Issued Patents All Time
Showing 51–75 of 151 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9002972 | Systems and methods for sharing the results of computing operations among related computing systems | James Meyer, David Buches, William E. Sobel | 2015-04-07 |
| 8984632 | Systems and methods for identifying malware | Barry Laffoon, Abubakar Wawda, Jun Mao | 2015-03-17 |
| 8977842 | Hypervisor enabled secure inter-container communications | William E. Sobel | 2015-03-10 |
| 8977604 | Generation and usage of search resource locators | Shaun Cooley | 2015-03-10 |
| 8973678 | Misspelled word analysis for undesirable message classification | Shaun Cooley | 2015-03-10 |
| 8938508 | Correlating web and email attributes to detect spam | Shaun Cooley | 2015-01-20 |
| 8925037 | Systems and methods for enforcing data-loss-prevention policies using mobile sensors | Daniel Marino, Darren Shou | 2014-12-30 |
| 8910155 | Methods and systems for injecting endpoint management agents into virtual machines | William E. Sobel | 2014-12-09 |
| 8909845 | Systems and methods for identifying candidate duplicate memory pages in a virtual environment | William E. Sobel | 2014-12-09 |
| 8880048 | Method and apparatus for managing calls for call-related calendar entries stored on a device | Shaun Cooley | 2014-11-04 |
| 8856921 | Threat emergence date scan optimization to avoid unnecessary loading of scan engines | William E. Sobel, Mark Spiegel, Shaun Cooley | 2014-10-07 |
| 8849922 | Method and apparatus for aggregating notices and alerts into an aggregate machine readable feed | Shaun Cooley | 2014-09-30 |
| 8806644 | Using expectation measures to identify relevant application analysis results | Jun Mao | 2014-08-12 |
| 8769220 | Method and apparatus for mitigating performance impact of background processing on interactive applications | Mark Spiegel, Paul Agbabian, Shaun Cooley | 2014-07-01 |
| 8762229 | Parental policy based online wish lists | Brian Hernacki, Shaun Cooley | 2014-06-24 |
| 8745742 | Methods and systems for processing web content encoded with malicious code | Sourabh Satish, William E. Sobel | 2014-06-03 |
| 8732834 | Systems and methods for detecting illegitimate applications | Jun Mao, Barry Laffoon, Abubakar Wawda | 2014-05-20 |
| 8726392 | Systems and methods for combining static and dynamic code analysis | Xue Tian, Sheng Gong, Xiaole Zhu, Jun Mao, Qingchun Meng +2 more | 2014-05-13 |
| 8726386 | Systems and methods for detecting malware | Xue Tian, Sheng Gong, Xiaole Zhu, Jun Mao, Qingchun Meng +2 more | 2014-05-13 |
| 8713544 | Universal data-driven computer proxy | Jeffrey Sulton, Carey Nachenberg | 2014-04-29 |
| 8706745 | Systems and methods for determining a file set | Shaun Cooley, William E. Sobel | 2014-04-22 |
| 8667489 | Systems and methods for sharing the results of analyses among virtual machines | William E. Sobel | 2014-03-04 |
| 8650166 | Systems and methods for classifying files | Randall R. Cook | 2014-02-11 |
| 8645923 | Enforcing expected control flow in program execution | Sourabh Satish, William E. Sobel | 2014-02-04 |
| 8621591 | Software signing certificate reputation model | William E. Sobel | 2013-12-31 |