IS

Ilya Sokolov

Broadcom: 64 patents #67 of 9,346Top 1%
NO Nortonlifelock: 26 patents #1 of 159Top 1%
CA Ca: 3 patents #240 of 1,424Top 20%
JL J. C. Bamford Excavators Limited: 1 patents #110 of 224Top 50%
📍 Boston, MA: #17 of 5,993 inventorsTop 1%
🗺 Massachusetts: #278 of 88,656 inventorsTop 1%
Overall (All Time): #15,808 of 4,157,543Top 1%
96
Patents All Time

Issued Patents All Time

Showing 26–50 of 96 patents

Patent #TitleCo-InventorsDate
10706167 Systems and methods for enforcing privacy in cloud security Lei Gu, Jason Holler, Tim van der Horst 2020-07-07
10657971 Systems and methods for detecting suspicious voice calls Keith Newstadt 2020-05-19
10616214 Systems and methods for preventing loss of possession factors Kevin Jiang 2020-04-07
10609030 Systems and methods for identifying untrusted devices in peer-to-peer communication Keith Newstadt 2020-03-31
10581781 Systems and methods for facilitating negotiation and exchange of information between parties Keith Newstadt 2020-03-03
10573020 Location validation through physical surroundings Keith Newstadt 2020-02-25
10523715 Analyzing requests from authenticated computing devices to detect and estimate the size of network address translation systems Kevin Jiang, Rickey Ray 2019-12-31
10492072 Systems and methods for evaluating wireless network connection security Gopi Bhagavathula, Ning Chai, Keith Newstadt 2019-11-26
10482223 Systems and methods for selecting questions for knowledge-based authentication based on social entropy Kevin Jiang, Bruce McCorkendale 2019-11-19
10469457 Systems and methods for securely sharing cloud-service credentials within a network of computing devices Keith Newstadt 2019-11-05
10462184 Systems and methods for enforcing access-control policies in an arbitrary physical space Lei Gu, Bruce McCorkendale 2019-10-29
10447736 Systems and methods for providing security in smart buildings Kevin Jiang, Lei Gu, Michael Shavell 2019-10-15
10445481 Systems and methods for performing human-verification procedures Keith Newstadt 2019-10-15
10438000 Using recognized backup images for recovery after a ransomware attack Lei Gu 2019-10-08
10437988 Smart cover components for security policy enforcement Keith Newstadt 2019-10-08
10432720 Systems and methods for strong information about transmission control protocol connections Michael Shavell 2019-10-01
10419375 Systems and methods for analyzing emotional responses to online interactions Keith Newstadt 2019-09-17
10404697 Systems and methods for using vehicles as information sources for knowledge-based authentication Kevin Jiang, Bruce McCorkendale 2019-09-03
10382416 Techniques for detecting shared devices Kevin Jiang 2019-08-13
10375114 Systems and methods for enforcing access-control policies Lei Gu, Bruce McCorkendale 2019-08-06
10375077 Systems and methods for mediating information requests Keith Newstadt 2019-08-06
10367643 Systems and methods for managing encryption keys for single-sign-on applications Keith Newstadt 2019-07-30
10339340 Anonymous reputation requests Ronald Frederick, Mark Kennedy 2019-07-02
10339304 Systems and methods for generating tripwire files Lei Gu, Matt Boucher 2019-07-02
10331879 Systems and methods for automatically generating passwords that comply with password restrictions Kevin Jiang 2019-06-25