02-03Healthfusion, Inc.Electronic medical system touch phrase technology
US20150040233A1 (en)2003-07-012015-02-05Securityprofiling, LlcSdk-equipped anti-vulnerability system, method, and computer program product
US20150067844A1 (en)2002-10-212015-03-05Rockwell Automation Technologies, Inc.System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20150106867A1 (en)2013-10-122015-04-16Fortinet, Inc.Security information and event management
US20150120373A1 (en)2013-10-252015-04-30Jabil Circuit, Inc.Systems and methods for risk processing and visualization of supply chain management system data
US20150128049A1 (en)2012-07-062015-05-07Robert S. BlockAdvanced user interface
US20150135262A1 (en)2012-05-032015-05-14Shine Security Ltd.Detection and prevention for malicious threats
US20150135316A1 (en)2013-11-132015-05-14NetCitadel Inc.System and method of protecting client computers
US20150142491A1 (en)2013-11-152015-05-21Cognito LimitedManagement of field-based workers
USD730925S1 (en)*2013-02-072015-06-02Esco Technologies (Asia) Pte LtdDisplay screen or portion thereof with graphical user interface
US20150163199A1 (en)2012-04-302015-06-11Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US9064210B1 (en)2012-03-312015-06-23Emc CorporationSemantically-aware behavioral security analysis system for security information and event management
USD732555S1 (en)2012-07-192015-06-23D2L CorporationDisplay screen with graphical user interface
US20150178835A1 (en)*2013-12-202015-06-25David W. QuillianSupply chain finance system
US20150180891A1 (en)2013-12-192015-06-25Splunk Inc.Using network locations obtained from multiple threat lists to evaluate network data or machine data
US9069930B1 (en)2011-03-292015-06-30Emc CorporationSecurity information and event management system employing security business objects and workflows
US20150207813A1 (en)2012-02-012015-07-23Vorstack, Inc.Techniques for sharing network security event information
US20150206245A1 (en)2014-01-202015-07-23Fmr LlcDynamic Portfolio Simulator Tool Apparatuses, Methods and Systems
US20150215334A1 (en)2012-09-282015-07-30Level 3 Communications, LlcSystems and methods for generating network threat intelligence
US20150222667A1 (en)2013-12-022015-08-06Alex NayshtutProtection system including security rule evaluation
USD736824S1 (en)2012-12-282015-08-18P&W Solutions Co., Ltd.Display screen with graphical user interface
US20150242619A1 (en)2014-02-242015-08-27Northcross GroupSecurity management system
US20150242628A1 (en)2014-02-232015-08-27Cyphort Inc.System and Method for Detection of Malicious Hypertext Transfer Protocol Chains
US20150264011A1 (en)2014-03-172015-09-17Fortinet, Inc.Security information and event management
US20150281287A1 (en)2009-11-202015-10-01Alert Enterprise, Inc.Policy/rule engine, multi-compliance framework and risk remediation
US20150286636A1 (en)2013-03-152015-10-08Salim ElkhouDocument processing system and method
US20150332398A1 (en)2012-09-042015-11-19Slav BrkicRisk management system and method for monitoring and controlling of messages in a trading system
US20150341212A1 (en)2014-04-152015-11-26Splunk Inc.Visualizations of statistics associated with captured network data
US20150350161A1 (en)2013-07-312015-12-03International Business Machines CorporationNetwork Traffic Analysis to Enhance Rule-Based Network Security
US20150356701A1 (en)2014-06-062015-12-10Play-it Health, Inc.Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
US20160019388A1 (en)2013-03-112016-01-21Hewlett-Packard Development Company, L.P.Event correlation based on confidence factor
USD748126S1 (en)2013-12-232016-01-26Skyhigh Networks, Inc.Display screen with a graphical user interface for cloud usage analysis
US20160034361A1 (en)2013-04-162016-02-04Hewlett-Packard Development Company, L.P.Distributed event correlation system
US20160044054A1 (en)2014-08-062016-02-11Norse CorporationNetwork appliance for dynamic protection from risky network activities
US20160048658A1 (en)*2014-08-152016-02-18Federal Express CorporationResearch performance framework
US9282114B1 (en)2011-06-302016-03-08Emc CorporationGeneration of alerts in an event management system based upon risk
US20160094565A1 (en)2014-09-292016-03-31Juniper Networks, Inc.Targeted attack discovery
US20160092408A1 (en)*2014-09-262016-03-31Oracle International CorporationSemantic distance-based assignment of data elements to visualization edges
USD753134S1 (en)*2014-04-042016-04-05Adp, LlcDisplay screen or portion thereof with graphical user interface
US20160117466A1 (en)2014-10-272016-04-28Jay P. SinghSystem and method for risk management
US20160125535A1 (en)2014-10-312016-05-05Trading Technologies International Inc.Location-aware risk mitigation systems and methods
USD756371S1 (en)*2013-12-022016-05-17Symantec CorporationDisplay screen with graphical user interface
USD757075S1 (en)*2014-02-272016-05-24Robert Bosch GmbhDisplay screen with a graphical user interface
US20160164907A1 (en)2014-12-032016-06-09Phantom Cyber CorporationSecurity actions for computing assets based on enrichment information
US20160164893A1 (en)2013-07-172016-06-09Hewlett-Packard Development Company, L.P.Event management systems
US9367535B2 (en)2012-11-292016-06-14Business Objects Software, Ltd.Dashboard formula execution
US20160170594A1 (en)2014-03-262016-06-16Unanimous A. I., Inc.Dynamic systems for optimization of real-time collaborative intelligence
US9378361B1 (en)2012-12-312016-06-28Emc CorporationAnomaly sensor framework for detecting advanced persistent threat attacks
US20160191466A1 (en)2014-12-302016-06-30Fortinet, Inc.Dynamically optimized security policy management
US20160203883A1 (en)2015-01-142016-07-14David W. RichardsonSemi Submersible Nuclear Power Plant and Multi-Purpose Platform
US20160203319A1 (en)2015-01-142016-07-14Leidos, Inc.System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
US9398035B2 (en)2013-12-312016-07-19Cisco Technology, Inc.Attack mitigation using learning machines
US20160224619A1 (en)2015-01-302016-08-04Splunk Inc.Text-based table manipulation of event data
US20160232353A1 (en)2015-02-092016-08-11Qualcomm IncorporatedDetermining Model Protection Level On-Device based on Malware Detection in Similar Devices
US20160241581A1 (en)2014-04-032016-08-18Isight Partners, Inc.System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation
US20160246849A1 (en)2015-02-252016-08-25FactorChain Inc.Service interface for event data store
US20160246490A1 (en)2015-02-252016-08-25Bank Of America CorporationCustomizable Dashboard
USD765672S1 (en)2014-12-082016-09-06Kpmg LlpElectronic device with portfolio risk view graphical user interface
US20160259939A1 (en)2015-03-052016-09-08Minerva Labs Ltd.Systems and methods for malware evasion management
USD766302S1 (en)2015-08-112016-09-13Unified OfficeDisplay screen with call center performance graphical user interface
US20160286084A1 (en)2015-03-262016-09-29Konica Minolta, Inc.Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium
US20160294800A1 (en)2015-04-032016-10-06Oracle International CorporationAggregated computing infrastructure analyzer
USD769287S1 (en)2015-04-272016-10-18Vericle CorporationComputer screen with practice health monitor and radar graphical user interface
US20160306862A1 (en)2015-04-162016-10-20Nuix Pty LtdSystems and methods for data indexing with user-side scripting
US9479357B1 (en)2010-03-052016-10-25Symantec CorporationDetecting malware on mobile devices based on mobile behavior analysis
US20160321664A1 (en)2015-04-282016-11-03Ronald R. EricksonSystem and method for secure transactions using images
USD771068S1 (en)2014-09-182016-11-08Cheetah Mobile Inc.Display screen or portion thereof with graphical user interface
US9516053B1 (en)2015-08-312016-12-06Splunk Inc.Network security threat detection by user/user-entity behavioral analysis
US20160357418A1 (en)2014-03-262016-12-08Unanimous A. I., Inc.Methods for analyzing decisions made by real-time collective intelligence systems
US20160366174A1 (en)2015-04-172016-12-15Soltra Solutions, LlcComputerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
USD774540S1 (en)2014-05-082016-12-20Express Scripts, Inc.Display screen with a graphical user interface
USD775180S1 (en)2012-07-122016-12-27Mx Technologies, Inc.Display screen or portion thereof with a graphical user interface
US20170006058A1 (en)2015-07-022017-01-05Reliaquest Holdings, LlcThreat intelligence system and method
US20170032279A1 (en)2015-07-312017-02-02Acuity Solutions CorporationSystem and method for in-situ classifier retraining for malware identification and model heterogeneity
US20170041337A1 (en)2011-01-262017-02-09Viaforensics, LlcSystems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring
US20170041036A1 (en)2015-08-052017-02-09International Business Machines CorporationAutomatic Self-Protection for a Portable Electronic Device
US20170048267A1 (en)2014-12-132017-02-16Security Scorecard, Inc.Calculating and benchmarking an entity's cybersecurity risk score
US20170048264A1 (en)2015-08-012017-02-16Splunk Inc,Creating Timeline Views of Information Technology Event Investigations
USD780199S1 (en)*2014-05-022017-02-28Enigami Systems, Inc.Display screen or portion thereof with a graphical user interface
US20170061338A1 (en)2015-08-312017-03-02Salesforce.Com, Inc.Quantitative metrics for assessing status of a platform architecture for cloud computing
US20170060792A1 (en)2015-09-012017-03-02The Boeing CompanyPlatform Management System, Apparatus, and Method
US20170060537A1 (en)2015-08-312017-03-02Salesforce.Com, Inc.Platform provider architecture creation utilizing platform architecture type unit definitions
US20170061348A1 (en)2015-08-312017-03-02Salesforce.com. inc.Platform architecture planning process utilizing platform architecture type unit definitions
USD781326S1 (en)2015-04-152017-03-14Deere & CompanyStatus display screen with a graphical user interface
US20170083682A1 (en)2014-05-152017-03-23The Johns Hopkins UniversityMethod, system and computer-readable media for treatment plan risk analysis
US20170093910A1 (en)2015-09-252017-03-30Acalvio Technologies, Inc.Dynamic security mechanisms
USD783046S1 (en)2015-11-242017-04-04Microsoft CorporationDisplay screen with graphical user interface
US20170118239A1 (en)2015-10-262017-04-27Microsoft Technology Licensing, Llc.Detection of cyber threats against cloud-based applications
US20170118245A1 (en)2015-10-272017-04-27Xypro Technology CorporationMethod and system for gathering and contextualizing multiple security events
US9639697B2 (en)2012-02-292017-05-02Cisco Technology, Inc.Method and apparatus for retroactively detecting malicious or otherwise undesirable software
USD786273S1 (en)2015-06-162017-05-09Adp, LlcDisplay screen with graphical user interface
US20170139894A1 (en)2010-09-202017-05-18Welch Global Consulting, Inc.Method and system for dynamic data modeling for use in real-time computerized presentations
US20170140293A1 (en)2015-11-132017-05-18Accenture Global Solutions LimitedAnalytics platform using telematics data
USD788165S1 (en)2015-09-042017-05-30Chargepoint Technology Ltd.Display screen with transitional icon
US20170154382A1 (en)2015-11-302017-06-01Hartford Fire Insurance CompanyProcessing system for data elements received via source inputs
US20170154026A1 (en)2015-12-012017-06-01Business Objects Software Ltd.Interaction relationship building and explorer for dashboard
US20170171231A1 (en)2015-12-112017-06-15Brightpoint Security, Inc.Computer Network Threat Assessment
US20170177641A1 (en)2015-12-192017-06-22Viktor Charles Von DrakkMethod and device for correlating multiple tables in a database environment
US20170192952A1 (en)2015-12-302017-07-06Sap SeSystems and methods for tracking and modifying actions in an action history
US20170206361A1 (en)2014-07-162017-07-20Beijing Zhigu Rui Tuo Tech Co., LtdApplication recommendation method and application recommendation apparatus
US20170214701A1 (en)2016-01-242017-07-27Syed Kamran HasanComputer security based on artificial intelligence
WO2017127850A1 (en)2016-01-242017-07-27Hasan Syed KamranComputer security based on artificial intelligence
US20170244736A1 (en)2014-10-302017-08-24Ironscales Ltd.Method and system for mitigating malicious messages attacks
US20170251002A1 (en)2016-02-292017-08-31Palo Alto Networks, Inc.Malware analysis platform for threat intelligence made actionable
US20170249461A1 (en)2016-02-262017-08-31Cylance Inc.Retention and accessibility of data characterizing events on an endpoint computer
US20170251013A1 (en)2016-02-262017-08-31Oracle International CorporationTechniques for discovering and managing security of applications
US20170264588A1 (en)2016-03-082017-09-14Tanium Inc.System and Method for Performing Event Inquiries in a Network
US20170263092A1 (en)2016-03-102017-09-14Pinpoint, Inc.Systems and methods for threat monitoring
US20170279835A1 (en)2016-03-282017-09-28Cisco Technology, Inc.Adaptive capture of packet traces based on user feedback learning
US20170301024A1 (en)2009-03-202017-10-19Pankaj B. DalalMultidimensional risk analysis
USD800736S1 (en)2015-06-162017-10-24Adp LlcDisplay screen with animated graphical user interface
US9813449B1 (en)2012-08-102017-11-07Lookwise S.L.Systems and methods for providing a security information and event management system in a distributed architecture
USD802001S1 (en)*2016-07-082017-11-07Ge Aviation Systems LlcPortion of a display panel with a graphical user interface component for flight operations management
US20170322959A1 (en)2016-05-092017-11-09FactorChain Inc.Searchable investigation history for event data store
US20170331817A1 (en)2016-05-122017-11-16Bank Of America CorporationPreventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170331816A1 (en)2016-05-122017-11-16Bank Of America CorporationPreventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170346824A1 (en)2016-05-312017-11-30Tracker Networks Inc.Methods and systems for mobile device risk management
USD804497S1 (en)2016-04-192017-12-05Minebea Co., Ltd.Display screen with graphical user interface
US20170359366A1 (en)2016-06-102017-12-14General Electric CompanyThreat detection and localization for monitoring nodes of an industrial asset control system
US20170366582A1 (en)2016-06-212017-12-21International Business Machines CorporationIncident Response Plan based on Indicators of Compromise
US9852599B1 (en)2015-08-172017-12-26Alarm.Com IncorporatedSafety monitoring platform
US20180007060A1 (en)2016-06-302018-01-04Amazon Technologies, Inc.Multi-Factor Authentication to Access Services
US20180027006A1 (en)2015-02-242018-01-25Cloudlock, Inc.System and method for securing an enterprise computing environment
USD808988S1 (en)2016-12-202018-01-30Abbott LaboratoriesDisplay screen with graphical user interface
US20180032914A1 (en)2016-07-262018-02-01Gamalon, Inc.Machine learning data analysis system and method
US20180033279A1 (en)2016-07-272018-02-01Accenture Global Solutions LimitedProviding predictive alerts for workplace safety
USD809530S1 (en)*2016-12-202018-02-06Smartorg, Inc.Display screen or portion thereof with an animated graphical user interface
US20180041537A1 (en)2016-08-022018-02-08Sophos LimitedIdentifying and remediating phishing security weaknesses
USD811425S1 (en)2016-07-292018-02-27Neurotrack Technologies, Inc.Display screen or portion thereof with graphical user interface
US20180060253A1 (en)2016-05-202018-03-01Faraday&Future Inc.Pairing of input device and display in vehicle infotainment systems
US20180063186A1 (en)2014-09-052018-03-01International Business Machines CorporationSystem for tracking data security threats and method for same
US20180069885A1 (en)2016-09-062018-03-08Accenture Global Solutions LimitedGraph database analysis for network anomaly detection systems
US20180077188A1 (en)2016-09-122018-03-15Qualcomm IncorporatedMethods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US20180077195A1 (en)2016-09-122018-03-15Qualcomm IncorporatedMethods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
USD813884S1 (en)2016-06-012018-03-27Innovation 360 Group ABDisplay screen with graphical user interface
US20180091559A1 (en)2016-09-262018-03-29Splunk Inc.Managing the collection of forensic data from endpoint devices
US20180115578A1 (en)2016-10-262018-04-26Elastic Beam, Inc.Methods and systems for deep learning based api traffic security
US20180124096A1 (en)2016-10-312018-05-03Armis Security Ltd.Detection of vulnerable devices in wireless networks
US20180121982A1 (en)2015-04-022018-05-03Zhejiang Geely Holding Group Co., LtdSafe online transaction method, online transaction platform, and service fee platform
US20180129978A1 (en)2016-11-092018-05-10Gamalon, Inc.Machine learning data analysis system and method
US20180137277A1 (en)2016-11-152018-05-17General Electric CompanyDynamic normalization of monitoring node data for threat detection in industrial asset control system
USD818487S1 (en)2015-04-282018-05-22Includehealth, Inc.Display screen with a graphical user interface
US20180144110A1 (en)2016-11-222018-05-24International Business Machines CorporationMulti-input user interaction and behavioral based authentication system for context aware applications
US20180159877A1 (en)2016-12-072018-06-07General Electric CompanyMulti-mode boundary selection for threat detection in industrial asset control system
US20180157831A1 (en)2016-12-062018-06-07General Electric CompanyAutomated attack localization and detection
US20180189697A1 (en)2016-12-302018-07-05Lookingglass Cyber Solutions, Inc.Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset
US20180191758A1 (en)2017-01-032018-07-05General Electric CompanyCluster-based decision boundaries for threat detection in industrial asset control system
USD822705S1 (en)2017-04-202018-07-10Palantir Technologies, Inc.Display screen or portion thereof with graphical user interface
US20180211549A1 (en)2015-07-212018-07-26Moshe CohenMethod and system for autonomous dynamic air traffic management
US20180219891A1 (en)2017-02-022018-08-02Aetna Inc.Individualized cybersecurity risk detection using multiple attributes
US20180219875A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpGrouping alerts into bundles of alerts
US20180219911A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpResponding to alerts
US20180219876A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpDetermining contextual information for alerts
US20180232528A1 (en)2017-02-132018-08-16Protegrity CorporationSensitive Data Classification
US20180248904A1 (en)2017-02-242018-08-30LogRhythm Inc.Analytics for processing information system data
US20180248863A1 (en)2017-02-242018-08-30Fmr LlcSystems and methods for user authentication using pattern-based risk assessment and adjustment
US20180253676A1 (en)2017-03-012018-09-06Accenture Global Solutions LimitedAutomatic analysis of a technical capability
US20180260572A1 (en)2017-03-082018-09-13Wipro LimitedMethod and device for software risk management within information technology (it) infrastructure
US20180268506A1 (en)2017-03-152018-09-20Exari Group, Inc.Machine evaluation of contract terms
US20180275845A1 (en)2017-03-232018-09-27International Business Machines CorporationDashboard Creation With Popular Patterns and Suggestions Using Analytics
US20180288078A1 (en)2017-04-032018-10-04Juniper Networks, Inc.Tracking and mitigation of an infected host device
USD831697S1 (en)2016-10-312018-10-23Agile Transformation, Inc.Display screen or portion thereof with icon
US20180308026A1 (en)2017-04-212018-10-25Accenture Global Solutions LimitedIdentifying risk patterns in a multi-level network structure
US20180309752A1 (en)2017-04-202018-10-25Adp, LlcEnhanced security authentication system
US20180316701A1 (en)2017-04-262018-11-01General Electric CompanyThreat detection for a fleet of industrial assets
US20180324207A1 (en)2017-05-052018-11-08Servicenow, Inc.Network security threat intelligence sharing
US20180337891A1 (en)2015-05-272018-11-22Ping Identity CorporationMethods and systems for api proxy based adaptive security
US20180337941A1 (en)2017-05-182018-11-22Qadium, Inc.Correlation-driven threat assessment and remediation
USD834606S1 (en)2015-08-252018-11-27Branch Banking And Trust CompanyDisplay screen or portions thereof with graphical user interface
US20180348979A1 (en)*2017-06-022018-12-06Oracle International CorporationInter-application sharing
US20180357422A1 (en)2016-02-252018-12-13Sas Institute Inc.Simulated attack generator for testing a cybersecurity system
US20180359272A1 (en)2017-06-122018-12-13ARIM Technologies Pte Ltd.Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US20180367561A1 (en)2017-06-142018-12-20International Business Machines CorporationThreat disposition analysis and modeling using supervised machine learning
US20190007447A1 (en)2017-06-292019-01-03Webroot Inc.Peer Device Protection
US20190020667A1 (en)2017-07-142019-01-17Guavus, Inc.Non-rule based security risk detection
US20190021004A1 (en)2017-07-132019-01-17Sophos LimitedThreat index based wlan security and quality of service
US20190019432A1 (en)2017-07-122019-01-17Electronics And Telecommunications Research InstituteApparatus and method for cyber-crisis response training based on augmented reality
US20190028498A1 (en)2017-07-242019-01-24Sap SeThreat Modeling Tool Using Machine Learning
US20190037081A1 (en)2017-07-252019-01-31Vail Systems, Inc.Adaptive, multi-modal fraud detection system
US20190052665A1 (en)2016-02-102019-02-14Cortex Insight LimitedSecurity system
US20190068616A1 (en)2017-08-252019-02-28Ecrime Management Strategies, Inc., d/b/a PhishLabsSecurity system for detection and mitigation of malicious communications
US20190068620A1 (en)2017-08-302019-02-28International Business Machines CorporationDetecting malware attacks using extracted behavioral features
US10242187B1 (en)2016-09-142019-03-26Symantec CorporationSystems and methods for providing integrated security management
US20190095618A1 (en)2016-10-242019-03-28Certis Cisco Security Pte LtdQuantitative unified analytic neural networks
US20190104140A1 (en)2017-09-292019-04-04AO Kaspersky LabSystem and method of cloud detection, investigation and elimination of targeted attacks
US10257227B1 (en)2014-08-142019-04-09Amazon Technologies, Inc.Computer security threat correlation
USD845344S1 (en)2018-01-302019-04-09Citrix Systems, Inc.Display screen or portion thereof with icon group
US20190124104A1 (en)2017-01-302019-04-25Splunk Inc.Graph-Based Network Anomaly Detection Across Time and Entities
US20190121977A1 (en)2017-10-192019-04-25AO Kaspersky LabSystem and method of detecting a malicious file
US20190132351A1 (en)2015-07-302019-05-02IOR Analytics, LLC.Method and apparatus for data security analysis of data flows
US10284587B1 (en)2016-09-142019-05-07Symantec CorporationSystems and methods for responding to electronic security incidents
US20190158525A1 (en)2016-02-292019-05-23Palo Alto Networks, Inc.Automatically grouping malware based on artifacts
US20190163914A1 (en)2017-11-302019-05-30Bank Of America CorporationSystem for information security threat assessment and event triggering
US20190188389A1 (en)2017-12-142019-06-20Forescout Technologies, Inc.Contextual risk monitoring
US20190199739A1 (en)2017-12-222019-06-27Cisco Technology, Inc.Leveraging endpoint and network environment inferences for malware traffic classification
US20190199744A1 (en)2017-12-222019-06-27Kpmg LlpSystem and method for identifying cybersecurity threats
US20190207967A1 (en)2017-12-282019-07-04Fireeye, Inc.Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190207953A1 (en)2017-12-292019-07-04Square, Inc.Logical Validation of Devices Against Fraud and Tampering
US20190207966A1 (en)2017-12-282019-07-04Fireeye, Inc.Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store
US20190205511A1 (en)2017-05-172019-07-04Forescout Technologies, Inc.Account monitoring
US20190222596A1 (en)2018-01-182019-07-18General Electric CompanyReliable cyber-threat detection in rapidly changing environments
USD854561S1 (en)2017-03-172019-07-23Health Management Systems, Inc.Display screen with animated graphical user interface
US20190230099A1 (en)2018-01-192019-07-25General Electric CompanyLearning method and system for separating independent and dependent attacks
US20190230098A1 (en)2018-01-222019-07-25T-Mobile Usa, Inc.Indicator of compromise calculation system
US20190254634A1 (en)2017-12-272019-08-22Canon Medical Systems CorporationAnalysis apparatus
USD857749S1 (en)2017-12-012019-08-27Agco CorporationDisplay screen or portion thereof with graphical user interface
US20190266297A1 (en)2018-02-262019-08-29Noblis, Inc.Multi-layer cyber-physical systems simulation platform
USD859441S1 (en)2017-11-092019-09-10Veriphy Analytics, Inc.Display screen with graphical user interface
USD866576S1 (en)2017-06-022019-11-12Sap SeDisplay screen or portion thereof with graphical user interface
US20200037919A1 (en)2018-08-062020-02-06Siemens Healthcare GmbhProtocol parameter selection method, apparatus and magnetic resonance imaging system
US20200110803A1 (en)*2018-10-082020-04-09Tableau Software, Inc.Determining Levels of Detail for Data Visualizations Using Natural Language Constructs
USD882583S1 (en)2016-07-122020-04-28Google LlcDisplay screen with graphical user interface
USD889490S1 (en)2017-08-292020-07-073M Innovative Properties CompanyDisplay screen with graphical user interface
US20200243178A1 (en)2018-04-102020-07-30Mobile Innovations LlcAdvanced health monitoring system and method
US10775988B2 (en)2016-01-222020-09-15Johnson Controls Technology CompanyBuilding energy management system with ad hoc dashboard
US10791148B2 (en)2013-04-292020-09-29Moogsoft Inc.System in communication with a managed infrastructure
USD905733S1 (en)2018-04-252020-12-22Adp, LlcDisplay screen with an animated graphical user interface
USD905704S1 (en)2019-03-252020-12-22Magnifi LlcDisplay screen or portion thereof with a graphical user interface

Patent Citations (316)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USD418495S (en)*1997-11-052000-01-04The United States Of America As Represented By The Secretary Of The ArmyComputer/generated image for a computer monitor
US6530024B1 (en)1998-11-202003-03-04Centrax CorporationAdaptive feedback security system and method
US6381556B1 (en)*1999-08-022002-04-30Ciena CorporationData analyzer system and method for manufacturing control environment
US20020087882A1 (en)2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US20040193598A1 (en)2000-06-302004-09-30Masataka KanMethod and system for display data in a database system
US7152240B1 (en)2000-07-252006-12-19Green Stuart DMethod for communication security and apparatus therefor
US20050055330A1 (en)2001-05-152005-03-10Britton Colin P.Surveillance, monitoring and real-time events platform
US7487544B2 (en)2001-07-302009-02-03The Trustees Of Columbia University In The City Of New YorkSystem and methods for detection of new malicious executables
US7818797B1 (en)2001-10-112010-10-19The Trustees Of Columbia University In The City Of New YorkMethods for cost-sensitive modeling for intrusion detection and response
US20040010697A1 (en)2002-03-132004-01-15Conor WhiteBiometric authentication system and method
US20150067844A1 (en)2002-10-212015-03-05Rockwell Automation Technologies, Inc.System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20060123022A1 (en)2003-03-122006-06-08Intotality Pty Ltd, AustraliaAutomated application discovery and analysis system and method
US20040193912A1 (en)2003-03-312004-09-30Intel CorporationMethods and systems for managing security policies
US20150040233A1 (en)2003-07-012015-02-05Securityprofiling, LlcSdk-equipped anti-vulnerability system, method, and computer program product
US20050125694A1 (en)2003-12-052005-06-09Fakes Thomas F.Security policy update supporting at least one security service provider
US20050165631A1 (en)*2004-01-282005-07-28Microsoft CorporationTime management representations and automation for allocating time to projects and meetings within an online calendaring system
US20050235206A1 (en)2004-04-152005-10-20Udo ArendUser interface for a quick activity window
US8253747B2 (en)2004-04-162012-08-28Apple Inc.User interface for controlling animation of an object
US20060095967A1 (en)2004-10-292006-05-04David DurhamPlatform-based identification of host software circumvention
US20130014264A1 (en)2005-01-272013-01-10Scott Cruickshanks KennedySystems and Methods For Implementing and Scoring Computer Network Defense Exercises
US20070180509A1 (en)2005-12-072007-08-02Swartz Alon RPractical platform for high risk applications
US20070143827A1 (en)2005-12-212007-06-21FiberlinkMethods and systems for intelligently controlling access to computing resources
US8146146B1 (en)2005-12-232012-03-27At&T Intellectual Property Ii, L.P.Method and apparatus for integrated network security alert information retrieval
US20070199070A1 (en)2006-02-172007-08-23Hughes William ASystems and methods for intelligent monitoring and response to network threats
US20090220929A1 (en)2006-03-172009-09-03Daniel Warren CPc-based simulator training system and methods
US20070245238A1 (en)2006-03-222007-10-18Fugitt Jesse ATimeline visualizations linked with other visualizations of data in a thin client
USD552121S1 (en)2006-07-202007-10-02Xerion Avionix, LlcComputer-generated icon for a portion of an engine instrument display
US20120072968A1 (en)2007-02-162012-03-22Wysopal Christopher JAssessment and analysis of software security flaws in virtual machines
US20090077666A1 (en)2007-03-122009-03-19University Of Southern CaliforniaValue-Adaptive Security Threat Modeling and Vulnerability Ranking
US20100077078A1 (en)2007-06-222010-03-25Fortisphere, Inc.Network traffic analysis using a dynamically updating ontological network description
US20090089701A1 (en)2007-09-272009-04-02Rockwell Automation Technologies, Inc.Distance-wise presentation of industrial automation data as a function of relevance to user
US20090178139A1 (en)2008-01-092009-07-09Global Dataguard, Inc.Systems and Methods of Network Security and Threat Management
US20090208910A1 (en)2008-02-192009-08-20Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US8191147B1 (en)2008-04-242012-05-29Symantec CorporationMethod for malware removal based on network signatures and file system artifacts
US20100067390A1 (en)*2008-05-212010-03-18Luis Filipe Pereira ValenteSystem and method for discovery of network entities
US20090320137A1 (en)2008-06-182009-12-24Eads Na Defense Security And Systems Solutions Inc.Systems and methods for a simulated network attack generator
US20090328219A1 (en)2008-06-272009-12-31Juniper Networks, Inc.Dynamic policy provisioning within network security devices
US8490149B1 (en)2008-08-202013-07-16Juniper Networks, Inc.Secure session handling in a device after a policy update
US20100156630A1 (en)2008-12-182010-06-24Robert AinsburyContextual Risk Indicators in Connection with Threat Level Management
US20100169948A1 (en)2008-12-312010-07-01Hytrust, Inc.Intelligent security control system for virtualized ecosystems
US20100205136A1 (en)2009-02-092010-08-12Southwest Research InstituteSystem and Method for Modeling and Predicting Security Threats
US20120083706A1 (en)2009-02-262012-04-05Draeger Medical Systems, Inc.Ecg data display method for rapid detection of myocardial ischemia
US8549626B1 (en)2009-03-202013-10-01Symantec CorporationMethod and apparatus for securing a computer from malicious threats through generic remediation
US20170301024A1 (en)2009-03-202017-10-19Pankaj B. DalalMultidimensional risk analysis
US20110029450A1 (en)2009-07-312011-02-03Accenture Global Services GmbhComputer-implemented method, system, and computer program product for connecting contract management and claim management
USD636779S1 (en)2009-10-072011-04-26Dfs Services LlcGraphical user interface for a spending analysis tool for a computer display
USD691159S1 (en)2009-10-072013-10-08Discover Financial ServicesComputer display with a graphical user interface for a spending analysis tool
US20150281287A1 (en)2009-11-202015-10-01Alert Enterprise, Inc.Policy/rule engine, multi-compliance framework and risk remediation
US8539385B2 (en)2010-01-262013-09-17Apple Inc.Device, method, and graphical user interface for precise positioning of objects
USD697080S1 (en)2010-02-262014-01-07Draeger Medical Systems, Inc.Display screen with an icon
US9479357B1 (en)2010-03-052016-10-25Symantec CorporationDetecting malware on mobile devices based on mobile behavior analysis
US20140297495A1 (en)2010-03-182014-10-02Pankaj B. DalalMultidimensional risk analysis
US20110289308A1 (en)2010-05-182011-11-24Sobko Andrey VTeam security for portable information devices
US20110288692A1 (en)2010-05-202011-11-24Accenture Global Services GmbhMalicious attack detection and analysis
US20130081141A1 (en)2010-05-252013-03-28Hewlett-Packard Development Company, L.P.Security threat detection associated with security events and an actor category model
US20110320307A1 (en)2010-06-182011-12-29Google Inc.Context-influenced application recommendations
US8832148B2 (en)2010-06-292014-09-09International Business Machines CorporationEnterprise evidence repository
US20120079596A1 (en)2010-08-262012-03-29Verisign, Inc.Method and system for automatic detection and analysis of malware
US20170139894A1 (en)2010-09-202017-05-18Welch Global Consulting, Inc.Method and system for dynamic data modeling for use in real-time computerized presentations
US20120079433A1 (en)2010-09-282012-03-29J-MEX, Inc.Device and system and method for interacting with target in operation area
US20120154169A1 (en)2010-12-152012-06-21Edo Vincent HoekstraToilet management systems, methods, and techniques
US20170041337A1 (en)2011-01-262017-02-09Viaforensics, LlcSystems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring
US8947374B2 (en)*2011-02-072015-02-03Healthfusion, Inc.Electronic medical system touch phrase technology
US20140223555A1 (en)2011-02-102014-08-07Telefonica, S.A.Method and system for improving security threats detection in communication networks
USD665412S1 (en)*2011-03-092012-08-14Microsoft CorporationDisplay screen with graphical user interface
US20120240233A1 (en)2011-03-172012-09-20Skunk Worx B.V.Method and system for detecting malicious web content
US9069930B1 (en)2011-03-292015-06-30Emc CorporationSecurity information and event management system employing security business objects and workflows
USD685813S1 (en)2011-05-192013-07-09Nxn Tech, LlcDisplay screen with a results graphical user interface
USD685391S1 (en)2011-06-272013-07-02Specialty Minerals (Michigan) Inc.Graphical user interface for a display screen or a portion thereof for evaluating refractory data
US9282114B1 (en)2011-06-302016-03-08Emc CorporationGeneration of alerts in an event management system based upon risk
US20130031555A1 (en)2011-07-262013-01-31Salesforce.Com, Inc.System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time
US20140156711A1 (en)2011-08-012014-06-05Dhiraj SharanAsset model import connector
US20140280075A1 (en)2011-08-262014-09-18Hewlett-Packard Development Company, L.P.Multidimension clusters for data partitioning
US20140195502A1 (en)2011-08-262014-07-10Wei HuangMultidimension column-based partitioning and storage
US20140189870A1 (en)2011-09-082014-07-03Anurag SinglaVisual component and drill down mapping
USD674404S1 (en)*2011-10-262013-01-15Mcafee, Inc.Computer having graphical user interface
US20130117847A1 (en)2011-11-072013-05-09William G. FriedmanStreaming Method and System for Processing Network Metadata
US20140330816A1 (en)2011-11-182014-11-06Debabrata DashQuery summary generation using row-column data storage
US20140013455A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140020122A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140208447A1 (en)2011-12-222014-07-24Michael BergerAlways-available embedded theft reaction subsystem
US20140013454A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140020121A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140009289A1 (en)2011-12-222014-01-09Michael BergerAlways-available embedded theft reaction subsystem
US20140020123A1 (en)2011-12-222014-01-16Michael BergerAlways-available embedded theft reaction subsystem
US20140007264A1 (en)2011-12-222014-01-02Michael BergerAlways-available embedded theft reaction subsystem
US20130275770A1 (en)2011-12-222013-10-17Michael BergerAlways-available embedded theft reaction subsystem
USD681662S1 (en)2012-01-052013-05-07Flextronics Ap, LlcDisplay panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
US20130179938A1 (en)2012-01-092013-07-11International Business Machines CorporationSecurity policy management using incident analysis
US20150207813A1 (en)2012-02-012015-07-23Vorstack, Inc.Techniques for sharing network security event information
US9639697B2 (en)2012-02-292017-05-02Cisco Technology, Inc.Method and apparatus for retroactively detecting malicious or otherwise undesirable software
US20130263266A1 (en)2012-03-292013-10-03Cyber Engineering Services, Inc.Systems and methods for automated malware artifact retrieval and analysis
US8850585B2 (en)2012-03-292014-09-30Cyber Engineering Services, Inc.Systems and methods for automated malware artifact retrieval and analysis
US8291500B1 (en)2012-03-292012-10-16Cyber Engineering Services, Inc.Systems and methods for automated malware artifact retrieval and analysis
US9064210B1 (en)2012-03-312015-06-23Emc CorporationSemantically-aware behavioral security analysis system for security information and event management
US20130291087A1 (en)2012-04-302013-10-31Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US20150163199A1 (en)2012-04-302015-06-11Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US20150135262A1 (en)2012-05-032015-05-14Shine Security Ltd.Detection and prevention for malicious threats
US20150128049A1 (en)2012-07-062015-05-07Robert S. BlockAdvanced user interface
USD775180S1 (en)2012-07-122016-12-27Mx Technologies, Inc.Display screen or portion thereof with a graphical user interface
USD732555S1 (en)2012-07-192015-06-23D2L CorporationDisplay screen with graphical user interface
USD716328S1 (en)2012-07-202014-10-28Desire2Learn IncorporatedDisplay screen with graphical user interface
US20140046709A1 (en)2012-08-082014-02-13Mark Clement KwapiszeskiMethods and systems for evaluating technology assets
US9813449B1 (en)2012-08-102017-11-07Lookwise S.L.Systems and methods for providing a security information and event management system in a distributed architecture
US20140053273A1 (en)2012-08-182014-02-20Lume Systems, Inc.System and method for limiting exploitable or potentially exploitable sub-components in software components
US20140201836A1 (en)2012-08-232014-07-17David B. AmslerAutomated Internet Threat Detection and Mitigation System and Associated Methods
US20150332398A1 (en)2012-09-042015-11-19Slav BrkicRisk management system and method for monitoring and controlling of messages in a trading system
US20140096181A1 (en)2012-09-282014-04-03Tripwire, Inc.Event integration frameworks
US20150215334A1 (en)2012-09-282015-07-30Level 3 Communications, LlcSystems and methods for generating network threat intelligence
US9367535B2 (en)2012-11-292016-06-14Business Objects Software, Ltd.Dashboard formula execution
US20140172706A1 (en)2012-12-182014-06-19Michael CondrySecurity broker
USD736824S1 (en)2012-12-282015-08-18P&W Solutions Co., Ltd.Display screen with graphical user interface
US9378361B1 (en)2012-12-312016-06-28Emc CorporationAnomaly sensor framework for detecting advanced persistent threat attacks
USD730925S1 (en)*2013-02-072015-06-02Esco Technologies (Asia) Pte LtdDisplay screen or portion thereof with graphical user interface
USD717328S1 (en)*2013-03-052014-11-11Xian Qian LinDisplay screen or portion thereof with graphical user interface
US20160019388A1 (en)2013-03-112016-01-21Hewlett-Packard Development Company, L.P.Event correlation based on confidence factor
US20150286636A1 (en)2013-03-152015-10-08Salim ElkhouDocument processing system and method
US20160034361A1 (en)2013-04-162016-02-04Hewlett-Packard Development Company, L.P.Distributed event correlation system
US10791148B2 (en)2013-04-292020-09-29Moogsoft Inc.System in communication with a managed infrastructure
US20150015504A1 (en)*2013-07-122015-01-15Microsoft CorporationInteractive digital displays
US20160164893A1 (en)2013-07-172016-06-09Hewlett-Packard Development Company, L.P.Event management systems
US20150033340A1 (en)2013-07-232015-01-29Crypteia Networks S.A.Systems and methods for self-tuning network intrusion detection and prevention
US20150350161A1 (en)2013-07-312015-12-03International Business Machines CorporationNetwork Traffic Analysis to Enhance Rule-Based Network Security
US20150106867A1 (en)2013-10-122015-04-16Fortinet, Inc.Security information and event management
US20150120373A1 (en)2013-10-252015-04-30Jabil Circuit, Inc.Systems and methods for risk processing and visualization of supply chain management system data
US20150135316A1 (en)2013-11-132015-05-14NetCitadel Inc.System and method of protecting client computers
US20150142491A1 (en)2013-11-152015-05-21Cognito LimitedManagement of field-based workers
US20150222667A1 (en)2013-12-022015-08-06Alex NayshtutProtection system including security rule evaluation
USD756371S1 (en)*2013-12-022016-05-17Symantec CorporationDisplay screen with graphical user interface
US20150180891A1 (en)2013-12-192015-06-25Splunk Inc.Using network locations obtained from multiple threat lists to evaluate network data or machine data
US20150178835A1 (en)*2013-12-202015-06-25David W. QuillianSupply chain finance system
USD748126S1 (en)2013-12-232016-01-26Skyhigh Networks, Inc.Display screen with a graphical user interface for cloud usage analysis
US9398035B2 (en)2013-12-312016-07-19Cisco Technology, Inc.Attack mitigation using learning machines
US20150206245A1 (en)2014-01-202015-07-23Fmr LlcDynamic Portfolio Simulator Tool Apparatuses, Methods and Systems
US20150242628A1 (en)2014-02-232015-08-27Cyphort Inc.System and Method for Detection of Malicious Hypertext Transfer Protocol Chains
US20150242619A1 (en)2014-02-242015-08-27Northcross GroupSecurity management system
US20140240122A1 (en)2014-02-272014-08-28Fitbit, Inc.Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device
USD757075S1 (en)*2014-02-272016-05-24Robert Bosch GmbhDisplay screen with a graphical user interface
US20150264011A1 (en)2014-03-172015-09-17Fortinet, Inc.Security information and event management
US20160170594A1 (en)2014-03-262016-06-16Unanimous A. I., Inc.Dynamic systems for optimization of real-time collaborative intelligence
US20160357418A1 (en)2014-03-262016-12-08Unanimous A. I., Inc.Methods for analyzing decisions made by real-time collective intelligence systems
US20160241581A1 (en)2014-04-032016-08-18Isight Partners, Inc.System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation
USD753134S1 (en)*2014-04-042016-04-05Adp, LlcDisplay screen or portion thereof with graphical user interface
US20150341212A1 (en)2014-04-152015-11-26Splunk Inc.Visualizations of statistics associated with captured network data
USD780199S1 (en)*2014-05-022017-02-28Enigami Systems, Inc.Display screen or portion thereof with a graphical user interface
USD774540S1 (en)2014-05-082016-12-20Express Scripts, Inc.Display screen with a graphical user interface
US20170083682A1 (en)2014-05-152017-03-23The Johns Hopkins UniversityMethod, system and computer-readable media for treatment plan risk analysis
US20150356701A1 (en)2014-06-062015-12-10Play-it Health, Inc.Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
US20170206361A1 (en)2014-07-162017-07-20Beijing Zhigu Rui Tuo Tech Co., LtdApplication recommendation method and application recommendation apparatus
US20160044054A1 (en)2014-08-062016-02-11Norse CorporationNetwork appliance for dynamic protection from risky network activities
US10257227B1 (en)2014-08-142019-04-09Amazon Technologies, Inc.Computer security threat correlation
US20160048658A1 (en)*2014-08-152016-02-18Federal Express CorporationResearch performance framework
US20180063186A1 (en)2014-09-052018-03-01International Business Machines CorporationSystem for tracking data security threats and method for same
USD771068S1 (en)2014-09-182016-11-08Cheetah Mobile Inc.Display screen or portion thereof with graphical user interface
US20160092408A1 (en)*2014-09-262016-03-31Oracle International CorporationSemantic distance-based assignment of data elements to visualization edges
US20160094565A1 (en)2014-09-292016-03-31Juniper Networks, Inc.Targeted attack discovery
US20160117466A1 (en)2014-10-272016-04-28Jay P. SinghSystem and method for risk management
US20170244736A1 (en)2014-10-302017-08-24Ironscales Ltd.Method and system for mitigating malicious messages attacks
US20160125535A1 (en)2014-10-312016-05-05Trading Technologies International Inc.Location-aware risk mitigation systems and methods
US20160164907A1 (en)2014-12-032016-06-09Phantom Cyber CorporationSecurity actions for computing assets based on enrichment information
USD765672S1 (en)2014-12-082016-09-06Kpmg LlpElectronic device with portfolio risk view graphical user interface
US20170048267A1 (en)2014-12-132017-02-16Security Scorecard, Inc.Calculating and benchmarking an entity's cybersecurity risk score
US20160191466A1 (en)2014-12-302016-06-30Fortinet, Inc.Dynamically optimized security policy management
US20160203883A1 (en)2015-01-142016-07-14David W. RichardsonSemi Submersible Nuclear Power Plant and Multi-Purpose Platform
US20160203319A1 (en)2015-01-142016-07-14Leidos, Inc.System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
US20160224619A1 (en)2015-01-302016-08-04Splunk Inc.Text-based table manipulation of event data
US20160232353A1 (en)2015-02-092016-08-11Qualcomm IncorporatedDetermining Model Protection Level On-Device based on Malware Detection in Similar Devices
US20180027006A1 (en)2015-02-242018-01-25Cloudlock, Inc.System and method for securing an enterprise computing environment
US20160246849A1 (en)2015-02-252016-08-25FactorChain Inc.Service interface for event data store
US20160246490A1 (en)2015-02-252016-08-25Bank Of America CorporationCustomizable Dashboard
US20160259939A1 (en)2015-03-052016-09-08Minerva Labs Ltd.Systems and methods for malware evasion management
US20160286084A1 (en)2015-03-262016-09-29Konica Minolta, Inc.Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium
US20180121982A1 (en)2015-04-022018-05-03Zhejiang Geely Holding Group Co., LtdSafe online transaction method, online transaction platform, and service fee platform
US20160294800A1 (en)2015-04-032016-10-06Oracle International CorporationAggregated computing infrastructure analyzer
USD781326S1 (en)2015-04-152017-03-14Deere & CompanyStatus display screen with a graphical user interface
US20160306862A1 (en)2015-04-162016-10-20Nuix Pty LtdSystems and methods for data indexing with user-side scripting
US20160366174A1 (en)2015-04-172016-12-15Soltra Solutions, LlcComputerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
USD769287S1 (en)2015-04-272016-10-18Vericle CorporationComputer screen with practice health monitor and radar graphical user interface
USD818487S1 (en)2015-04-282018-05-22Includehealth, Inc.Display screen with a graphical user interface
US20160321664A1 (en)2015-04-282016-11-03Ronald R. EricksonSystem and method for secure transactions using images
US20180337891A1 (en)2015-05-272018-11-22Ping Identity CorporationMethods and systems for api proxy based adaptive security
USD800736S1 (en)2015-06-162017-10-24Adp LlcDisplay screen with animated graphical user interface
USD786273S1 (en)2015-06-162017-05-09Adp, LlcDisplay screen with graphical user interface
US20170006058A1 (en)2015-07-022017-01-05Reliaquest Holdings, LlcThreat intelligence system and method
US20180211549A1 (en)2015-07-212018-07-26Moshe CohenMethod and system for autonomous dynamic air traffic management
US20190132351A1 (en)2015-07-302019-05-02IOR Analytics, LLC.Method and apparatus for data security analysis of data flows
US20170032279A1 (en)2015-07-312017-02-02Acuity Solutions CorporationSystem and method for in-situ classifier retraining for malware identification and model heterogeneity
US20170048264A1 (en)2015-08-012017-02-16Splunk Inc,Creating Timeline Views of Information Technology Event Investigations
US20170041036A1 (en)2015-08-052017-02-09International Business Machines CorporationAutomatic Self-Protection for a Portable Electronic Device
USD766302S1 (en)2015-08-112016-09-13Unified OfficeDisplay screen with call center performance graphical user interface
US9852599B1 (en)2015-08-172017-12-26Alarm.Com IncorporatedSafety monitoring platform
USD834606S1 (en)2015-08-252018-11-27Branch Banking And Trust CompanyDisplay screen or portions thereof with graphical user interface
US20170061338A1 (en)2015-08-312017-03-02Salesforce.Com, Inc.Quantitative metrics for assessing status of a platform architecture for cloud computing
US9516053B1 (en)2015-08-312016-12-06Splunk Inc.Network security threat detection by user/user-entity behavioral analysis
US20170060537A1 (en)2015-08-312017-03-02Salesforce.Com, Inc.Platform provider architecture creation utilizing platform architecture type unit definitions
US20170061348A1 (en)2015-08-312017-03-02Salesforce.com. inc.Platform architecture planning process utilizing platform architecture type unit definitions
US20170060792A1 (en)2015-09-012017-03-02The Boeing CompanyPlatform Management System, Apparatus, and Method
USD788165S1 (en)2015-09-042017-05-30Chargepoint Technology Ltd.Display screen with transitional icon
US20170093910A1 (en)2015-09-252017-03-30Acalvio Technologies, Inc.Dynamic security mechanisms
US20170118239A1 (en)2015-10-262017-04-27Microsoft Technology Licensing, Llc.Detection of cyber threats against cloud-based applications
US20170118245A1 (en)2015-10-272017-04-27Xypro Technology CorporationMethod and system for gathering and contextualizing multiple security events
US20170140293A1 (en)2015-11-132017-05-18Accenture Global Solutions LimitedAnalytics platform using telematics data
USD783046S1 (en)2015-11-242017-04-04Microsoft CorporationDisplay screen with graphical user interface
US20170154382A1 (en)2015-11-302017-06-01Hartford Fire Insurance CompanyProcessing system for data elements received via source inputs
US20170154026A1 (en)2015-12-012017-06-01Business Objects Software Ltd.Interaction relationship building and explorer for dashboard
US20170171231A1 (en)2015-12-112017-06-15Brightpoint Security, Inc.Computer Network Threat Assessment
US20170177641A1 (en)2015-12-192017-06-22Viktor Charles Von DrakkMethod and device for correlating multiple tables in a database environment
US20170192952A1 (en)2015-12-302017-07-06Sap SeSystems and methods for tracking and modifying actions in an action history
US10775988B2 (en)2016-01-222020-09-15Johnson Controls Technology CompanyBuilding energy management system with ad hoc dashboard
US20170214701A1 (en)2016-01-242017-07-27Syed Kamran HasanComputer security based on artificial intelligence
WO2017127850A1 (en)2016-01-242017-07-27Hasan Syed KamranComputer security based on artificial intelligence
US20190052665A1 (en)2016-02-102019-02-14Cortex Insight LimitedSecurity system
US20180357422A1 (en)2016-02-252018-12-13Sas Institute Inc.Simulated attack generator for testing a cybersecurity system
US20170251013A1 (en)2016-02-262017-08-31Oracle International CorporationTechniques for discovering and managing security of applications
US20170249461A1 (en)2016-02-262017-08-31Cylance Inc.Retention and accessibility of data characterizing events on an endpoint computer
US20170251002A1 (en)2016-02-292017-08-31Palo Alto Networks, Inc.Malware analysis platform for threat intelligence made actionable
US20190158525A1 (en)2016-02-292019-05-23Palo Alto Networks, Inc.Automatically grouping malware based on artifacts
US20170264589A1 (en)2016-03-082017-09-14Tanium Inc.System and Method for Performing Event Inquiries in a Network
US20170264588A1 (en)2016-03-082017-09-14Tanium Inc.System and Method for Performing Event Inquiries in a Network
US20170263092A1 (en)2016-03-102017-09-14Pinpoint, Inc.Systems and methods for threat monitoring
US20170279835A1 (en)2016-03-282017-09-28Cisco Technology, Inc.Adaptive capture of packet traces based on user feedback learning
USD804497S1 (en)2016-04-192017-12-05Minebea Co., Ltd.Display screen with graphical user interface
US20170322959A1 (en)2016-05-092017-11-09FactorChain Inc.Searchable investigation history for event data store
US20170331817A1 (en)2016-05-122017-11-16Bank Of America CorporationPreventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170331816A1 (en)2016-05-122017-11-16Bank Of America CorporationPreventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20180060253A1 (en)2016-05-202018-03-01Faraday&Future Inc.Pairing of input device and display in vehicle infotainment systems
US20170346824A1 (en)2016-05-312017-11-30Tracker Networks Inc.Methods and systems for mobile device risk management
USD813884S1 (en)2016-06-012018-03-27Innovation 360 Group ABDisplay screen with graphical user interface
US20170359366A1 (en)2016-06-102017-12-14General Electric CompanyThreat detection and localization for monitoring nodes of an industrial asset control system
US20170366582A1 (en)2016-06-212017-12-21International Business Machines CorporationIncident Response Plan based on Indicators of Compromise
US20180007060A1 (en)2016-06-302018-01-04Amazon Technologies, Inc.Multi-Factor Authentication to Access Services
USD840427S1 (en)*2016-07-082019-02-12Ge Aviation Systems LlcPortion of a display panel with a graphical user interface component for flight operations management
USD802001S1 (en)*2016-07-082017-11-07Ge Aviation Systems LlcPortion of a display panel with a graphical user interface component for flight operations management
USD882583S1 (en)2016-07-122020-04-28Google LlcDisplay screen with graphical user interface
US20180032914A1 (en)2016-07-262018-02-01Gamalon, Inc.Machine learning data analysis system and method
US20180033279A1 (en)2016-07-272018-02-01Accenture Global Solutions LimitedProviding predictive alerts for workplace safety
USD811425S1 (en)2016-07-292018-02-27Neurotrack Technologies, Inc.Display screen or portion thereof with graphical user interface
US20180041537A1 (en)2016-08-022018-02-08Sophos LimitedIdentifying and remediating phishing security weaknesses
US20180069885A1 (en)2016-09-062018-03-08Accenture Global Solutions LimitedGraph database analysis for network anomaly detection systems
US20180077195A1 (en)2016-09-122018-03-15Qualcomm IncorporatedMethods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US20180077188A1 (en)2016-09-122018-03-15Qualcomm IncorporatedMethods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US10284587B1 (en)2016-09-142019-05-07Symantec CorporationSystems and methods for responding to electronic security incidents
US10242187B1 (en)2016-09-142019-03-26Symantec CorporationSystems and methods for providing integrated security management
US20180091559A1 (en)2016-09-262018-03-29Splunk Inc.Managing the collection of forensic data from endpoint devices
US20190095618A1 (en)2016-10-242019-03-28Certis Cisco Security Pte LtdQuantitative unified analytic neural networks
US20180115578A1 (en)2016-10-262018-04-26Elastic Beam, Inc.Methods and systems for deep learning based api traffic security
US20180115523A1 (en)2016-10-262018-04-26Elastic Beam, Inc.Methods and systems for api deception environment and api traffic control and security
USD831697S1 (en)2016-10-312018-10-23Agile Transformation, Inc.Display screen or portion thereof with icon
US20180124096A1 (en)2016-10-312018-05-03Armis Security Ltd.Detection of vulnerable devices in wireless networks
US20180129978A1 (en)2016-11-092018-05-10Gamalon, Inc.Machine learning data analysis system and method
US20180137277A1 (en)2016-11-152018-05-17General Electric CompanyDynamic normalization of monitoring node data for threat detection in industrial asset control system
US20180144110A1 (en)2016-11-222018-05-24International Business Machines CorporationMulti-input user interaction and behavioral based authentication system for context aware applications
US20180157831A1 (en)2016-12-062018-06-07General Electric CompanyAutomated attack localization and detection
US20180159877A1 (en)2016-12-072018-06-07General Electric CompanyMulti-mode boundary selection for threat detection in industrial asset control system
USD809530S1 (en)*2016-12-202018-02-06Smartorg, Inc.Display screen or portion thereof with an animated graphical user interface
USD808988S1 (en)2016-12-202018-01-30Abbott LaboratoriesDisplay screen with graphical user interface
US20180189697A1 (en)2016-12-302018-07-05Lookingglass Cyber Solutions, Inc.Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset
US20180191758A1 (en)2017-01-032018-07-05General Electric CompanyCluster-based decision boundaries for threat detection in industrial asset control system
US20190124104A1 (en)2017-01-302019-04-25Splunk Inc.Graph-Based Network Anomaly Detection Across Time and Entities
US20180219876A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpDetermining contextual information for alerts
US20180219911A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpResponding to alerts
US20180219875A1 (en)2017-01-312018-08-02Hewlett Packard Enterprise Development LpGrouping alerts into bundles of alerts
US20180219891A1 (en)2017-02-022018-08-02Aetna Inc.Individualized cybersecurity risk detection using multiple attributes
US20180232528A1 (en)2017-02-132018-08-16Protegrity CorporationSensitive Data Classification
US20180248863A1 (en)2017-02-242018-08-30Fmr LlcSystems and methods for user authentication using pattern-based risk assessment and adjustment
US20180248904A1 (en)2017-02-242018-08-30LogRhythm Inc.Analytics for processing information system data
US20180253676A1 (en)2017-03-012018-09-06Accenture Global Solutions LimitedAutomatic analysis of a technical capability
US20180260572A1 (en)2017-03-082018-09-13Wipro LimitedMethod and device for software risk management within information technology (it) infrastructure
US20180268506A1 (en)2017-03-152018-09-20Exari Group, Inc.Machine evaluation of contract terms
USD854561S1 (en)2017-03-172019-07-23Health Management Systems, Inc.Display screen with animated graphical user interface
US20180275845A1 (en)2017-03-232018-09-27International Business Machines CorporationDashboard Creation With Popular Patterns and Suggestions Using Analytics
US20180288078A1 (en)2017-04-032018-10-04Juniper Networks, Inc.Tracking and mitigation of an infected host device
USD822705S1 (en)2017-04-202018-07-10Palantir Technologies, Inc.Display screen or portion thereof with graphical user interface
USD863338S1 (en)2017-04-202019-10-15Palantir Technologies Inc.Display screen or portion thereof with transitional graphical user interface
USD894944S1 (en)2017-04-202020-09-01Palantir Technologies, Inc.Display screen or portion thereof with transitional graphical user interface
US20180309752A1 (en)2017-04-202018-10-25Adp, LlcEnhanced security authentication system
US20180308026A1 (en)2017-04-212018-10-25Accenture Global Solutions LimitedIdentifying risk patterns in a multi-level network structure
US20180316701A1 (en)2017-04-262018-11-01General Electric CompanyThreat detection for a fleet of industrial assets
US20180324207A1 (en)2017-05-052018-11-08Servicenow, Inc.Network security threat intelligence sharing
US20190205511A1 (en)2017-05-172019-07-04Forescout Technologies, Inc.Account monitoring
US20180337941A1 (en)2017-05-182018-11-22Qadium, Inc.Correlation-driven threat assessment and remediation
US20180348979A1 (en)*2017-06-022018-12-06Oracle International CorporationInter-application sharing
USD866576S1 (en)2017-06-022019-11-12Sap SeDisplay screen or portion thereof with graphical user interface
US20180359272A1 (en)2017-06-122018-12-13ARIM Technologies Pte Ltd.Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US20180367561A1 (en)2017-06-142018-12-20International Business Machines CorporationThreat disposition analysis and modeling using supervised machine learning
US20190007447A1 (en)2017-06-292019-01-03Webroot Inc.Peer Device Protection
US20190019432A1 (en)2017-07-122019-01-17Electronics And Telecommunications Research InstituteApparatus and method for cyber-crisis response training based on augmented reality
US20190021004A1 (en)2017-07-132019-01-17Sophos LimitedThreat index based wlan security and quality of service
US20190020667A1 (en)2017-07-142019-01-17Guavus, Inc.Non-rule based security risk detection
US20190028498A1 (en)2017-07-242019-01-24Sap SeThreat Modeling Tool Using Machine Learning
US20190037081A1 (en)2017-07-252019-01-31Vail Systems, Inc.Adaptive, multi-modal fraud detection system
US20190068616A1 (en)2017-08-252019-02-28Ecrime Management Strategies, Inc., d/b/a PhishLabsSecurity system for detection and mitigation of malicious communications
USD889490S1 (en)2017-08-292020-07-073M Innovative Properties CompanyDisplay screen with graphical user interface
US20190068620A1 (en)2017-08-302019-02-28International Business Machines CorporationDetecting malware attacks using extracted behavioral features
US20190104140A1 (en)2017-09-292019-04-04AO Kaspersky LabSystem and method of cloud detection, investigation and elimination of targeted attacks
US20190121977A1 (en)2017-10-192019-04-25AO Kaspersky LabSystem and method of detecting a malicious file
USD859441S1 (en)2017-11-092019-09-10Veriphy Analytics, Inc.Display screen with graphical user interface
US20190163914A1 (en)2017-11-302019-05-30Bank Of America CorporationSystem for information security threat assessment and event triggering
USD857749S1 (en)2017-12-012019-08-27Agco CorporationDisplay screen or portion thereof with graphical user interface
US20190188389A1 (en)2017-12-142019-06-20Forescout Technologies, Inc.Contextual risk monitoring
US20190199744A1 (en)2017-12-222019-06-27Kpmg LlpSystem and method for identifying cybersecurity threats
US20190199739A1 (en)2017-12-222019-06-27Cisco Technology, Inc.Leveraging endpoint and network environment inferences for malware traffic classification
US20190254634A1 (en)2017-12-272019-08-22Canon Medical Systems CorporationAnalysis apparatus
US20190207967A1 (en)2017-12-282019-07-04Fireeye, Inc.Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190207966A1 (en)2017-12-282019-07-04Fireeye, Inc.Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store
US20190207953A1 (en)2017-12-292019-07-04Square, Inc.Logical Validation of Devices Against Fraud and Tampering
US20190222596A1 (en)2018-01-182019-07-18General Electric CompanyReliable cyber-threat detection in rapidly changing environments
US20190230099A1 (en)2018-01-192019-07-25General Electric CompanyLearning method and system for separating independent and dependent attacks
US20190230098A1 (en)2018-01-222019-07-25T-Mobile Usa, Inc.Indicator of compromise calculation system
USD845344S1 (en)2018-01-302019-04-09Citrix Systems, Inc.Display screen or portion thereof with icon group
US20190266297A1 (en)2018-02-262019-08-29Noblis, Inc.Multi-layer cyber-physical systems simulation platform
US20200243178A1 (en)2018-04-102020-07-30Mobile Innovations LlcAdvanced health monitoring system and method
USD905733S1 (en)2018-04-252020-12-22Adp, LlcDisplay screen with an animated graphical user interface
US20200037919A1 (en)2018-08-062020-02-06Siemens Healthcare GmbhProtocol parameter selection method, apparatus and magnetic resonance imaging system
US20200110803A1 (en)*2018-10-082020-04-09Tableau Software, Inc.Determining Levels of Detail for Data Visualizations Using Natural Language Constructs
USD905704S1 (en)2019-03-252020-12-22Magnifi LlcDisplay screen or portion thereof with a graphical user interface

Non-Patent Citations (58)

* Cited by examiner, † Cited by third party
Title
"Radar Charts in Tableau—part 1", Aug. 5, 2013, The Information Lab, Alteryx Global Partner of the Year 2019, posted at theinformationlab.co.uk, [site visited Dec. 22, 2020]. https://www.theinformationlab.co.uk/2013/08/05/radar-charts-in-tableau (Year: 2013), 2 pages.
Detken, Kai-Oliver et al., "SIEM Approach for a Higher Level of IT Security in Enterprise Networks", The 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Technology and Applications, Sep. 24-26, 2015, Warsaw, Poland, 6 pages.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,488 dated Jan. 24, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,626 dated Nov. 26, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,671 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,689 dated Dec. 10, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,711 dated Jan. 31, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,733 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,751 dated Jan. 10, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,762 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,772 dated Nov. 26, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,791 dated Jan. 27, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,801 dated Nov. 21, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,818 dated Jan. 13, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/433,006 dated Jan. 10, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,794 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,948 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Dec. 30, 2020.
Goldstein et al. "Enhancing Security Event Management Systems with Unsupervised Anomaly Detection." in ICPRAM, pp. 530-538, 2013.
International Search Report issued in International Application No. PCT/US2019/035704 dated Oct. 8, 2019.
International Search Report issued in International Application No. PCT/US2019/035715 dated Sep. 4, 2019.
International Search Report issued in International Application No. PCT/US2019/035720 dated Aug. 27, 2019.
International Search Report issued in International Application No. PCT/US2019/035734 dated Aug. 16, 2019.
International Search Report issued in International Application No. PCT/US2019/035738 dated Aug. 16, 2019.
International Search Report issued in International Application No. PCT/US2019/035745 dated Aug. 16, 2019.
International Search Report issued in International Application No. PCT/US2019/035748 dated Aug. 26, 2019.
Kotento, I. et al. "The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems Sep. 2013 International Conference on Availability, Reliability and Security", pp. 638-645.
Murray, A., "How to Create a Radar Chart in Excel", Jan. 30, 2019, posted at howtogeek.com, [site visited Dec. 22, 2020]. https://www.howtogeek.com/402016/how-to-create-a-radar-chart-in-excel (Year: 2019), 2 pages.
Non-Final Office Action issued in counterpart U.S. Appl. No. 16/433,032 dated Nov. 18, 2019.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,794 dated Aug. 12, 2020.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Aug. 10, 2020.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,948 dated Aug. 10, 2020.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Aug. 12, 2020.
Non-Final Office Action issued in U.S. Appl. No. 16/432,488 dated Aug. 22, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,556 dated Sep. 30, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,614 dated Sep. 3, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,626 dated Aug. 8, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,649 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,671 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,689 dated Aug. 6, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,711 dated Aug. 29, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,733 dated Aug. 8, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,751 dated Aug. 12, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,762 dated Aug. 8, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,772 dated Jul. 23, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,780 dated Oct. 18, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,791 dated Jul. 31, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,801 dated Aug. 1, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,818 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,006 dated Sep. 5, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,022 dated Aug. 22, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,053 dated Aug. 22, 2019.
Notice of Allowance issued in counterpart U.S. Appl. No. 16/432,614 dated Jan. 10, 2020.
Pavlik, J. et al., "Security information and event management in the cloud computing infrastructure", 15th IEEE International Symposium on Computational Intelligence and Informatics, Nov. 19-21, 2014, Budapest, Hungary, 6 pages.
Reliaquest Blog, "New ReliaQuest GreyMatter Demos Fuel ReliaQuest's Momentum at Black Hat USA", Aug. 13, 2019, posted at reliaquest.com, [site visited Dec. 22, 2020]. https://www.reliaquest.com/blog/new-greymatter-demos-fuel-reliaquests-momentum-at-black-hat-usa (Year: 2019), 2 pages.
Shabtai, A. et al., "Detection of Malicious Code by Applying Machine Learning Classifers on Static Features: A State-of-the-art survey", Information Security Technical Report I4 (2009), pp. 16-29.
Warnecke, M. P., Master's Thesis, "Examining the Return on Investment of a Security Information and Event Management Solution in a Notional Department of Defense Network Environment", Naval Postgraduate School, Monterey, CA, Jun. 2013, 107 pages.

Cited By (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USD959453S1 (en)*2018-04-022022-08-02Illumina, Inc.Display screen or portion thereof with graphical user interface
USD956776S1 (en)*2018-12-142022-07-05Nutanix, Inc.Display screen or portion thereof with a user interface for a database time-machine
US11320978B2 (en)2018-12-202022-05-03Nutanix, Inc.User interface for database management services
US11907517B2 (en)2018-12-202024-02-20Nutanix, Inc.User interface for database management services
US11816066B2 (en)2018-12-272023-11-14Nutanix, Inc.System and method for protecting databases in a hyperconverged infrastructure system
US12026124B2 (en)2018-12-272024-07-02Nutanix, Inc.System and method for provisioning databases in a hyperconverged infrastructure system
US11604762B2 (en)2018-12-272023-03-14Nutanix, Inc.System and method for provisioning databases in a hyperconverged infrastructure system
US11860818B2 (en)2018-12-272024-01-02Nutanix, Inc.System and method for provisioning databases in a hyperconverged infrastructure system
USD942488S1 (en)*2020-06-012022-02-01Foresight Works LtdDisplay screen or a portion thereof with construction contracts-focused graphical user interface
USD942487S1 (en)*2020-06-012022-02-01Foresight Works LtdDisplay screen or a portion thereof with construction costs-focused graphical user interface
US11604705B2 (en)2020-08-142023-03-14Nutanix, Inc.System and method for cloning as SQL server AG databases in a hyperconverged system
US12019523B2 (en)2020-08-142024-06-25Nutanix, Inc.System and method for cloning as SQL server AG databases in a hyperconverged system
US12164541B2 (en)2020-08-282024-12-10Nutanix, Inc.Multi-cluster database management system
US11907167B2 (en)2020-08-282024-02-20Nutanix, Inc.Multi-cluster database management services
US11640340B2 (en)2020-10-202023-05-02Nutanix, Inc.System and method for backing up highly available source databases in a hyperconverged system
US12153499B2 (en)2020-10-202024-11-26Nutanix, Inc.System and method for backing up highly available source databases in a hyperconverged system
US11604806B2 (en)2020-12-282023-03-14Nutanix, Inc.System and method for highly available database service
US11995100B2 (en)2020-12-282024-05-28Nutanix, Inc.System and method for highly available database service
US11892918B2 (en)2021-03-222024-02-06Nutanix, Inc.System and method for availability group database patching
USD1035675S1 (en)*2021-05-142024-07-16Helio SilvaDisplay screen with a graphical user interface
US11803368B2 (en)2021-10-012023-10-31Nutanix, Inc.Network learning to control delivery of updates
US12105683B2 (en)2021-10-212024-10-01Nutanix, Inc.System and method for creating template for database services
US12174856B2 (en)2021-10-252024-12-24Nutanix, Inc.Database group management
US12306819B2 (en)2022-06-222025-05-20Nutanix, Inc.Database as a service on cloud
USD1066406S1 (en)*2023-10-052025-03-11Amba Health and Care LimitedDisplay screen or portion thereof with transitional graphical user interface

Also Published As

Publication numberPublication date
CA191609S (en)2022-06-27

Similar Documents

PublicationPublication DateTitle
USD986274S1 (en)Display screen or portion thereof with a graphical user interface
USD926200S1 (en)Display screen or portion thereof with a graphical user interface
USD1086200S1 (en)Display screen or portion thereof with graphical user interface
USD902951S1 (en)Display screen or portion thereof with a graphical user interface
USD890800S1 (en)Display screen or portion thereof with a graphical user interface
USD891456S1 (en)Display screen or portion thereof with a graphical user interface
USD926782S1 (en)Display screen or portion thereof with a graphical user interface
USD949165S1 (en)Portion of a display screen with a graphical user interface
USD917521S1 (en)Display screen or portion thereof with graphical user interface
USD941334S1 (en)Display screen or portion thereof with graphical user interface
USD906363S1 (en)Display screen or portion thereof with a graphical user interface
USD937858S1 (en)Display screen or portion thereof with graphical user interface
USD865804S1 (en)Display screen with graphical user interface
USD967170S1 (en)Portion of a display screen with a graphical user interface
USD922418S1 (en)Display screen or portion thereof with graphical user interface
USD926809S1 (en)Display screen or portion thereof with a graphical user interface
USD892825S1 (en)Display screen or portion thereof with graphical user interface
USD936073S1 (en)Display screen or portion thereof with a graphical user interface
USD929430S1 (en)Display screen or portion thereof with a graphical user interface
USD926810S1 (en)Display screen or portion thereof with a graphical user interface
USD910059S1 (en)Display screen or portion thereof with a graphical user interface
USD932504S1 (en)Display screen or portion thereof with a graphical user interface
USD969819S1 (en)Display screen or portion thereof with a graphical user interface
USD936672S1 (en)Display screen or portion thereof with graphical user interface
USD987681S1 (en)Display screen or portion thereof with graphical user interface

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY


[8]ページ先頭

©2009-2025 Movatter.jp