Issued Patents All Time
Showing 26–50 of 114 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10467423 | Static analysis-based tracking of data in access-controlled systems | Tushaar Sethi, Maarten Van Horenbeeck | 2019-11-05 |
| 10462116 | Detection of data exfiltration | Nima Sharifi Mehr, Darren Ernest Canavor, Jesper Mikael Johansson, Muhammad Wasiq | 2019-10-29 |
| 10445514 | Request processing in a compromised account | Eric Jason Brandwine | 2019-10-15 |
| 10440007 | Symbolic feedback for user input | Harsha Ramalingam, Zachary Damen Wolfe, Darren Ernest Canavor, Brian Nhu Dang, Max Harwell Funderburk +3 more | 2019-10-08 |
| 10409977 | Chained authentication using image transforms | Darren Ernest Canavor, George Nikolaos Stathakopoulos | 2019-09-10 |
| 10387825 | Delivery assistance using unmanned vehicles | Darren Ernest Canavor, Brandon William Porter | 2019-08-20 |
| 10372905 | Preventing unauthorized software execution | Darren Ernest Canavor, George Nikolaos Stathakopoulos | 2019-08-06 |
| 10333937 | Privilege distribution through signed permissions grants | Darren Ernest Canavor, Daniel Wade Hitchcock, Jonathan Kozolchyk | 2019-06-25 |
| 10320632 | Pattern-based detection for services in distributed systems | Melissa Elaine Davis, Anton Vladilenovich Goldberg, Aram Grigoryan, Brandon William Porter, Matthew Paul Wenger +1 more | 2019-06-11 |
| 10313882 | Dynamic unlock mechanisms for mobile devices | Jesper Mikael Johansson, Phivos Costas Aristides, Darren Ernest Canavor, Arnaud Marie Froment, Scott Donald Gregory +4 more | 2019-06-04 |
| 10313339 | Secure activation of authentication devices based on communications received via designated communication channels | Conor Power, Dean H Saxe, Tushaar Sethi | 2019-06-04 |
| 10298598 | Countering service enumeration through imposter-driven response | George Nikolaos Stathakopoulos | 2019-05-21 |
| 10262161 | Secure execution and transformation techniques for computing executables | Darren Ernest Canavor, Harsha Ramalingam, George Nikolaos Stathakopoulos | 2019-04-16 |
| 10248532 | Sensitive data usage detection using static analysis | Muhammad Wasiq | 2019-04-02 |
| 10243747 | Tamper detection for hardware devices | Harsha Ramalingam, Jesper Mikael Johansson | 2019-03-26 |
| 10230705 | Verifying authenticity of machine-readable identifiers | Preyas Joshi, Darren Ernest Canavor, Daniel Wade Hitchcock, Jesper Mikael Johansson, Gregory Branchek Roth | 2019-03-12 |
| 10187428 | Identifying data usage via active data | Harsha Ramalingam, Dominique Imjya Brezinski, Jesper Mikael Johansson, James C. Petts | 2019-01-22 |
| 10187362 | Secure streamlined provisioning of remote access terminals | John Clark Coonley Duksta, Katharine Nicole Harrison, Matthew Ryan Jezorek, Brian Lee, Maarten Van Horenbeeck | 2019-01-22 |
| 10185924 | Security risk response impact analysis | George Nikolaos Stathakopoulos | 2019-01-22 |
| 10180936 | Human readable mechanism for communicating binary data | Darren Ernest Canavor, Jesper Mikael Johansson | 2019-01-15 |
| 10154052 | Tracer cookies to detect web session compromise by insiders | George Nikolaos Stathakopoulos | 2018-12-11 |
| 10142301 | Encrypted data delivery without intervening decryption | Nima Sharifi Mehr, Darren Ernest Canavor, Jesper Mikael Johansson, Gregory Branchek Roth, Gregory Alan Rubin | 2018-11-27 |
| 10135862 | Testing security incident response through automated injection of known indicators of compromise | George Nikolaos Stathakopoulos | 2018-11-20 |
| 10129299 | Network beacon management of security policies | Darren Ernest Canavor, Jesper Mikael Johansson | 2018-11-13 |
| 10114960 | Identifying sensitive data writes to data stores | Tushaar Sethi, Maarten Van Horenbeeck | 2018-10-30 |