Issued Patents All Time
Showing 25 most recent of 75 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12353543 | Systems and methods for utilizing multiple analysis techniques to distinguish stalkerware from privacy-invasive application types | Acar Tamersoy | 2025-07-08 |
| 12034764 | Systems and methods for detecting malware based on anomalous cross-customer financial transactions | Daniel Kats | 2024-07-09 |
| 11900394 | Location-based anomaly detection based on geotagged digital photographs | Daniel Kats, Daniel Marino | 2024-02-13 |
| 11816209 | Systems and methods for protecting data on devices | Yufei Han, Acar Tamersoy, Daniel Kats | 2023-11-14 |
| 11812272 | Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices | Acar Tamersoy, Yufei Han, Anil Sharma, Arif Mohammed Shaikh | 2023-11-07 |
| 11610024 | Systems and methods for protecting search privacy | Susanta K. Nanda, Ashwin Kayyoor | 2023-03-21 |
| 11556653 | Systems and methods for detecting inter-personal attack applications | Yufei Han, Acar Tamersoy | 2023-01-17 |
| 11295015 | Identifying and protecting against surveillance apps installed on client devices | Acar Tamersoy | 2022-04-05 |
| 11245726 | Systems and methods for customizing security alert reports | Daniel Kats | 2022-02-08 |
| 11210397 | Systems and methods for training malware classifiers | Mahmood Sharif, Saurabh Shintre, Sandeep Bhatkar | 2021-12-28 |
| 11172258 | Protecting against an impersonation scam in a live video stream | Acar Tamersoy, Daniel Kats, Platon Kotzias | 2021-11-09 |
| 11163875 | Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data | Mahmood Sharif, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Dong Chung | 2021-11-02 |
| 11032319 | Systems and methods for preparing honeypot computer files | Sandeep Bhatkar, Michael Rinehart, Xiaolin Wang | 2021-06-08 |
| 11025666 | Systems and methods for preventing decentralized malware attacks | Yufei Han, Yuzhe Ma, Chris Gates, Yun Shen | 2021-06-01 |
| 11010680 | Memory efficiency of production rule systems | Daniel Marino, Acar Tamersoy, Sandeep Bhatkar | 2021-05-18 |
| 10877946 | Efficient incident response through tree-based visualizations of hierarchical clustering | David Luz Silva, Matteo Dell'Amico, Michael Hart, Christopher Gates | 2020-12-29 |
| 10721264 | Systems and methods for categorizing security incidents | Matteo Dell'Amico, Chris Gates, Michael Hart | 2020-07-21 |
| 10607005 | Systems and methods for labeling automatically generated reports | Shuning Wu, Wangyan Feng, Ningwei Liu | 2020-03-31 |
| 10586040 | Sample-specific sandbox configuration based on endpoint telemetry | Lars Haukli, Felix Leder | 2020-03-10 |
| 10579794 | Securing a network device by automatically identifying files belonging to an application | Christopher Gates, Kyle Soska | 2020-03-03 |
| 10574700 | Systems and methods for managing computer security of client computing machines | Matteo Dell'Amico, Chris Gates, Michael Hart | 2020-02-25 |
| 10542017 | Systems and methods for personalizing security incident reports | Chris Gates, Michael Hart | 2020-01-21 |
| 10534933 | Encrypting and decrypting sensitive files on a network device | Yuqiong Sun, Christopher Gates, Michael Hart, Saurabh Shintre, Brian Witten | 2020-01-14 |
| 10530805 | Systems and methods for detecting security incidents | Acar Tamersoy, Michael Hart, Daniel Kats, Michael Spertus | 2020-01-07 |
| 10452841 | Modeling malicious behavior that occurs in the absence of users | Acar Tamersoy, Sandeep Bhatkar, Daniel Marino | 2019-10-22 |