Issued Patents All Time
Showing 76–100 of 151 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8600995 | User role determination based on content and application classification | Sourabh Satish | 2013-12-03 |
| 8578006 | Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests | William E. Sobel | 2013-11-05 |
| 8566899 | Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure | William E. Sobel, Matthew R. Barnes | 2013-10-22 |
| 8528080 | Short-range mobile honeypot for sampling and tracking threats | John Patrick Kelly, III, Brian Hernacki | 2013-09-03 |
| 8503636 | Systems and methods for blocking an outgoing request associated with an outgoing telephone number | — | 2013-08-06 |
| 8504215 | Systems and methods for using alternate power sources to manage the power draw on a power grid | Shaun Cooley | 2013-08-06 |
| 8479010 | Detecting, capturing and processing valid login credentials | Shaun Cooley, Brian Hernacki | 2013-07-02 |
| 8434073 | Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment | Sourabh Satish, William E. Sobel | 2013-04-30 |
| 8429180 | Cooperative identification of malicious remote objects | William E. Sobel | 2013-04-23 |
| 8429734 | Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes | Paul Agbabian, William E. Sobel | 2013-04-23 |
| 8413146 | Hypervisor assisted single instance data access by multiple virtual machines | David Buches, William E. Sobel | 2013-04-02 |
| 8402528 | Portable firewall adapter | William E. Sobel | 2013-03-19 |
| 8402458 | Methods and systems for converting non-layered-software-application installations into layered installations | William E. Sobel | 2013-03-19 |
| 8359649 | Use of geo-location data for spam detection | William E. Sobel | 2013-01-22 |
| 8353058 | Methods and systems for detecting rootkits | Sourabh Satish, William E. Sobel | 2013-01-08 |
| 8353039 | Method and apparatus for processing a multi-step authentication sequence | Shaun Cooley | 2013-01-08 |
| 8312547 | Anti-malware scanning in a portable application virtualized environment | William E. Sobel | 2012-11-13 |
| 8281366 | Systems and methods for using guardian proximity to control computing activities of children | Shaun Cooley | 2012-10-02 |
| 8281058 | Systems and methods for using USB device descriptors to identify computing environments | Shaun Cooley | 2012-10-02 |
| 8281363 | Methods and systems for enforcing network access control in a virtual environment | Brian Hernacki, William E. Sobel | 2012-10-02 |
| 8271774 | Circumstantial blocking of incoming network traffic containing code | Carey Nachenberg | 2012-09-18 |
| 8225053 | Method and apparatus for mitigating performance impact of background processing on interactive application | Mark Spiegel, Paul Agbabian, Shaun Cooley | 2012-07-17 |
| 8214900 | Method and apparatus for monitoring a computer to detect operating system process manipulation | Sourabh Satish, William E. Sobel | 2012-07-03 |
| 8180761 | Referrer context aware target queue prioritization | Shaun Cooley | 2012-05-15 |
| 8171545 | Process profiling for behavioral anomaly detection | Shaun Cooley | 2012-05-01 |