Cyber vulnerability scan analyses with actionable feedback

GY Ng, F Zhang, F Tancioco - US Patent 9,699,209, 2017 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyzes. In one
embodiment, a method includes determining an external infrastructure of an entity, the …

Inferential analysis using feedback for extracting and combining cyber risk information

GY Ng, B Wu, M Yang, P Yang, F Tancioco - US Patent 10,230,764, 2019 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in a computer network of an entity. Some embodiments involve using …

Service signaling recovery for multimedia content using embedded watermarks

JM Winograd, R Petrovic, J Zhao - US Patent 9,602,891, 2017 - Google Patents
Methods, devices, systems and computer program products facilitate accessing metadata
associated with a primary audio Visual content. Upon reception of a primary content, one or …

Content synchronization using watermark timecodes

J Zhao, JM Winograd, R Petrovic - US Patent 10,354,354, 2019 - Google Patents
Methods, devices and computer program products allow improved synchronization among
multiple contents. One disclosed method includes receiving a first and a second content and …

Conditional access using embedded watermarks

R Petrovic, J Zhao, JM Winograd - US Patent 9,323,902, 2016 - Google Patents
Methods, devices and computer program products facilitate conditional access to a content
embedded with watermarks. For Such a content, when copy control rules associated with an …

Transactional video marking system

J Zhao, G Mercier - US Patent 9,262,794, 2016 - Google Patents
Methods, devices, systems and computer program products facilitate embedding and
extraction of transactional water marks into and from a video content. One method for select …

Cyber risk analysis and remediation using network monitored sensors and methods of use

A Parthasarathi, GY Ng, M Honea - US Patent 10,404,748, 2019 - Google Patents
Abstract Systems and methods for cyber risk analysis and remediation using network
monitored sensors are provided herein. An example system includes one or more data …

Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses

GY Ng, D Ma, YT Ooi, F Zhang, F Tancioco - US Patent 10,050,989, 2018 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in one or more computer networks for an entity. Various embodiments …

Transactional video marking system

J Zhao, G Mercier - US Patent 9,262,793, 2016 - Google Patents
Methods, devices, systems and computer program products facilitate embedding and
extraction of transactional water marks into and from a video content. One Such method …

Cyber vulnerability scan analyses with actionable feedback

GY Ng, F Zhang, F Tancioco - US Patent 10,218,736, 2019 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one
embodiment, a method includes determining an external infrastructure of an entity, the …