Issued Patents All Time
Showing 25 most recent of 62 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11146537 | Systems and methods for protecting geolocation information | — | 2021-10-12 |
| 11044271 | Automatic adaptive policy based security | Petrus Johannes Viljoen | 2021-06-22 |
| 10887339 | Systems and methods for protecting a cloud storage against suspected malware | Ilya Sokolov, Lei Gu | 2021-01-05 |
| 10546123 | Systems and methods for identifying malicious computer files | Qichao Lan, Xuefeng Tian, Barry Laffoon | 2020-01-28 |
| 10489587 | Systems and methods for classifying files as specific types of malware | Barry Laffoon | 2019-11-26 |
| 10452838 | Providing joint access to an isolated computer object by both an isolated computer application and a non-isolated computer application | — | 2019-10-22 |
| 10339340 | Anonymous reputation requests | Ilya Sokolov, Ronald Frederick | 2019-07-02 |
| 10320834 | Retuning of random classification forests to improve efficacy | Barry Laffoon | 2019-06-11 |
| 10284585 | Tree rotation in random classification forests to improve efficacy | Andrew B. Gardner | 2019-05-07 |
| 9942264 | Systems and methods for improving forest-based malware detection within an organization | Pieter Viljoen | 2018-04-10 |
| 9858410 | Techniques for automated application analysis | Andrew B. Gardner, Vincent Cheong | 2018-01-02 |
| 9762593 | Automatic generation of generic file signatures | Kenneth Coleman | 2017-09-12 |
| 9405904 | Systems and methods for providing security for synchronized files | Ke Fang, Yanjiao Zuo | 2016-08-02 |
| 9183377 | Unauthorized account monitoring system and method | William E. Sobel, Brian Hernacki | 2015-11-10 |
| 9135442 | Methods and systems for detecting obfuscated executables | — | 2015-09-15 |
| 9098706 | Installer trust chain validation | — | 2015-08-04 |
| 9038186 | Malware detection using file names | Pratyusa K. Manadhata, Zulfikar Ramzan | 2015-05-19 |
| 8931086 | Method and apparatus for reducing false positive detection of malware | Shane Pereira, Pieter Viljoen | 2015-01-06 |
| 8826034 | Selective revocation of heuristic exemption for content with digital signatures | — | 2014-09-02 |
| 8635171 | Systems and methods for reducing false positives produced by heuristics | — | 2014-01-21 |
| 8621233 | Malware detection using file names | Pratyusa K. Manadhata, Zulfikar Ramzan | 2013-12-31 |
| 8607348 | Process boundary isolation using constrained processes | Sourabh Satish | 2013-12-10 |
| 8578345 | Malware detection efficacy by identifying installation and uninstallation scenarios | Sourabh Satish, Alexander Danileiko, Ming-Jen Wang | 2013-11-05 |
| 8495741 | Remediating malware infections through obfuscation | Timothy M. Naftel, Adam Glick | 2013-07-23 |
| 8381302 | Systems and methods for translating non-comparable values into comparable values for use in heuristics | Abubakar Wawda | 2013-02-19 |