Issued Patents All Time
Showing 1–22 of 22 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12099610 | Dynamic application deployment in trusted code environments | Ondrej Stastny, David Field, Tomas Vetrovsky, Ahmad Bilal | 2024-09-24 |
| 11714659 | Device provisioning with manufacturer boot environment | Ondrej Stastny | 2023-08-01 |
| 11669337 | Bare metal device management | Ahmad Bilal, Tomas Vetrovsky | 2023-06-06 |
| 11269655 | Bare metal device management | Ahmad Bilal, Tomas Vetrovsky | 2022-03-08 |
| 11263021 | Management platform recovery for a user device | Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more | 2022-03-01 |
| 11182141 | Management platform recovery for a user device | Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more | 2021-11-23 |
| 11132188 | Management platform recovery for a user device | Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more | 2021-09-28 |
| 11126419 | Management platform recovery for a user device | Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more | 2021-09-21 |
| 11126441 | Management platform recovery for a user device | Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more | 2021-09-21 |
| 11093260 | Device provisioning with manufacturer boot environment | Ondrej Stastny | 2021-08-17 |
| 11036862 | Dynamic application deployment in trusted code environments | Ondrej Stastny, David Field, Tomas Vetrovsky, Ahmad Bilal | 2021-06-15 |
| 10838736 | Bare metal device management | Ahmad Bilal, Tomas Vetrovsky | 2020-11-17 |
| 8863284 | System and method for determining a security status of potentially malicious files | Konstantin V. Sapronov | 2014-10-14 |
| 8739287 | Determining a security status of potentially malicious files | Konstantin V. Sapronov | 2014-05-27 |
| 8719935 | Mitigating false positives in malware detection | Ravi Bikkula | 2014-05-06 |
| 8667583 | Collecting and analyzing malware data | Marc E. Seinfeld, Jigar J. Mody, Ning Sun, Tony Lee, Chengyun Chu | 2014-03-04 |
| 8201253 | Performing security functions when a process is created | Lee Guang Yan | 2012-06-12 |
| 8042186 | System and method for detection of complex malware | Vladislav V. Martynenko, Yuri G. Slobodyanuk, Denis A. Nazarov, Mikhail A. Pavlyushchik | 2011-10-18 |
| 7809670 | Classification of malware using clustering that orders events in accordance with the time of occurance | Tony Lee, Jigar J. Mody, Ying Lin, Adrian Marinescu | 2010-10-05 |
| 7647636 | Generic RootKit detector | Neil A. Cowie | 2010-01-12 |
| 7636946 | Unwanted file modification and transactions | Surendra Verma, Dana Groff, Jonathan M. Cargille, Andrew Herron, Christian Gregory Allred +1 more | 2009-12-22 |
| 7571482 | Automated rootkit detector | Gretchen L. Loihle, Mihai Costea, Robert John Hensing, Scott A. Field, Vincent R. Orgovan +2 more | 2009-08-04 |