Issued Patents All Time
Showing 26–50 of 151 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9781151 | Techniques for identifying malicious downloadable applications | Sourabh Satish, Xuefeng Tian, Jingnan Si, Jun Mao, Xiaole Zhu +1 more | 2017-10-03 |
| 9734037 | Mobile application sampling for performance and network behavior profiling | John Patrick Kelly, III, Brian Hernacki | 2017-08-15 |
| 9697660 | Systems and methods for verifying user attributes | Ilya Sokolov, Kevin Jiang | 2017-07-04 |
| 9626511 | Agentless enforcement of application management through virtualized block I/O redirection | Matthew Steele, William E. Sobel | 2017-04-18 |
| 9621585 | Applying functional classification to tune security policies and posture according to role and likely activity | Sourabh Satish | 2017-04-11 |
| 9614826 | Sensitive data protection | — | 2017-04-04 |
| 9569205 | Systems and methods for remotely configuring applications | Thomas Jeffrey Enderwick | 2017-02-14 |
| 9565192 | Router based securing of internet of things devices on local area networks | Srinivas Chillappa | 2017-02-07 |
| 9525664 | Systems and methods for providing secure access to local network devices | William E. Sobel | 2016-12-20 |
| 9495538 | Graduated enforcement of restrictions according to an application's reputation | Kenneth Schneider | 2016-11-15 |
| 9450960 | Virtual machine file system restriction system and method | William E. Sobel | 2016-09-20 |
| 9396498 | Systems and methods for using social-networking accounts to identify characteristics that strangers share in common | Xiaole Zhu, Xue Tian | 2016-07-19 |
| 9384654 | Geolocation awareness item tracking | Srinivas Chillappa | 2016-07-05 |
| 9298914 | Enterprise data access anomaly detection and flow tracking | — | 2016-03-29 |
| 9286477 | Secure app ecosystem with key and data exchange according to enterprise information control policy | William E. Sobel, Thomas Jeffrey Enderwick | 2016-03-15 |
| 9230099 | Systems and methods for combining static and dynamic code analysis | Sheng Gong, Wei Guo Eric Hu, Ge Huang, Jun Mao, Qingchun Meng +2 more | 2016-01-05 |
| 9229522 | Mobile battery performance by identifying apps that disproportionally run background tasks that prevent mobile devices from sleeping | Xue Tian | 2016-01-05 |
| 9154466 | Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting | William E. Sobel | 2015-10-06 |
| 9148392 | Systems and methods for aggregating event information | John Patrick Kelly, III | 2015-09-29 |
| 9147066 | Systems and methods for providing controls for application behavior | Xue Tian, Barry Laffoon | 2015-09-29 |
| 9143497 | Systems and methods for securing email in mobile devices | Thomas Jeffrey Enderwick | 2015-09-22 |
| 9122869 | Systems and methods for detecting client types | William E. Sobel | 2015-09-01 |
| 9083527 | Using mobile data to establish a shared secret in second-factor authentication | Shaun Cooley | 2015-07-14 |
| 9075497 | Enabling selective policy driven seamless user interface presentation between and among a host and a plurality of guests | William E. Sobel | 2015-07-07 |
| 9015706 | Techniques for interaction with a guest virtual machine | Matthew Conover, William E. Sobel | 2015-04-21 |