Issued Patents All Time
Showing 25 most recent of 32 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10769267 | Systems and methods for controlling access to credentials | Feng Li, Brian Schlatter, Akshata Krishnamoorthy Rao | 2020-09-08 |
| 10565373 | Behavioral analysis of scripting utility usage in an enterprise | Akshata Krishnamoorthy Rao, Douglas Schlatter, Feng Li | 2020-02-18 |
| 10547637 | Systems and methods for automatically blocking web proxy auto-discovery protocol (WPAD) attacks | Akshata Krishnamoorthy Rao, Feng Li, Douglas Schlatter | 2020-01-28 |
| 10547638 | Detecting name resolution spoofing | Feng Li, Akshata Krishnamoorthy Rao, Douglas Schlatter | 2020-01-28 |
| 10291644 | System and method for prioritizing endpoints and detecting potential routes to high value assets | Nobuto Hotta, Dinesh Bhirud, Spencer Smith | 2019-05-14 |
| 10284587 | Systems and methods for responding to electronic security incidents | Brian Schlatter, Akshata Krishnamoorthy Rao, Feng Li | 2019-05-07 |
| 10162962 | Systems and methods for detecting credential theft | Brian Schlatter, Feng Li, Akshata Krishnamoorthy Rao | 2018-12-25 |
| 9733929 | Systems and methods for restoring applications | Nicholas Graf, Spencer Smith | 2017-08-15 |
| 9661004 | Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions | Nicholas Graf, Spencer Smith | 2017-05-23 |
| 9571498 | Systems and methods for protecting purpose-built appliances on local networks | — | 2017-02-14 |
| 9350755 | Method and apparatus for detecting malicious software transmission through a web portal | Spencer Smith, Nicholas Graf | 2016-05-24 |
| 9152790 | Systems and methods for detecting fraudulent software applications that generate misleading notifications | Nicholas Graf, Spencer Smith | 2015-10-06 |
| 8914888 | Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process | Sourabh Satish, Shane Pereira | 2014-12-16 |
| 8904538 | Systems and methods for user-directed malware remediation | Spencer Smith, Nicholas Graf | 2014-12-02 |
| 8844024 | Systems and methods for using tiered signing certificates to manage the behavior of executables | Nicholas Graf, Spencer Smith | 2014-09-23 |
| 8800030 | Individualized time-to-live for reputation scores of computer files | Vijay Seshadri, Zulfikar Ramzan, James Hoagland, Adam Wright | 2014-08-05 |
| 8782790 | Signature creation for malicious network traffic | Spencer Smith, Nicholas Graf, Uriel Mann | 2014-07-15 |
| 8776227 | User interface based malware detection | Spencer Smith, Nicholas Graf | 2014-07-08 |
| 8776196 | Systems and methods for automatically detecting and preventing phishing attacks | Ian Oliver, Nicholas Graf, Spencer Smith | 2014-07-08 |
| 8701192 | Behavior based signatures | Spencer Smith, Nicholas Graf | 2014-04-15 |
| 8656489 | Method and apparatus for accelerating load-point scanning | — | 2014-02-18 |
| 8627463 | Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions | Nicholas Graf, Spencer Smith | 2014-01-07 |
| 8621632 | Systems and methods for locating malware | Spencer Smith, Nicholas Graf | 2013-12-31 |
| 8549626 | Method and apparatus for securing a computer from malicious threats through generic remediation | Spencer Smith, Nicholas Graf | 2013-10-01 |
| 8495741 | Remediating malware infections through obfuscation | Timothy M. Naftel, Mark Kennedy | 2013-07-23 |