KG

Kent E. Griffin

Broadcom: 21 patents #440 of 9,346Top 5%
Microsoft: 6 patents #7,383 of 40,388Top 20%
Overall (All Time): #137,613 of 4,157,543Top 4%
28
Patents All Time

Issued Patents All Time

Showing 25 most recent of 28 patents

Patent #TitleCo-InventorsDate
11328820 Decision engine based on disparate data sources Alejandro Novoa, Andrew Chang, Travis Swientek, Greg Corey, Todd Kusterer 2022-05-10
9652616 Techniques for classifying non-process threats Sandeep Bhatkar, Pratyusa K. Manadhata 2017-05-16
9262638 Hygiene based computer security Carey Nachenberg 2016-02-16
9135447 Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area Susanta K. Nanda 2015-09-15
8881287 Systems and methods for library function identification in automatic malware signature generation Xin Hu, Tzi-Cker Chiueh, Scott Schneider 2014-11-04
8826439 Encoding machine code instructions for static feature based malware clustering Xin Hu, Sandeep Bhatkar 2014-09-02
8677346 Providing installer package information to a user Sourabh Satish, Vijay Seshadri, Abubakar Wawda, Jing Zhou 2014-03-18
8572007 Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold Pratyusa K. Manadhata, Zulfikar Ramzan 2013-10-29
8555083 Systems and methods for protecting against unauthorized access of encrypted data during power-management modes Susanta K. Nanda 2013-10-08
8429745 Systems and methods for data loss prevention on mobile computing systems Jim Casaburi, Susanta K. Nanda, Sanjay Sawhney, Matthew Conover 2013-04-23
8321942 Selecting malware signatures based on malware diversity Tzi-Cker Chiueh, Scott Schneider, Xin Hu 2012-11-27
8312537 Reputation based identification of false positive malware detections Carey Nachenberg 2012-11-13
8312536 Hygiene-based computer security Carey Nachenberg 2012-11-13
8296848 Control flow redirection and analysis for detecting vulnerability exploitation Carey Nachenberg, Shane Pereira 2012-10-23
8291497 Systems and methods for byte-level context diversity-based automatic malware signature generation Tzi-Cker Chiueh, Scott Schneider 2012-10-16
8239948 Selecting malware signatures to reduce false-positive detections Tzi-Cker Chiueh, Scott Schneider, Xin Hu 2012-08-07
8239944 Reducing malware signature set size through server-side processing Carey Nachenberg 2012-08-07
8214365 Measuring confidence of file clustering and clustering based file classification Pratyusa K. Manadhata, Sandeep Bhatkar 2012-07-03
8037529 Buffer overflow vulnerability detection and patch generation system and method Tzi-Cker Chiueh 2011-10-11
8028338 Modeling goodware characteristics to reduce false positive malware signatures Scott Schneider 2011-09-27
7962961 Responding to detected application vulnerability exploits Tzi-Cker Chiueh, Sourabh Satish 2011-06-14
7774470 Load balancing using a distributed hash Darren Sanders, Carey Nachenberg 2010-08-10
6008820 Processor for controlling the display of rendered image layers and method for controlling same Joseph W. Chauvin, Steven A. Gabriel, Howard Good, William Chambers Powell, III, George Easton Scott, III +3 more 1999-12-28
6005582 Method and system for texture mapping images with anisotropic filtering Steven A. Gabriel 1999-12-21
5990904 Method and system for merging pixel fragments in a graphics rendering system 1999-11-23