Issued Patents All Time
Showing 26–50 of 62 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8353038 | Monitoring and managing changes to non-structured storage of system configuration information | — | 2013-01-08 |
| 8352438 | Systems and methods for contextual evaluation of files for use in file restoration | — | 2013-01-08 |
| 8302193 | Methods and systems for scanning files for malware | Patrick Gardner, Everett Lai, Haik Mesropian | 2012-10-30 |
| 8280830 | Systems and methods for using multiple in-line heuristics to reduce false positives | — | 2012-10-02 |
| 8230500 | Methods and systems for detecting rootkits | Michael Spertus | 2012-07-24 |
| 8220055 | Behavior blocking utilizing positive behavior system and method | — | 2012-07-10 |
| 8209757 | Direct call into system DLL detection system and method | Shane Pereira | 2012-06-26 |
| 8205217 | Methods and systems for configuring a specific-use computing system limited to executing predetermined and pre-approved application programs | Mark Obrecht | 2012-06-19 |
| 8205263 | Systems and methods for identifying an executable file obfuscated by an unknown obfuscator program | — | 2012-06-19 |
| 8181251 | Methods and systems for detecting malware | — | 2012-05-15 |
| 8176554 | Malware detection through symbol whitelisting | — | 2012-05-08 |
| 8176555 | Systems and methods for detecting malicious processes by analyzing process names and process characteristics | Anthony Schreiner, Brian Hernacki, Christopher Peterson, William E. Sobel | 2012-05-08 |
| 8104086 | Heuristically detecting spyware/adware registry activity | — | 2012-01-24 |
| 8065734 | Code module operating system (OS) interactions intercepting system and method | — | 2011-11-22 |
| 8065730 | Anti-malware scanning in a virtualized file system environment | William E. Sobel, Adam Glick | 2011-11-22 |
| 8060734 | Systems and methods for providing recommendations to improve boot performance based on community data | Keith Newstadt, Matt Boucher | 2011-11-15 |
| 8051478 | Secure browser | Archana S. Rajan, Edward Bonver | 2011-11-01 |
| 8015284 | Discerning use of signatures by third party vendors | Henri J. Isenberg | 2011-09-06 |
| 8001603 | Variable scan of files based on file context | — | 2011-08-16 |
| 7950060 | Method and apparatus for suppressing e-mail security artifacts | Bruce McCorkendale | 2011-05-24 |
| 7950057 | Driver load manager and method | Bruce McCorkendale | 2011-05-24 |
| 7941863 | Detecting and preventing external modification of passwords | — | 2011-05-10 |
| 7934259 | Stealth threat detection | — | 2011-04-26 |
| 7926106 | Utilizing early exclusive volume access and direct volume manipulation to remove protected files | Michael Spertus, Peter Linhardt, Richard Bruce Gough, Adam Glick, Patrick Gardner +2 more | 2011-04-12 |
| 7823205 | Conserving computing resources while providing security | Henri J. Isenberg | 2010-10-26 |