| 10110496 |
Providing policy information on an existing communication channel |
Jacob Asher Langton, Daniel J. Quinlan, Declan Conlon |
2018-10-23 |
| 10104106 |
Determining internet-based object information using public internet search |
Jacob Asher Langton, Zhenxin Zhan, Daniel J. Quinlan |
2018-10-16 |
| 10091222 |
Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs |
Jacob Asher Langton, Zhenxin Zhan, Daniel J. Quinlan |
2018-10-02 |
| 10089468 |
Detecting keylogging |
Jacob Asher Langton, Daniel J. Quinlan |
2018-10-02 |
| 10079806 |
Protecting sensitive web transactions using a communication channel associated with a user |
Daniel J. Quinlan |
2018-09-18 |
| 10075453 |
Detecting suspicious files resident on a network |
Jacob Asher Langton, Daniel J. Quinlan |
2018-09-11 |
| 10044754 |
Polluting results of vulnerability scans |
— |
2018-08-07 |
| 10021132 |
Limiting the efficacy of a denial of service attack by increasing client resource demands |
Daniel J. Quinlan |
2018-07-10 |
| 9990496 |
Analyzing a password-protected file for malware |
Jacob Asher Langton, Daniel J. Quinlan |
2018-06-05 |
| 9987474 |
Antiseptic swab |
Gordon E. Atkinson |
2018-06-05 |
| 9984233 |
Identifying malware based on a relationship between a downloader file and a downloaded file |
Daniel J. Quinlan, Jacob Asher Langton |
2018-05-29 |
| 9953164 |
Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes |
Jacob Asher Langton, Daniel J. Quinlan |
2018-04-24 |
| 9954887 |
Targeted attack discovery |
Declan Conlon |
2018-04-24 |
| 9954820 |
Detecting and preventing session hijacking |
— |
2018-04-24 |
| 9922193 |
Identifying an evasive malicious object based on a behavior delta |
Daniel J. Quinlan |
2018-03-20 |
| 9866583 |
Fuzzing server responses to malicious client devices |
— |
2018-01-09 |