This page is provided to satisfy the virtual patent marking provisions of various jurisdictions including the virtual patent marking and notice provisions of 35 U.S.C. § 287(a).
Product | USPTO # | Title of Patent |
---|---|---|
AIDA BETA | 10,332,003 | SYSTEMS AND METHODS FOR AIDA BASED ANALYTICS AND REPORTING |
AIDA BETA | 11,206,288 | SYSTEMS AND METHODS FOR AIDA BASED GROUPING |
AIDA BETA | 10,855,714 | SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN AGENT |
AIDA BETA | 11,075,943 | SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN AGENT |
AIDA BETA | 11,494,719 | SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE DRIVEN AGENT TO AUTOMATE ASSESSMENT OF ORGANIZATIONAL VULNERABILITIES |
AIDA BETA | 10,917,432 | SYSTEMS AND METHODS FOR ARTIFICIAL INTELLIGENCE DRIVEN AGENT CAMPAIGN CONTROLLER |
AIDA BETA | 11,503,050 | SYSTEMS AND METHODS FOR DETERMINING INDIVIDUAL AND GROUP RISK SCORES |
AIDA Selected Templates | 11,334,673 | SYSTEMS AND METHODS FOR AIDA CAMPAIGN CONTROLLER INTELLIGENT RECORDS |
BOT Detection | 9,781,160 | SYSTEMS AND METHODS FOR DISCOVERING SUSPECT BOT IP ADDRESSES AND USING VALIDATED BOT IP ADDRESS TO IGNORE ACTIONS IN A SIMULATED PHISHING ENVIRONMENT |
Brandable Content | 10,949,760 | SYSTEMS AND METHODS FOR ADAPTATION OF SCORM PACKAGES AT RUNTIME WITH AN EXTENDED LMS |
Domain Doppelganger | 10,673,894 | SYSTEM AND METHODS FOR SPOOFED DOMAIN IDENTIFICATION AND USER TRAINING |
Phish Alert Button | 11,269,994 | SYSTEMS AND METHODS FOR PROVIDING CONFIGURABLE RESPONSES TO THREAT IDENTIFICATION |
PhishER | 10,812,507 | SYSTEM AND METHODS FOR EFFICIENT COMBINING OF MALWARE DETECTION RULES |
PhishER | 11,108,791 | SYSTEM AND METHODS FOR EFFICIENT COMBINING OF MALWARE DETECTION RULES |
Risk Scores | 11,297,093 | SYSTEMS AND METHODS FOR DETERMINING A JOB SCORE FROM A JOB TITLE |
Second Chance | 10,362,047 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES BASED ON ACTIONS ASSOCIATED WITH UNTRUSTED EMAILS |
Second Chance | 10,659,487 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES BASED ON ACTIONS ASSOCIATED WITH UNTRUSTED EMAILS |
Second Chance | 11,240,261 | SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES BASED ON ACTIONS ASSOCIATED WITH UNTRUSTED EMAILS |
Second Chance | 10,657,248 | SYSTEMS AND METHODS FOR USING ATTRIBUTE DATA FOR SYSTEM PROTECTION AND SECURITY AWARENESS TRAINING |
Smart Groups | 11,122,051 | USING SMART GROUPS FOR COMPUTER-BASED SECURITY AWARENESS TRAINING SYSTEMS |
Smart Groups | 10,812,493 | USING SMART GROUPS FOR COMPUTER-BASED SECURITY AWARENESS TRAINING SYSTEMS |
Smart Groups | 11,349,849 | USING SMART GROUPS FOR COMPUTER-BASED SECURITY AWARENESS TRAINING SYSTEMS |
Smart Groups | EP3613190 | USING SMART GROUPS FOR COMPUTER-BASED SECURITY AWARENESS TRAINING SYSTEMS |
Social Engineering Indicators | 9,749,360 | SYSTEMS AND METHODS FOR PERFORMING SIMULATED PHISHING ATTACKS USING SOCIAL ENGINEERING INDICATORS |
Social Engineering Indicators | 10,165,006 | SYSTEMS AND METHODS FOR PERFORMING SIMULATED PHISHING ATTACKS USING SOCIAL ENGINEERING INDICATORS |
Social Engineering Indicators | 11,070,587 | SYSTEMS AND METHODS FOR PERFORMING SIMULATED PHISHING ATTACKS USING SOCIAL ENGINEERING INDICATORS |
Static Groups | 9,742,803 | SYSTEMS AND METHODS FOR SUBSCRIPTION MANAGEMENT OF SPECIFIC CLASSIFICATION GROUPS BASED ON USER’S ACTIONS |
Static Groups | 10,158,668 | SYSTEMS AND METHODS FOR SUBSCRIPTION MANAGEMENT OF SPECIFIC CLASSIFICATION GROUPS BASED ON USER’S ACTIONS |
Static Groups | 10,581,911 | SYSTEMS AND METHODS FOR SUBSCRIPTION MANAGEMENT OF SPECIFIC CLASSIFICATION GROUPS BASED ON USER’S ACTIONS |
Static Groups | 11,489,869 | SYSTEMS AND METHODS FOR SUBSCRIPTION MANAGEMENT OF SPECIFIC CLASSIFICATION GROUPS BASED ON USER’S ACTIONS |
User Identification in a Phishing Campaign | 9,800,613 | SYSTEMS AND METHODS FOR PERFORMING A SIMULATED PHISHING ATTACK |
User Identification in a Phishing Campaign | 10,291,649 | SYSTEMS AND METHODS FOR PERFORMING A SIMULATED PHISHING ATTACK |
User Identification in a Phishing Campaign | 10,826,937 | SYSTEMS AND METHODS FOR PERFORMING A SIMULATED PHISHING ATTACK |
© KnowBe4, Inc. All rights reserved. | Legal | Privacy Policy | Terms of Use | Security Statement | Sitemap