Issued Patents All Time
Showing 25 most recent of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11328820 | Decision engine based on disparate data sources | Alejandro Novoa, Andrew Chang, Travis Swientek, Greg Corey, Todd Kusterer | 2022-05-10 |
| 9652616 | Techniques for classifying non-process threats | Sandeep Bhatkar, Pratyusa K. Manadhata | 2017-05-16 |
| 9262638 | Hygiene based computer security | Carey Nachenberg | 2016-02-16 |
| 9135447 | Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area | Susanta K. Nanda | 2015-09-15 |
| 8881287 | Systems and methods for library function identification in automatic malware signature generation | Xin Hu, Tzi-Cker Chiueh, Scott Schneider | 2014-11-04 |
| 8826439 | Encoding machine code instructions for static feature based malware clustering | Xin Hu, Sandeep Bhatkar | 2014-09-02 |
| 8677346 | Providing installer package information to a user | Sourabh Satish, Vijay Seshadri, Abubakar Wawda, Jing Zhou | 2014-03-18 |
| 8572007 | Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold | Pratyusa K. Manadhata, Zulfikar Ramzan | 2013-10-29 |
| 8555083 | Systems and methods for protecting against unauthorized access of encrypted data during power-management modes | Susanta K. Nanda | 2013-10-08 |
| 8429745 | Systems and methods for data loss prevention on mobile computing systems | Jim Casaburi, Susanta K. Nanda, Sanjay Sawhney, Matthew Conover | 2013-04-23 |
| 8321942 | Selecting malware signatures based on malware diversity | Tzi-Cker Chiueh, Scott Schneider, Xin Hu | 2012-11-27 |
| 8312537 | Reputation based identification of false positive malware detections | Carey Nachenberg | 2012-11-13 |
| 8312536 | Hygiene-based computer security | Carey Nachenberg | 2012-11-13 |
| 8296848 | Control flow redirection and analysis for detecting vulnerability exploitation | Carey Nachenberg, Shane Pereira | 2012-10-23 |
| 8291497 | Systems and methods for byte-level context diversity-based automatic malware signature generation | Tzi-Cker Chiueh, Scott Schneider | 2012-10-16 |
| 8239948 | Selecting malware signatures to reduce false-positive detections | Tzi-Cker Chiueh, Scott Schneider, Xin Hu | 2012-08-07 |
| 8239944 | Reducing malware signature set size through server-side processing | Carey Nachenberg | 2012-08-07 |
| 8214365 | Measuring confidence of file clustering and clustering based file classification | Pratyusa K. Manadhata, Sandeep Bhatkar | 2012-07-03 |
| 8037529 | Buffer overflow vulnerability detection and patch generation system and method | Tzi-Cker Chiueh | 2011-10-11 |
| 8028338 | Modeling goodware characteristics to reduce false positive malware signatures | Scott Schneider | 2011-09-27 |
| 7962961 | Responding to detected application vulnerability exploits | Tzi-Cker Chiueh, Sourabh Satish | 2011-06-14 |
| 7774470 | Load balancing using a distributed hash | Darren Sanders, Carey Nachenberg | 2010-08-10 |
| 6008820 | Processor for controlling the display of rendered image layers and method for controlling same | Joseph W. Chauvin, Steven A. Gabriel, Howard Good, William Chambers Powell, III, George Easton Scott, III +3 more | 1999-12-28 |
| 6005582 | Method and system for texture mapping images with anisotropic filtering | Steven A. Gabriel | 1999-12-21 |
| 5990904 | Method and system for merging pixel fragments in a graphics rendering system | — | 1999-11-23 |