In July 2022, Dr. Pistoia was certified as the 248th most prolific American inventor of all time according to the US Patents and Trademarks Office. He is the inventor of the 646 patents listed below, 99 of which are in the areas of Quantum Computing, Quantum Communications, and quantum-inspired classical algorithms and applications. The rest of his intellectual property is in AI/ML, static program analysis, formal verification methods, language-based security and cybersecurity.
US-12362942-B2, Systems and Methods for Secure Client-Server Authentication with Key Recycling, 2025-07-15
US-12353952-B2, Systems And Methods For Preparation Of Normal Distributions On Quantum Computers, 2025-07-08
US-20250217802-A1, Zero-Knowledge Distributed Ledgers With Confidential Assets And Inter-Asset Auditing Capabilities, 2025-07-03
US-12333928-B2, Systems and Methods for Wayfinding in Hazardous Environments, 2025-06-17
US-12321715-B2, Method And System For Verification of Random Numbers, 2025-06-03
US-20250165825-A1, Systems And Methods For Tensor-Based Variational Quantum Algorithm Cost Function Landscape Generation, 2025-05-22
US-20250156702-A1, Systems And Methods For Generic Feature Suppression And Minimal Utility Presentation From Multi-Attribute Data, 2025-05-15
US-20250150281-A1, Systems And Methods For Secure Client-Server Authentication With Key Recycling, 2025-05-08
US-12259942-B2, Systems And Methods For Optimization Of Time Evolution For Quantum Computer-Based Eigenvalue Estimation, 2025-03-25
US-20250077924-A1, Systems And Methods For Hybrid Classical-Quantum Optimization Using Random Matrix Theory-Based Subproblem Identification On Correlation Matrices, 2025-03-06
US-12242562-B2, Systems And Methods For Enhanced Eigenvalue Inversion Using Quantum Conditional Logic, 2025-03-04
US-20250061335-A1, Systems And Methods For Providing Privacy Protection And Utility Preservation In Multi-Attribute Data Transformation With Theoretical Proofs, 2025-02-20
US-20250053827-A1, Systems And Methods For Decision Tree Construction And Update Using Quantum Algorithms, 2025-02-13
US-20250047651-A1, Systems And Methods For Mobile-Mediated Secure Key Exchange For General End-User Connectivity, 2025-02-06
US-12217329-B2, Systems And Methods For Dynamic Detection And Presentation Of Obscured Real-World Objects In Augmented Or Mixed Reality Virtual Content, 2025-02-04
US-12175342-B2, Quantum Reinforcement Learning Agent, 2024-12-24
US-12154001-B2, Parameter Extrapolation In Quantum Variational Circuits, 2024-11-26
US-12153554-B2, Systems And Methods For Removal Of Attributes From Multi-Modality And Multi-Attribute Data, 2024-11-26
US-20240356738-A1, Systems And Methods For Bridging Gaps In Cryptographic Secret Distribution Using Line-Of-Sight-Secured Networks, 2024-10-24
US-20240356741-A1, Systems And Methods For Secure Cryptographic Secret Distribution, 2024-10-24
US-20240330737-A1, Systems And Methods For Low-Cost Simulation Of Quantum Algorithms, 2024-10-03
US-12093128-B2, Systems And Methods For Efficient Error Mitigation In Quantum Circuit Execution Using Parity Checks And Classical Feedback, 2024-09-17
US-20240291640-A1, Systems And Methods For Quantum Key Distribution Secured Vault-Based Application-To-Application Communication, 2024-08-29
US-20240221477-A1, Systems And Methods For Wayfinding In Hazardous Environments, 2024-07-04
US-12013775-B2, Building Coverage Metrics And Testing Strategies For Mobile Testing Via View Enumeration, 2024-06-18
US-12008434-B2, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2024-06-11
US-12001921-B2, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2024-06-04
US-20240176694-A1, Systems And Methods For Efficient Error Mitigation In Quantum Circuit Execution Using Parity Checks And Classical Feedback, 2024-05-30
US-20240161002-A1, Quantum Reinforcement Learning Agent, 2024-05-16
US-11972681-B2, Systems And Methods For Wayfinding In Hazardous Environments, 2024-04-30
US-20240126761-A1, System And Methods For Processing Data Queries In Hybrid Data Mesh Architectures, 2024-04-18
US-20240104070-A1, Systems And Methods For Removal Of Attributes From Multi-Modality And Multi-Attribute Data, 2024-03-28
US-11921896-B2, Systems And Methods For Anonymizing A Dataset Of Biometric Data While Retaining Data Utility, 2024-03-05
US-11899660-B2, Systems And Methods For Optimized Cloud Database Query Execution, 2024-02-13
US-11894107-B2, Precision-Preserving Qubit Reduction Based On Spatial Symmetries In Fermionic Systems, 2024-02-06
US-20240020303-A1, Systems And Methods For Optimized Cloud Database Query Execution, 2024-01-18
US-11874838-B2, Automatic Quantum Searching Of Object Databases, 2024-01-16
US-20230419096-A1, Systems And Methods For Concealing Uninterested Attributes In Multi-Attribute Data Using Generative Adversarial Networks, 2023-12-28
US-11836470-B2, Adaptive Quantum Circuit Construction For Multiple-Controlled-Not Gates, 2023-12-05
US-11789724-B2, Machine Learning To Facilitate Incremental Static Program Analysis, 2023-10-17
US-20230298101-A1, Systems And Methods For Quantum Computing-Assisted Portfolio Selection, 2023-09-21
US-11762758-B2, Source Code Fault Detection, 2023-09-19
US-11734387-B2, Iterative Energy-Scaled Variational Quantum Eigensolver, 2023-08-22
US-20230229933-A1, Systems And Methods For Implementing Quantum Branch-And-Bound Algorithms With Heuristics, 2023-07-20
US-20230214581-A1, Systems And Methods For Quantum Computing-Based Extractive Summarization, 2023-07-06
US-20230185875-A1, Systems And Methods For Implementing All-To-All Connectivity In Gate-Based Quantum Computers Using Nearest-Neighbor Interactions, 2023-06-15
US-11676056-B2, Calculating Excited State Properties Of A Molecular System Using A Hybrid Classical-Quantum Computing System, 2023-06-13
US-11657196-B2, Incremental Generation Of Quantum Circuits, 2023-05-23
US-11651232-B2, Monte Carlo Markov Chain Based Quantum Program Optimization, 2023-05-16
US-20230142419-A1, Adaptive Quantum Circuit Construction For Multiple-Controlled-Not Gates, 2023-05-11
US-20230132523-A1, Systems And Methods For Wayfinding In Hazardous Environments, 2023-05-04
US-20230120993-A1, Systems And Methods For Automatic Redaction Of Sensitive Information From Video Streams, 2023-04-20
US-20230113125-A1, Systems And Methods For Dynamic Detection And Presentation Of Obscured Real-World Objects In Augmented Or Mixed Reality Virtual Content, 2023-04-13
US-11620534-B2, Automatic Generation Of Ising Hamiltonians For Solving Optimization Problems In Quantum Computing, 2023-04-04
US-11609751-B2, Adaptive Quantum Circuit Construction For Multiple-Controlled-NOT Gates, 2023-03-21
US-11599823-B2, Quantum Reinforcement Learning Agent, 2023-03-07
US-11574458-B2, Automated Survey Results Generation From An Image, 2023-02-07
US-20230017335-A1, Systems And Methods For Canonical Construction Of Quantum Oracles, 2023-01-19
US-11556830-B2, Efficient Quadratic Ising Hamiltonian Generation With Qubit Reduction, 2023-01-17
US-11544611-B2, Quantum Computation Of Molecular Excited States In The Presence Of Hamiltonian Symmetries, 2023-01-03
US-20220414510-A1, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2022-12-29
US-20220414511-A1, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2022-12-29
US-20220391468-A1, Systems And Methods For Preparation Of Normal Distributions On Quantum Computers, 2022-12-08
US-11522949-B1, Systems And Methods For Cloud-Based Hybrid Service Meshes In Microservice Architectures, 2022-12-06
US-20220382827-A1, Systems And Methods For Enhanced Eigenvalue Inversion Using Quantum Conditional Logic, 2022-12-01
US-20220382830-A1, Systems And Methods For Optimization Of Time Evolution For Quantum Computer-Based Eigenvalue Estimation, 2022-12-01
US-11507397-B2, Systems And Methods For Zero-Footprint And Safe Execution Of Quantum Computing Programs, 2022-11-22
US-20220308984-A1, Source Code Fault Detection, 2022-09-29
US-11436129-B2, System, Method And Recording Medium For Generating Mobile Test Sequences, 2022-09-06
US-11403196-B2, Widget Provisioning Of User Experience Analytics And User Interface / Application Management, 2022-08-02
US-11394537-B2, Homomorphic Encryption With Quantum Key Distribution Encapsulation, 2022-07-19
US-11372651-B2, Bootstrapping A Variational Algorithm For Quantum Computing, 2022-06-28
US-20220198061-A1, Systems And Methods For Anonymizing A Dataset Of Biometric Data While Retaining Data Utility, 2022-06-23
US-20220188381-A1, Iterative Energy-Scaled Variational Quantum Eigensolver, 2022-06-16
US-11341427-B2, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2022-05-24
US-11334810-B2, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2022-05-17
US-20220137989-A1, Systems And Methods For Zero-Footprint And Safe Execution Of Quantum Computing Programs, 2022-05-05
US-11321625-B2, Quantum Circuit Optimization Using Machine Learning, 2022-05-03
US-11321619-B2, State Dependent Calibration Of Qubit Measurements, 2022-05-03
US-20220131690-A1, Homomorphic Encryption With Quantum Key Distribution Encapsulation, 2022-04-28
US-11316896-B2, Privacy-Preserving User-Experience Monitoring, 2022-04-26
US-20220121980-A1, Automatic Quantum Searching Of Object Databases, 2022-04-21
US-11294986-B2, Iterative Energy-Scaled Variational Quantum Eigensolver, 2022-04-05
US-20220050873-A1, Systems And Methods For Optimized Quantum Searching Using A Binomial Version Of Grover's Search Algorithm, 2022-02-17
US-11244057-B2, Value Based Information Tracking For Security Enforcement, 2022-02-08
US-11243248-B2, Symbolic Backend For Execution Of Quantum Programs, 2022-02-08
US-11240853-B2, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2022-02-01
US-11238359-B2, Simplified Quantum Programming, 2022-02-01
US-11238043-B2, Automatic Quantum Searching Of Object Databases, 2022-02-01
US-11227045-B2, System, Method And Apparatus For Extracting Usage-Based Fine Grained Permissions, 2022-01-18
US-20220012390-A1, Incremental Generation Of Quantum Circuits, 2022-01-13
US-11222135-B2, User Device Privacy Protection, 2022-01-11
US-11194946-B2, Optimization Of Quantum Circuits, 2021-12-07
US-11194908-B2, Synthesizing Sanitization Code For Applications Based Upon Probabilistic Prediction Model, 2021-12-07
US-11184438-B2, Omnichannel Approach To Application Sharing Across Different Devices, 2021-11-23
US-11182523-B2, Incremental Generation Of Quantum Circuits, 2021-11-23
US-20210357229-A1, Systems And Methods For Optimized Quantum Searching, 2021-11-18
US-11176267-B2, Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In Privacy Enforcement, 2021-11-16
US-11163891-B2, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2021-11-02
US-11138319-B2, Light-Weight Context Tracking And Repair For Preventing Integrity And Confidentiality Violations, 2021-10-05
US-11128706-B2, Omnichannel Approach To Application Sharing Across Different Devices, 2021-09-21
US-11128707-B2, Omnichannel Approach To Application Sharing Across Different Devices, 2021-09-21
US-20210247963-A1, Method And System For Verification Of Random Numbers, 2021-08-12
US-11074519-B2, Quantum Algorithm Concatenation, 2021-07-27
US-11048485-B2, User Interface Code Re-Use Based Upon Machine Learning Of Design Documents, 2021-06-29
US-11032306-B2, System, Method And Apparatus For Fully Precise Hybrid Security Verification Of Mobile Applications, 2021-06-08
US-20210157553-A1, Source Code Auto-Suggestion Based On Structural And Semantic Features, 2021-05-27
US-20210157877-A1, Iterative Energy-Scaled Variational Quantum Eigensolver, 2021-05-27
US-11017084-B2, Detection Of Malicious Code Fragments Via Data-Flow Isolation, 2021-05-25
US-20210150400-A1, Efficient Quadratic Ising Hamiltonian Generation With Qubit Reduction, 2021-05-20
US-20210118529-A1, Precision-Preserving Qubit Reduction Based On Spatial Symmetries In Fermionic Systems, 2021-04-22
US-10956580-B2, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2021-03-23
US-10956562-B2, Developing Applications Using Precise Static Security Analysis, 2021-03-23
US-20210049482-A1, State Dependent Calibration Of Qubit Measurements, 2021-02-18
US-20210049498-A1, Quantum Reinforcement Learning Agent, 2021-02-18
US-10915659-B2, Privacy Detection Of A Mobile Application Program, 2021-02-09
US-10846401-B2, System, Method And Apparatus For Usable Code-Level Statistical Analysis With Applications In Malware Detection, 2020-11-24
US-10846080-B2, Cooperative Updating Of Software, 2020-11-24
US-10839312-B2, Warning Filter Based On Machine Learning, 2020-11-17
US-10838915-B2, Data-Centric Approach To Analysis, 2020-11-17
US-10831495-B2, Parallelization Of Numeric Optimizers, 2020-11-10
US-10831455-B2, Quantum Circuit Compilation With Quantum Libraries As A Service, 2020-11-10
US-10832173-B1, Cognitive Software Development, 2020-11-10
US-20200349309-A1, Incremental Generation Of Quantum Circuits, 2020-11-05
US-20200342344-A1, Quantum Circuit Optimization Using Machine Learning, 2020-10-29
US-20200342293-A1, Quantum Computational Method And Device, 2020-10-29
US-20200327438-A1, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2020-10-15
US-20200327439-A1, Adiabatic Progression With Intermediate Re-Optimization To Solve Hard Variational Quantum Problems In Quantum Computing, 2020-10-15
US-10803395-B2, Quantum Computations Of Classical Specifications, 2020-10-13
US-10803215-B2, Incremental Generation Of Quantum Circuits, 2020-10-13
US-20200311589-A1, Calculating Excited State Properties Of A Molecular System Using A Hybrid Classical-Quantum Computing System, 2020-10-01
US-20200302306-A1, Automatic Generation Of Ising Hamiltonians For Solving Optimization Problems In Quantum Computing, 2020-09-24
US-20200293935-A1, Parameter Extrapolation In Quantum Variational Circuits, 2020-09-17
US-10762063-B2, Cognitive Mobile Application Design Search Engine Including A Keyword Search, 2020-09-01
US-10754947-B2, System, Method And Apparatus For Usable Code-Level Statistical Analysis With Applications In Malware Detection, 2020-08-25
US-10754622-B2, Extracting Mobile Application Workflow From Design Files, 2020-08-25
US-10742666-B2, System And Method For Static Detection And Categorization Of Information-Flow Downgraders, 2020-08-11
US-10740071-B2, Predicting And Using Utility Of Script Execution In Functional Web Crawling And Other Crawling, 2020-08-11
US-10740659-B2, Fusing Sparse Kernels To Approximate A Full Kernel Of A Convolutional Neural Network, 2020-08-11
US-10726357-B2, Cross-Platform Program Analysis Using Machines Learning Based On Universal Features, 2020-07-28
US-20200233671-A1, Parallelization Of Numeric Optimizers, 2020-07-23
US-10721419-B2, Ortho-Selfie Distortion Correction Using Multiple Image Sensors To Synthesize A Virtual Image, 2020-07-21
US-10713055-B2, Parallelization Of Numeric Optimizers, 2020-07-14
US-20200218805-A1, Synthesizing Sanitization Code For Applications Based Upon Probabilistic Prediction Model, 2020-07-09
US-20200218518-A1, Quantum Circuit Compilation With Quantum Libraries As A Service, 2020-07-09
US-20200210787-A1, Automated Survey Results Generation From An Image, 2020-07-02
US-10699212-B2, Cross-Platform Program Analysis Using Machine Learning Based On Universal Features, 2020-06-30
US-10701099-B2, Providing Efficient Information Tracking With Dynamically Selected Precision, 2020-06-30
US-10698789-B1, Fuzz Testing For Quantum SDK, 2020-06-30
US-20200202009-A1, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2020-06-25
US-20200202247-A1, Adaptive Quantum Circuit Construction For Multiple-Controlled-Not Gates, 2020-06-25
US-20200193319-A1, Quantum Computation Of Molecular Excited States In The Presence Of Hamiltonian Symmetries, 2020-06-18
US-20200192993-A1, Incremental Generation Of Quantum Circuits, 2020-06-18
US-20200183938-A1, Automatic Quantum Searching Of Object Databases, 2020-06-11
US-20200183814-A1, Fuzz Testing For Quantum Sdk, 2020-06-11
US-20200183664-A1, User Interface Code Re-Use Based Upon Machine Learning Of Design Documents, 2020-06-11
US-10678517-B1, User Interface Synthesis Based Upon Extracted Presentation Document Graphical Features, 2020-06-09
US-20200175200-A1, Privacy Detection Of A Mobile Application Program, 2020-06-04
US-20200174914-A1, System, Method And Recording Medium For Generating Mobile Test Sequences, 2020-06-04
US-10671517-B2, Generating Mobile Test Sequences, 2020-06-02
US-10649740-B2, Predicting And Using Utility Of Script Execution In Functional Web Crawling And Other Crawling, 2020-05-12
US-10650149-B2, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2020-05-12
US-20200133676-A1, Parallelization Of Numeric Optimizers, 2020-04-30
US-10637480-B1, Multi-Control Quantum State Inversion Gate, 2020-04-28
US-20200128593-A1, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2020-04-23
US-20200116784-A1, Symbolic Backend For Execution Of Quantum Programs, 2020-04-16
US-10621333-B2, Install-Time Security Analysis Of Mobile Applications, 2020-04-14
US-10621062-B2, Widget Provisioning Of User Experience Analytics And User Interface / Application Management, 2020-04-14
US-10614243-B2, Privacy Detection Of A Mobile Application Program, 2020-04-07
US-10614224-B2, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2020-04-07
US-20200097859-A1, Quantum Algorithm Concatenation, 2020-03-26
US-10599399-B2, Mobile User Interface Design Testing Tool, 2020-03-24
US-20200082099-A1, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2020-03-12
US-20200081995-A1, Data-Centric Approach To Analysis, 2020-03-12
US-20200082096-A1, Value Based Information Tracking For Security Enforcement, 2020-03-12
US-20200081721-A1, Bootstrapping A Variational Algorithm For Quantum Computing, 2020-03-12
US-20200081705-A1, Cooperative Updating Of Software, 2020-03-12
US-10585640-B2, Automated Voice Enablement Of Applications, 2020-03-10
US-20200074035-A1, Design Optimization Of Quantum Circuits, 2020-03-05
US-10565470-B2, System, Method And Recording Medium For User Interface (UI)-Level Clone Detection, 2020-02-18
US-20200042882-A1, Monte Carlo Markov Chain Based Quantum Program Optimization, 2020-02-06
US-10548172-B2, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2020-01-28
US-10545848-B2, Boosting The Efficiency Of Static Program Analysis Using Configuration Tuning, 2020-01-28
US-10531293-B2, Social And Proximity Based Access Control For Mobile Applications, 2020-01-07
US-20190378047-A1, Quantum Computations Of Classical Specifications, 2019-12-12
US-10503929-B2, Visually Configurable Privacy Enforcement, 2019-12-10
US-20190361788-A1, Interactive Analysis Of A Security Specification, 2019-11-28
US-20190362095-A1, User Device Privacy Protection, 2019-11-28
US-10489127-B2, Mapping Of Software Code Via User Interface Summarization, 2019-11-26
US-10484868-B2, Configuring Privacy Policies By Formulating Questions And Evaluating Responses, 2019-11-19
US-10481865-B2, Automated Voice Enablement Of Applications, 2019-11-19
US-20190340093-A1, Widget Provisioning Of User Experience Analytics And User Interface / Application Management, 2019-11-07
US-20190318088-A1, System, Method And Apparatus For Usable Code-Level Statistical Analysis With Applications In Malware Detection, 2019-10-17
US-10417116-B2, System, Method, And Apparatus For Crowd-Sourced Gathering Of Application Execution Events For Automatic Application Testing And Replay, 2019-09-17
US-20190268413-A1, Omnichannel Approach To Application Sharing Across Different Devices, 2019-08-29
US-20190268414-A1, Omnichannel Approach To Application Sharing Across Different Devices, 2019-08-29
US-20190268415-A1, Omnichannel Approach To Application Sharing Across Different Devices, 2019-08-29
US-10387288-B2, Interactive Analysis Of A Security Specification, 2019-08-20
US-10372582-B2, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2019-08-06
US-20190220782-A1, Simplified Quantum Programming, 2019-07-18
US-20190187958-A1, Extracting Mobile Application Workflow From Design Files, 2019-06-20
US-20190188287-A1, Cognitive Mobile Application Design Search Engine, 2019-06-20
US-20190188526-A1, Fusing Sparse Kernels To Approximate A Full Kernel Of A Convolutional Neural Network, 2019-06-20
US-20190188117-A1, System, Method And Recording Medium For Generating Mobile Test Sequences, 2019-06-20
US-20190188559-A1, System, Method And Recording Medium For Applying Deep Learning To Mobile Application Testing, 2019-06-20
US-20190188529-A1, System, Method And Recording Medium For User Interface (Ui)-Level Clone Detection, 2019-06-20
US-10324820-B2, Providing Specialization For Static Program Analysis Using Coding Hints, 2019-06-18
US-20190166314-A1, Ortho-Selfie Distortion Correction Using Multiple Sources, 2019-05-30
US-20190156028-A1, Detection Of Malicious Code Fragments Via Data-Flow Isolation, 2019-05-23
US-10298678-B2, Omnichannel Approach To Application Sharing Across Different Devices, 2019-05-21
US-10296737-B2, Security Enforcement In The Presence Of Dynamic Code Loading, 2019-05-21
US-10289540-B2, Performing Entropy-Based Dataflow Analysis, 2019-05-14
US-20190129828-A1, Gathering Coverage Metrics For Static Program Analysis Tools, 2019-05-02
US-10275238-B2, Hybrid Program Analysis, 2019-04-30
US-20190121608-A1, Automated Voice Enablement Of Applications, 2019-04-25
US-20190121618-A1, Prospective Voice User Interface Modality Identification, 2019-04-25
US-20190121619-A1, Prospective Voice User Interface Modality Identification, 2019-04-25
US-20190121609-A1, Automated Voice Enablement Of Applications, 2019-04-25
US-20190121987-A1, Light-Weight Context Tracking And Repair For Preventing Integrity And Confidentiality Violations, 2019-04-25
US-10268350-B2, Automatically Capturing User Interactions And Evaluating User Interfaces In Software Programs Using Field Testing, 2019-04-23
US-10268457-B1, Prospective Voice User Interface Modality Identification, 2019-04-23
US-10268458-B1, Prospective Voice User Interface Modality Identification, 2019-04-23
US-20190114156-A1, Mapping Of Software Code Via User Interface Summarization, 2019-04-18
US-10248965-B2, Location Oriented Membership Code Device, 2019-04-02
US-10250642-B2, System, Method And Apparatus For Fine-Grained Privacy Specification And Verification, 2019-04-02
US-10248385-B1, Extracting Mobile Application Workflow From Design Files, 2019-04-02
US-10237734-B2, Social And Proximity Based Access Control For Mobile Applications, 2019-03-19
US-10228917-B2, Mapping Of Software Code Via User Interface Summarization, 2019-03-12
US-10222955-B2, Automatically Capturing User Interactions And Evaluating User Interfaces In Software Programs Using Field Testing, 2019-03-05
US-10223079-B2, Mapping Of Software Code Via User Interface Summarization, 2019-03-05
US-10218587-B2, Transparently Tracking Provenance Information In Distributed Data Systems, 2019-02-26
US-10218777-B2, System, Method And Apparatus For Ad-Hoc Utilization Of Available Resources Across Mobile Devices, 2019-02-26
US-10216954-B2, Privacy Detection Of A Mobile Application Program, 2019-02-26
US-10212054-B2, Transparently Tracking Provenance Information In Distributed Data Systems, 2019-02-19
US-20180365414-A1, Developing Applications Using Precise Static Security Analysis, 2018-12-20
US-20180357446-A1, Privacy Detection Of A Mobile Application Program, 2018-12-13
US-20180332637-A1, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2018-11-15
US-20180329694-A1, Mapping Of Software Code Via User Interface Summarization, 2018-11-15
US-20180329695-A1, Mapping Of Software Code Via User Interface Summarization, 2018-11-15
US-20180330097-A1, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2018-11-15
US-20180330101-A1, Identifying Computer Program Security Access Control Violations Using Static Analysis, 2018-11-15
US-10127689-B2, Mobile User Interface Design Testing Tool, 2018-11-13
US-10095490-B2, System, Method And Apparatus For Preventing Vulnerable Interleavings In Web Applications At Compile Time, 2018-10-09
US-20180286082-A1, Mobile User Interface Design Testing Tool, 2018-10-04
US-10080248-B2, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2018-09-18
US-10073975-B2, Application Integrity Verification In Multi-Tier Architectures, 2018-09-11
US-20180239681-A1, Widget Provisioning Of User Experience Analytics And User Interface / Application Management, 2018-08-23
US-10055590-B2, Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis, 2018-08-21
US-20180206115-A1, Configuring Privacy Policies By Formulating Questions And Evaluating Responses, 2018-07-19
US-10015181-B2, Using Natural Language Processing For Detection Of Intended Or Unexpected Application Behavior, 2018-07-03
US-20180174330-A1, Mobile User Interface Design Testing Tool, 2018-06-21
US-9996324-B1, Cooperative Creation Of Dataflow Models Using Sparse Random Instrumentation, 2018-06-12
US-20180121657-A1, Security Risk Evaluation, 2018-05-03
US-9946629-B2, System, Method And Apparatus For Deriving Root Cause For Software Test Failure, 2018-04-17
US-20180101471-A1, Performing Entropy-Based Dataflow Analysis, 2018-04-12
US-20180101463-A1, Boosting The Efficiency Of Static Program Analysis Using Configuration Tuning, 2018-04-12
US-9940464-B2, Static Security Analysis Using A Hybrid Representation Of String Values, 2018-04-10
US-9940465-B2, Static Security Analysis Using A Hybrid Representation Of String Values, 2018-04-10
US-9940478-B2, Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In Privacy Enforcement, 2018-04-10
US-20180091541-A1, Providing Efficient Information Tracking With Dynamically Selected Precision, 2018-03-29
US-20180089439-A1, Detection Of Ipc-Based Mobile Vulnerabilities Due To Insufficient Caller Permissions, 2018-03-29
US-20180081789-A1, Providing Specialization For Static Program Analysis Using Coding Hints, 2018-03-22
US-9910833-B2, Automatically Rendering Web And/Or Hybrid Applications Natively In Parallel, 2018-03-06
US-20180060068-A1, Machine Learning To Facilitate Incremental Static Program Analysis, 2018-03-01
US-20180053016-A1, Visually Configurable Privacy Enforcement, 2018-02-22
US-9900340-B2, Testing Web Applications For Security Vulnerabilities With Metarequests, 2018-02-20
US-20180046810-A1, Application Integrity Verification In Multi-Tier Architectures, 2018-02-15
US-20180046934-A1, Warning Filter Based On Machine Learning, 2018-02-15
US-9892263-B2, System, Method And Apparatus To Visually Configure An Analysis Of A Program, 2018-02-13
US-20180039774-A1, Install-Time Security Analysis Of Mobile Applications, 2018-02-08
US-9888021-B2, Crowd Based Detection Of Device Compromise In Enterprise Setting, 2018-02-06
US-20180032424-A1, System, Method, And Apparatus For Crowd-Sourced Gathering Of Application Execution Events For Automatic Application Testing And Replay, 2018-02-01
US-20180035285-A1, Semantic Privacy Enforcement, 2018-02-01
US-20180034857-A1, System, Method And Apparatus For Fine-Grained Privacy Specification And Verification, 2018-02-01
US-20180032319-A1, System, Method And Apparatus For Preventing Vulnerable Interleavings In Web Applications At Compile Time, 2018-02-01
US-20180027019-A1, Privacy-Preserving User-Experience Monitoring, 2018-01-25
US-20180012140-A1, Cross-Platform Program Analysis Using Machine Learning Based On Universal Features, 2018-01-11
US-20180012142-A1, Cross-Platform Program Analysis Using Machines Learning Based On Universal Features, 2018-01-11
US-9858419-B2, System, Method, And Apparatus For Modular, String-Sensitive, Access Rights Analysis With Demand-Driven Precision, 2018-01-02
US-20170372095-A1, Privacy Detection Of A Mobile Application Program, 2017-12-28
US-20170372060-A1, System, Method And Apparatus For Extracting Usage-Based Fine Grained Permissions, 2017-12-28
US-20170374693-A1, System, Method And Apparatus For Sensor Virtualization In Mobile Devices, 2017-12-28
US-20170367086-A1, System, Method And Apparatus For Ad-Hoc Utilization Of Available Resources Across Mobile Devices, 2017-12-21
US-9836608-B2, System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-Control And Integrity Policies, 2017-12-05
US-9836193-B2, Automatically Capturing User Interactions And Evaluating User Interfaces In Software Programs Using Field Testing, 2017-12-05
US-20170344106-A1, Reducing Hazards During Mobile Device Use, 2017-11-30
US-20170344463-A1, System And Method For Bypassing Evasion Tests With Applications In Analysis And Monitoring Of Mobile Applications, 2017-11-30
US-20170344459-A1, System, Method And Apparatus For Deriving Root Cause For Software Test Failure, 2017-11-30
US-20170339175-A1, Using Natural Language Processing For Detection Of Intended Or Unexpected Application Behavior, 2017-11-23
US-9823998-B2, Trace Recovery Via Statistical Reasoning, 2017-11-21
US-20170300699-A1, System, Method And Apparatus To Visually Configure An Analysis Of A Program, 2017-10-19
US-9787798-B2, Generating Collapsed User Interface Interaction Sequence Controls In Mobile Applications, 2017-10-10
US-20170286726-A1, Location Oriented Membership Code Device, 2017-10-05
US-9747187-B2, Simulating Black Box Test Results Using Information From White Box Testing, 2017-08-29
US-9733927-B2, Detection Of Software Or Hardware Incompatibilities In Software Packages, 2017-08-15
US-9720798-B2, Simulating Black Box Test Results Using Information From White Box Testing, 2017-08-01
US-20170208087-A1, Testing Web Applications For Security Vulnerabilities With Metarequests, 2017-07-20
US-9705910-B2, Testing Web Applications For Security Vulnerabilities With Metarequests, 2017-07-11
US-9706009-B2, Generating Collapsed User Interface Interaction Sequence Controls In Mobile Applications, 2017-07-11
US-9703990-B2, Protecting Content Displayed On A Mobile Device, 2017-07-11
US-20170195358-A1, System, Method And Apparatus For Fully Precise Hybrid Security Verification Of Mobile Applications, 2017-07-06
US-9697108-B2, System, Method, And Apparatus For Automatic Recording And Replaying Of Application Executions, 2017-07-04
US-9697018-B2, Synthesizing Inputs To Preserve Functionality, 2017-07-04
US-9684803-B2, Protecting Content Displayed On A Mobile Device, 2017-06-20
US-9684804-B2, Protecting Content Displayed On A Mobile Device, 2017-06-20
US-9684788-B2, Self-Repair And Distributed-Repair Of Applications, 2017-06-20
US-20170168922-A1, Building Coverage Metrics And Testing Strategies For Mobile Testing Via View Enumeration, 2017-06-15
US-20170169212-A1, Security Enforcement In The Presence Of Dynamic Code Loading, 2017-06-15
US-9680859-B2, System, Method And Apparatus To Visually Configure An Analysis Of A Program, 2017-06-13
US-20170161176-A1, Trace Recovery Via Statistical Reasoning, 2017-06-08
US-20170154182-A1, System, Method And Apparatus For Usable Code-Level Statistical Analysis With Applications In Malware Detection, 2017-06-01
US-20170131999-A1, Detection Of Software Or Hardware Incompatibilities In Software Packages, 2017-05-11
US-9619222-B2, System, Method And Apparatus For Automatic Device Registration And Secure Application Activation, 2017-04-11
US-20170093899-A1, Crowd-Based Detection Of Device Compromise In Enterprise Setting, 2017-03-30
US-9607154-B2, System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-Control And Integrity Policies, 2017-03-28
US-20170039375-A1, System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-Control And Integrity Policies, 2017-02-09
US-9558014-B2, System, Method And Apparatus For Transparently Enabling Software Applications With Adaptive User Interfaces, 2017-01-31
US-20170019412-A1, Social And Proximity Based Access Control For Mobile Applications, 2017-01-19
US-20170019787-A1, Social And Proximity Based Access Control For Mobile Applications, 2017-01-19
US-20160378995-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2016-12-29
US-20160378987-A1, Self-Repair And Distributed-Repair Of Applications, 2016-12-29
US-9531600-B2, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2016-12-27
US-20160357947-A1, Protecting Content Displayed On A Mobile Device, 2016-12-08
US-20160357992-A1, Protecting Content Displayed On A Mobile Device, 2016-12-08
US-20160358014-A1, Protecting Content Displayed On A Mobile Device, 2016-12-08
US-20160350155-A1, Synthesizing Inputs To Preserve Functionality, 2016-12-01
US-20160344761-A1, System, Method And Apparatus To Visually Configure An Analysis Of A Program, 2016-11-24
US-20160335434-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2016-11-17
US-9485268-B2, System, Method And Apparatus To Visually Configure An Analysis Of A Program, 2016-11-01
US-9479512-B2, Social And Proximity Based Access Control For Mobile Applications, 2016-10-25
US-9471553-B2, Automatically Rendering Web Or Hybrid Applications Natively, 2016-10-18
US-9473507-B2, Social And Proximity Based Access Control For Mobile Applications, 2016-10-18
US-9459990-B2, Automatic And Transparent Application Logging, 2016-10-04
US-9460282-B2, Static Security Analysis Using A Hybrid Representation Of String Values, 2016-10-04
US-9459986-B2, Automatic Generation Of Analysis-Equivalent Application Constructs, 2016-10-04
US-9449190-B2, Method And System For Run-Time Dynamic And Interactive Identification Software Authorization Requirements And Privileged Code Locations, And For Validation Of Other Software Program Analysis Results, 2016-09-20
US-9443102-B2, Protecting Content Displayed On A Mobile Device, 2016-09-13
US-20160246990-A1, Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In Privacy Enforcement, 2016-08-25
US-20160246992-A1, Fine-Grained User Control Over Usages Of Sensitive System Resources Having Private Data With Applications In Privacy Enforcement, 2016-08-25
US-9424423-B2, Static Security Analysis Using A Hybrid Representation Of String Values, 2016-08-23
US-20160234246-A1, Testing Web Applications For Security Vulnerabilities With Metarequests, 2016-08-11
US-9405916-B2, Automatic Correction Of Security Downgraders, 2016-08-02
US-20160210217-A1, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2016-07-21
US-20160210125-A1, Predicting And Using Utility Of Script Execution In Functional Web Crawling And Other Crawling, 2016-07-21
US-20160210361-A1, Predicting And Using Utility Of Script Execution In Functional Web Crawling And Other Crawling, 2016-07-21
US-20160210473-A1, Protecting Content Displayed On A Mobile Device, 2016-07-21
US-9396336-B2, Automatic Correction Of Security Downgraders, 2016-07-19
US-9384354-B2, Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis, 2016-07-05
US-20160188139-A1, Generating Collapsed User Interface Interaction Sequence Controls In Mobile Applications, 2016-06-30
US-20160188144-A1, Generating Collapsed User Interface Interaction Sequence Controls In Mobile Applications, 2016-06-30
US-9372779-B2, System, Method, Apparatus And Computer Program For Automatic Evaluation Of User Interfaces In Software Programs, 2016-06-21
US-9369349-B2, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2016-06-14
US-9363284-B2, Testing Web Applications For Security Vulnerabilities With Metarequests, 2016-06-07
US-20160156650-A1, System And Method For Static Detection And Categorization Of Information-Flow Downgraders, 2016-06-02
US-20160134494-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2016-05-12
US-9336120-B2, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2016-05-10
US-9338063-B2, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2016-05-10
US-20160119208-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2016-04-28
US-8990949-B2, Automatic Correction Of Security Downgraders, 2015-03-24
US-8984493-B2, Distributed Static Analysis Of Computer Software Applications, 2015-03-17
US-8984642-B2, Detecting Security Vulnerabilities In Web Applications, 2015-03-17
US-8984495-B2, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2015-03-17
US-20150067653-A1, Automatic Generation Of Analysis-Equivalent Application Constructs, 2015-03-05
US-20150067660-A1, Building Reusable Function Summaries For Frequently Visited Methods To Optimize Data-Flow Analysis, 2015-03-05
US-20150067834-A1, Building Reusable Function Summaries For Frequently Visited Methods To Optimize Data-Flow Analysis, 2015-03-05
US-20150067664-A1, System, Method And Apparatus For Transparently Enabling Software Applications With Adaptive User Interfaces, 2015-03-05
US-8972334-B2, Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications, 2015-03-03
US-20150052503-A1, Automatically Capturing User Interactions And Evaluating User Interfaces In Software Programs Using Field Testing, 2015-02-19
US-20150046909-A1, System, Method, And Apparatus For Automatic Recording And Replaying Of Application Executions, 2015-02-12
US-8955139-B2, Sound And Effective Data-Flow Analysis In The Presence Of Aliasing, 2015-02-10
US-8955058-B2, Automatically Generating Challenge Questions Inferred From User History Data For User Authentication, 2015-02-10
US-8949995-B2, Certifying Server Side Web Applications Against Security Vulnerabilities, 2015-02-03
US-8943599-B2, Certifying Server Side Web Applications Against Security Vulnerabilities, 2015-01-27
US-8935674-B2, Determining Correctness Conditions For Use In Static Analysis, 2015-01-13
US-8935680-B2, Differential Static Program Analysis, 2015-01-13
US-8930884-B2, Efficient Extraction Of Software Dependencies From Program Code, 2015-01-06
US-8931101-B2, Application-Level Anomaly Detection, 2015-01-06
US-8918886-B2, Training Classifiers For Program Analysis, 2014-12-23
US-20140373157-A1, After-The-Fact Configuration Of Static Analysis Tools Able To Reduce User Burden, 2014-12-18
US-20140373159-A1, After-The-Fact Configuration Of Static Analysis Tools Able To Reduce User Burden, 2014-12-18
US-8914890-B2, Determining The Vulnerability Of Computer Software Applications To Privilege-Escalation Attacks, 2014-12-16
US-20140366146-A1, Interactive Analysis Of A Security Specification, 2014-12-11
US-8910293-B2, Determining The Vulnerability Of Computer Software Applications To Privilege-Escalation Attacks, 2014-12-09
US-8904543-B2, Discovery Of Application Vulnerabilities Involving Multiple Execution Flows, 2014-12-02
US-20140349571-A1, Method, Apparatus And Computer Program Product Providing Performance And Energy Optimization For Mobile Computing, 2014-11-27
US-20140351310-A1, Method, Apparatus And Computer Program Product Providing Performance And Energy Optimization For Mobile Computing, 2014-11-27
US-8898188-B2, String Analysis Based On Three-Valued Logic, 2014-11-25
US-20140344938-A1, Progressive Static Security Analysis, 2014-11-20
US-20140344939-A1, Progressive Static Security Analysis, 2014-11-20
US-8881300-B2, Automated Detection Of Flaws And Incompatibility Problems In Information Flow Downgraders, 2014-11-04
US-8875297-B2, Interactive Analysis Of A Security Specification, 2014-10-28
US-20140317747-A1, Partitioning Of Program Analyses Into Sub-Analyses Using Dynamic Hints, 2014-10-23
US-20140317748-A1, Partitioning Of Program Analyses Into Sub-Analyses Using Dynamic Hints, 2014-10-23
US-8863292-B2, Interactive Analysis Of A Security Specification, 2014-10-14
US-8856764-B2, Distributed Static Analysis Of Computer Software Applications, 2014-10-07
US-20140298476-A1, System, Method, Apparatus And Computer Programs For Securely Using Public Services For Private Or Enterprise Purposes, 2014-10-02
US-20140298477-A1, System, Method, Apparatus And Computer Programs For Securely Using Public Services For Private Or Enterprise Purposes, 2014-10-02
US-8850405-B2, Generating Sound And Minimal Security Reports Based On Static Analysis Of A Program, 2014-09-30
US-8850589-B2, Training Classifiers For Program Analysis, 2014-09-30
US-8844046-B2, Method And Apparatus For Paralleling And Distributing Static Source Code Security Analysis Using Loose Synchronization, 2014-09-23
US-20140258992-A1, Scalable And Precise String Analysis Using Index-Sensitive Static String Abstractions, 2014-09-11
US-20140259174-A1, Scalable And Precise String Analysis Using Index-Sensitive Static String Abstractions, 2014-09-11
US-8819635-B2, Confidence-Based Static Analysis, 2014-08-26
US-20140237602-A1, Automatic Correction Of Security Downgraders, 2014-08-21
US-20140237605-A1, Automatic Correction Of Security Downgraders, 2014-08-21
US-20140237603-A1, Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis, 2014-08-21
US-20140237604-A1, Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis, 2014-08-21
US-20140229463-A1, Web Testing Tools System And Method, 2014-08-14
US-20140222994-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2014-08-07
US-20140223000-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2014-08-07
US-8799874-B2, Static Analysis Of Computer Software Applications, 2014-08-05
US-20140215343-A1, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2014-07-31
US-20140215344-A1, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2014-07-31
US-8793800-B2, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2014-07-29
US-20140208428-A1, Mitigating Security Risks Via Code Movement, 2014-07-24
US-20140208430-A1, Mitigating Security Risks Via Code Movement, 2014-07-24
US-8789188-B2, Method And Apparatus For Automatic Determination Of Authorization Requirements While Editing Or Generating Code, 2014-07-22
US-20140189657-A1, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2014-07-03
US-20140189658-A1, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2014-07-03
US-20140189785-A1, Social And Proximity Based Access Control For Mobile Applications, 2014-07-03
US-20140189786-A1, Social And Proximity Based Access Control For Mobile Applications, 2014-07-03
US-8769696-B2, Automated Detection Of Flaws And Incompatibility Problems In Information Flow Downgraders, 2014-07-01
US-20140181023-A1, Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications, 2014-06-26
US-20140181025-A1, Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications, 2014-06-26
US-8756587-B2, Static Analysis Of Computer Software Applications, 2014-06-17
US-8751422-B2, Using A Heuristically-Generated Policy To Dynamically Select String Analysis Algorithms For Client Queries, 2014-06-10
US-20140157419-A1, Discovery Of Application Vulnerabilities Involving Multiple Execution Flows, 2014-06-05
US-20140157420-A1, Discovery Of Application Vulnerabilities Involving Multiple Execution Flows, 2014-06-05
US-8745578-B2, Eliminating False-Positive Reports Resulting From Static Analysis Of Computer Software, 2014-06-03
US-20140143880-A1, Global Variable Security Analysis, 2014-05-22
US-20140136945-A1, Automatically Rendering Web Or Hybrid Applications Natively, 2014-05-15
US-20140136954-A1, Automatically Rendering Web Or Hybrid Applications Natively, 2014-05-15
US-20140137203-A1, Automatically Generating Challenge Questions Inferred From User History Data For User Authentication, 2014-05-15
US-20140137219-A1, Automatically Generating Challenge Questions Inferred From User History Data For User Authentication, 2014-05-15
US-20140137239-A1, Application-Level Anomaly Detection, 2014-05-15
US-20140137246-A1, Application-Level Anomaly Detection, 2014-05-15
US-8726246-B2, Static Analysis Of Validator Routines, 2014-05-13
US-20140130015-A1, Hybrid Program Analysis, 2014-05-08
US-20140130019-A1, Hybrid Program Analysis, 2014-05-08
US-20140130153-A1, Sound And Effective Data-Flow Analysis In The Presence Of Aliasing, 2014-05-08
US-20140130154-A1, Sound And Effective Data-Flow Analysis In The Presence Of Aliasing, 2014-05-08
US-20140115563-A1, Differential Static Program Analysis, 2014-04-24
US-20140115564-A1, Differential Static Program Analysis, 2014-04-24
US-8701186-B2, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2014-04-15
US-8695056-B2, Method For Information Tracking In Multiple Interdependent Dimensions, 2014-04-08
US-8695098-B2, Detecting Security Vulnerabilities In Web Applications, 2014-04-08
US-20140090064-A1, Training Classifiers For Program Analysis, 2014-03-27
US-20140090069-A1, Training Classifiers For Program Analysis, 2014-03-27
US-20140090065-A1, Method And Apparatus For Paralleling And Distributing Static Source Code Security Analysis Using Loose Synchronization, 2014-03-27
US-20140090068-A1, Method And Apparatus For Paralleling And Distributing Static Source Code Security Analysis Using Loose Synchronization, 2014-03-27
US-8683599-B2, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2014-03-25
US-20140082734-A1, Certifying Server Side Web Applications Against Security Vulnerabilities, 2014-03-20
US-20140082736-A1, Certifying Server Side Web Applications Against Security Vulnerabilities, 2014-03-20
US-20140075561-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2014-03-13
US-20140075562-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2014-03-13
US-8671284-B1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-03-11
US-8667584-B2, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2014-03-04
US-8661264-B1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-02-25
US-20140222994-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2014-08-07
US-20140223000-A1, Transparently Tracking Provenance Information In Distributed Data Systems, 2014-08-07
US-8799874-B2, Static Analysis Of Computer Software Applications, 2014-08-05
US-20140215343-A1, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2014-07-31
US-20140215344-A1, Automatic Extraction, Modeling, And Code Mapping Of Application User Interface Display Screens And Components, 2014-07-31
US-8793800-B2, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2014-07-29
US-20140208428-A1, Mitigating Security Risks Via Code Movement, 2014-07-24
US-20140208430-A1, Mitigating Security Risks Via Code Movement, 2014-07-24
US-8789188-B2, Method And Apparatus For Automatic Determination Of Authorization Requirements While Editing Or Generating Code, 2014-07-22
US-20140189657-A1, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2014-07-03
US-20140189658-A1, Enhanced String Analysis That Improves Accuracy Of Static Analysis, 2014-07-03
US-20140189785-A1, Social And Proximity Based Access Control For Mobile Applications, 2014-07-03
US-20140189786-A1, Social And Proximity Based Access Control For Mobile Applications, 2014-07-03
US-8769696-B2, Automated Detection Of Flaws And Incompatibility Problems In Information Flow Downgraders, 2014-07-01
US-20140181023-A1, Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications, 2014-06-26
US-20140181025-A1, Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications, 2014-06-26
US-8756587-B2, Static Analysis Of Computer Software Applications, 2014-06-17
US-8751422-B2, Using A Heuristically-Generated Policy To Dynamically Select String Analysis Algorithms For Client Queries, 2014-06-10
US-20140157419-A1, Discovery Of Application Vulnerabilities Involving Multiple Execution Flows, 2014-06-05
US-20140157420-A1, Discovery Of Application Vulnerabilities Involving Multiple Execution Flows, 2014-06-05
US-8745578-B2, Eliminating False-Positive Reports Resulting From Static Analysis Of Computer Software, 2014-06-03
US-20140143880-A1, Global Variable Security Analysis, 2014-05-22
US-20140136945-A1, Automatically Rendering Web Or Hybrid Applications Natively, 2014-05-15
US-20140136954-A1, Automatically Rendering Web Or Hybrid Applications Natively, 2014-05-15
US-20140137203-A1, Automatically Generating Challenge Questions Inferred From User History Data For User Authentication, 2014-05-15
US-20140137219-A1, Automatically Generating Challenge Questions Inferred From User History Data For User Authentication, 2014-05-15
US-20140137239-A1, Application-Level Anomaly Detection, 2014-05-15
US-20140137246-A1, Application-Level Anomaly Detection, 2014-05-15
US-8726246-B2, Static Analysis Of Validator Routines, 2014-05-13
US-20140130015-A1, Hybrid Program Analysis, 2014-05-08
US-20140130019-A1, Hybrid Program Analysis, 2014-05-08
US-20140130153-A1, Sound And Effective Data-Flow Analysis In The Presence Of Aliasing, 2014-05-08
US-20140130154-A1, Sound And Effective Data-Flow Analysis In The Presence Of Aliasing, 2014-05-08
US-20140115563-A1, Differential Static Program Analysis, 2014-04-24
US-20140115564-A1, Differential Static Program Analysis, 2014-04-24
US-8701186-B2, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2014-04-15
US-8695056-B2, Method For Information Tracking In Multiple Interdependent Dimensions, 2014-04-08
US-8695098-B2, Detecting Security Vulnerabilities In Web Applications, 2014-04-08
US-20140090064-A1, Training Classifiers For Program Analysis, 2014-03-27
US-20140090069-A1, Training Classifiers For Program Analysis, 2014-03-27
US-20140090065-A1, Method And Apparatus For Paralleling And Distributing Static Source Code Security Analysis Using Loose Synchronization, 2014-03-27
US-20140090068-A1, Method And Apparatus For Paralleling And Distributing Static Source Code Security Analysis Using Loose Synchronization, 2014-03-27
US-8683599-B2, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2014-03-25
US-20140082734-A1, Certifying Server Side Web Applications Against Security Vulnerabilities, 2014-03-20
US-20140082736-A1, Certifying Server Side Web Applications Against Security Vulnerabilities, 2014-03-20
US-20140075561-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2014-03-13
US-20140075562-A1, Static Security Analysis Using A Hybrid Representation Of String Values, 2014-03-13
US-8671284-B1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-03-11
US-8667584-B2, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2014-03-04
US-8661264-B1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-02-25
US-20140053140-A1, Static Analysis Of Validator Routines, 2014-02-20
US-20140052997-A1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-02-20
US-20140052998-A1, Security Model For Actor-Based Languages And Apparatus, Methods, And Computer Programming Products Using Same, 2014-02-20
US-20140053028-A1, Anomaly Detection At The Level Of Run Time Data Structures, 2014-02-20
US-20140053029-A1, Anomaly Detection At The Level Of Run Time Data Structures, 2014-02-20
US-20140053130-A1, Determining Correctness Conditions For Use In Static Analysis, 2014-02-20
US-20140053136-A1, Determining Correctness Conditions For Use In Static Analysis, 2014-02-20
US-8656496-B2, Global Variable Security Analysis, 2014-02-18
US-8650546-B2, Static Analysis Based On Observed String Values During Execution Of A Computer-Based Software Application, 2014-02-11
US-8646088-B2, Runtime Enforcement Of Security Checks, 2014-02-04
US-8646087-B2, Answering Security Queries Statically Based On Dynamically-Determined Information, 2014-02-04
US-20140026185-A1, System, Method, And Apparatus For Modular, String-Sensitive, Access Rights Analysis With Demand-Driven Precision, 2014-01-23
US-8635602-B2, Verification Of Information-Flow Downgraders, 2014-01-21
US-8627465-B2, Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security, 2014-01-07
US-20130332990-A1, Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data, 2013-12-12
US-8584246-B2, Eliminating False Reports Of Security Vulnerabilities When Testing Computer Software, 2013-11-12
US-20130290937-A1, Efficient Extraction Of Software Dependencies From Program Code, 2013-10-31
US-20130290786-A1, Automated Testing Of Applications With Scripting Code, 2013-10-31
US-8572674-B2, System, Method, And Apparatus For Modular, String-Sensitive, Access Rights Analysis With Demand-Driven Precision, 2013-10-29
US-8572727-B2, System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-Control And Integrity Policies, 2013-10-29
US-8572747-B2, Policy-Driven Detection And Verification Of Methods Such As Sanitizers And Validators, 2013-10-29
US-8572748-B2, Label-Based Taint Analysis, 2013-10-29
US-8561035-B2, Method And System To Discover Possible Program Variable Values By Connecting Program Value Extraction With External Data Sources, 2013-10-15
US-20130262617-A1, Automatic And Transparent Application Logging, 2013-10-03
US-8544104-B2, Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data, 2013-09-24
US-20130239097-A1, Distributed Static Analysis Of Computer Software Applications, 2013-09-12
US-8533694-B2, Identification Of Read/Write Chains During Static Analysis Of Computer Software, 2013-09-10
US-8533659-B2, Efficient Extraction Of Software Dependencies From Program Code, 2013-09-10
US-8528095-B2, Injection Context Based Static Analysis Of Computer Software Applications, 2013-09-03
US-8516449-B2, Detecting And Localizing Security Vulnerabilities In Client-Server Application, 2013-08-20
US-20130205391-A1, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2013-08-08
US-20130198724-A1, Confidence-Based Static Analysis, 2013-08-01
US-20130191691-A1, Importance-Based Call Graph Construction, 2013-07-25
US-8490057-B2, Confidence-Based Static Analysis, 2013-07-16
US-20130179979-A1, Detecting Security Vulnerabilities In Web Applications, 2013-07-11
US-20130179978-A1, Automated Detection Of Flaws And Incompatibility Problems In Information Flow Downgraders, 2013-07-11
US-8473899-B2, Automatic Optimization Of String Allocations In A Computer Program, 2013-06-25
US-8468605-B2, Identifying Security Vulnerability In Computer Software, 2013-06-18
US-20130152204-A1, Interactive Analysis Of A Security Specification, 2013-06-13
US-20130152205-A1, Interactive Analysis Of A Security Specification, 2013-06-13
US-20130145215-A1, Eliminating False-Positive Reports Resulting From Static Analysis Of Computer Software, 2013-06-06
US-8453125-B2, Generating Inputs For Client-Server Programs For Fault-Detection And Localization, 2013-05-28
US-20130133043-A1, Authentication In Virtual Private Networks, 2013-05-23
US-8434070-B2, Generating Specifications Of Client-Server Applications For Static Analysis, 2013-04-30
US-20130091079-A1, Using A Heuristically-Generated Policy To Dynamically Select String Analysis Algorithms For Client Queries, 2013-04-11
US-20130091082-A1, Using A Heuristically-Generated Policy To Dynamically Select String Analysis Algorithms For Client Queries, 2013-04-11
US-20130086561-A1, Static Analysis Of Computer Software Applications, 2013-04-04
US-20130086562-A1, Static Analysis Of Computer Software Applications, 2013-04-04
US-20130086686-A1, Automated Detection Of Flaws And Incompatibility Problems In Information Flow Downgraders, 2013-04-04
US-8387111-B2, Type Independent Permission Based Access Control, 2013-02-26
US-8387018-B2, Fault Localization Using Directed Test Generation, 2013-02-26
US-8381242-B2, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2013-02-19
US-8381199-B2, Modular And/Or Demand-Driven String Analysis Of A Computer Program, 2013-02-19
US-8375371-B2, Importance-Based Call Graph Construction, 2013-02-12
US-20130031622-A1, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2013-01-31
US-8365280-B2, System, Method, And Program For Determining Validity Of String, 2013-01-29
US-8365281-B2, Determining Whether Method Of Computer Program Is A Validator, 2013-01-29
US-20130007529-A1, Static Analysis Based On Observed String Values During Execution Of A Computer-Based Software Application, 2013-01-03
US-20130007886-A1, Detecting Security Vulnerabilities In Web Applications, 2013-01-03
US-20120331547-A1, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2012-12-27
US-20120331445-A1, Unchanged Object Management, 2012-12-27
US-20120317143-A1, String Analysis Based On Three-Valued Logic, 2012-12-13
US-8332939-B2, System And Method For The Automatic Identification Of Subject-Executed Code And Subject-Granted Access Rights, 2012-12-11
US-20120297372-A1, Static Analysis Of Validator Routines, 2012-11-22
US-20120272322-A1, Determining The Vulnerability Of Computer Software Applications To Privilege-Escalation Attacks, 2012-10-25
US-8296722-B2, Crawling Of Object Model Using Transformation Graph, 2012-10-23
US-20120266247-A1, Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security, 2012-10-18
US-20120254839-A1, Simulating Black Box Test Results Using Information From White Box Testing, 2012-10-04
US-20120215757-A1, Web Crawling Using Static Analysis, 2012-08-23
US-20120216177-A1, Generating Sound And Minimal Security Reports Based On Static Analysis Of A Program, 2012-08-23
US-20120210432-A1, Label-Based Taint Analysis, 2012-08-16
US-20120198557-A1, Determining The Vulnerability Of Computer Software Applications To Privilege-Escalation Attacks, 2012-08-02
US-20120192161-A1, Distributed Static Analysis Of Computer Software Applications, 2012-07-26
US-8230477-B2, System And Method For The Automatic Evaluation Of Existing Security Policies And Automatic Creation Of New Security Policies, 2012-07-24
US-20120174229-A1, Runtime Enforcement Of Security Checks, 2012-07-05
US-20120159619-A1, Formal Analysis Of The Quality And Conformance Of Information Flow Downgraders, 2012-06-21
US-20120151454-A1, Generating Inputs For Client-Server Programs For Fault Detection And Localization, 2012-06-14
US-20120144491-A1, Answering Security Queries Statically Based On Dynamically-Determined Information, 2012-06-07
US-20120131668-A1, Policy-Driven Detection And Verification Of Methods Such As Sanitizers And Validators, 2012-05-24
US-20120131669-A1, Determining Whether Method Of Computer Program Is A Validator, 2012-05-24
US-20120131670-A1, Global Variable Security Analysis, 2012-05-24
US-20120110551-A1, Simulating Black Box Test Results Using Information From White Box Testing, 2012-05-03
US-20120102471-A1, Generating Specifications Of Client-Server Applications For Static Analysis, 2012-04-26
US-20120102474-A1, Static Analysis Of Client-Server Applications Using Framework Independent Specifications, 2012-04-26
US-20120096440-A1, Modular And/Or Demand-Driven String Analysis Of A Computer Program, 2012-04-19
US-20120089962-A1, Unchanged Object Management, 2012-04-12
US-20120084755-A1, Confidence-Based Static Analysis, 2012-04-05
US-20120054552-A1, Fault Localization Using Directed Test Generation, 2012-03-01
US-20120054553-A1, Fault Localization Using Condition Modeling And Return Value Modeling, 2012-03-01
US-20120054724-A1, Incremental Static Analysis, 2012-03-01
US-20120023486-A1, Verification Of Information-Flow Downgraders, 2012-01-26
US-20120023553-A1, Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems, 2012-01-26
US-20110321016-A1, Injection Context Based Static Analysis Of Computer Software Applications, 2011-12-29
US-20110277037-A1, Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data, 2011-11-10
US-8006233-B2, System And Method For The Automatic Verification Of Privilege-Asserting And Subject-Executed Code, 2011-08-23
US-20110145785-A1, Automatic Optimization Of String Allocations In A Computer Program, 2011-06-16
US-20110131656-A1, Identifying Security Vulnerability In Computer Software, 2011-06-02
US-20110126282-A1, System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-Control And Integrity Policies, 2011-05-26
US-20110087892-A1, Eliminating False Reports Of Security Vulnerabilities When Testing Computer Software, 2011-04-14
US-20110088023-A1, System And Method For Static Detection And Categorization Of Information-Flow Downgraders, 2011-04-14
US-20110055806-A1, Method And System To Discover Possible Program Variable Values By Connecting Program Value Extraction With External Data Sources, 2011-03-03
US-20110029946-A1, Efficient Extraction Of Software Dependencies From Program Code, 2011-02-03
US-20110030061-A1, Detecting And Localizing Security Vulnerabilities In Client-Server Application, 2011-02-03
US-7877812-B2, Method, System And Computer Program Product For Enforcing Privacy Policies, 2011-01-25
US-20100333201-A1, System, Method, And Program For Determining Validity Of String, 2010-12-30
US-20100284527-A1, Importance-Based Call Graph Construction, 2010-11-11
US-7827613-B2, System And Method For Supporting Digital Rights Management In An Enhanced Java.TM. 2 Runtime Environment, 2010-11-02
US-7810135-B2, Apparatus For Adopting Authorizations, 2010-10-05
US-20100088668-A1, Crawling Of Object Model Using Transformation Graph, 2010-04-08
US-20100043048-A1, System, Method, And Apparatus For Modular, String-Sensitive, Access Rights Analysis With Demand-Driven Precision, 2010-02-18
US-20090300266-A1, Identification Of Read/Write Chains During Static Analysis Of Computer Software, 2009-12-03
US-20090193492-A1, Method For Information Tracking In Multiple Interdependent Dimensions, 2009-07-30
US-20090094667-A1, Method And Apparatus For Automatic Determination Of Authorization Requirements While Editing Or Generating Code, 2009-04-09
US-7496757-B2, Software Verification System, Method And Computer Program Element, 2009-02-24
US-20090007223-A1, Method And System For Run-Time Dynamic And Interactive Identification Of Software Authorization Requirements And Privileged Code Locations, And For Validation Of Other Software Program Analysis Results, 2009-01-01
US-20080201688-A1, System And Method For The Automatic Verification Of Privilege-Asserting And Subject-Executed Code, 2008-08-21
US-20080201693-A1, System And Method For The Automatic Identification Of Subject-Executed Code And Subject-Granted Access Rights, 2008-08-21
US-20080201760-A1, System And Method For The Automatic Evaluation Of Existing Security Policies And Automatic Creation Of New Security Policies, 2008-08-21
US-20080168527-A1, Method, System And Computer Program Product For Enforcing Privacy Policies, 2008-07-10
US-20080104698-A1, Method And Apparatus For Adopting Authorizations, 2008-05-01
US-7343620-B2, Method And Apparatus For Adopting Authorizations, 2008-03-11
US-20080060083-A1, System And Method For Supporting Digital Rights Management In An Enhanced Javatm 2 Runtime Environment, 2008-03-06
US-7308717-B2, System And Method For Supporting Digital Rights Management In An Enhanced Java.TM. 2 Runtime Environment, 2007-12-11
US-20070261124-A1, Method And System For Run-Time Dynamic And Interactive Identification Of Software Authorization Requirements And Privileged Code Locations, And For Validation Of Other Software Program Analysis Results, 2007-11-08
US-7237236-B2, Method And Apparatus For Automatically Determining Optimum Placement Of Privileged Code Locations In Existing Code, 2007-06-26
US-7219341-B2, Code Analysis For Selective Runtime Data Processing, 2007-05-15
US-7171558-B1, Transparent Digital Rights Management For Extendible Content Viewers, 2007-01-30
US-7076804-B2, Automated Program Resource Identification And Association, 2006-07-11
US-20050262487-A1, System, Apparatus, And Method For Identifying Authorization Requirements In Component-Based Systems, 2005-11-24
US-20050039158-A1, Method And Apparatus For Adopting Authorizations, 2005-02-17
US-20050015752-A1, Static Analysis Based Error Reduction For Software Applications, 2005-01-20
US-20040088687-A1, Code Analysis For Selective Runtime Data Processing, 2004-05-06
US-20040040017-A1, Method And Apparatus For Automatically Determining Optimum Placement Of Privileged Code Locations In Existing Code, 2004-02-26
US-20030135746-A1, Software Verification System, Method And Computer Program Element, 2003-07-17
US-20030084324-A1, Method And Apparatus For Type Independent Permission Based Access Control, 2003-05-01
US-20030084325-A1, Method And Apparatus For Implementing Permission Based Access Control Through Permission Type Inheritance, 2003-05-01
US-20020184486-A1, Automated Program Resource Identification And Association, 2002-12-05
US-20020161996-A1, System And Method For Supporting Digital Rights Management In An Enhanced Java™2 Runtime Environment, 2002-10-31