Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9733929 | Systems and methods for restoring applications | Adam Glick, Spencer Smith | 2017-08-15 |
| 9661004 | Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions | Adam Glick, Spencer Smith | 2017-05-23 |
| 9350755 | Method and apparatus for detecting malicious software transmission through a web portal | Adam Glick, Spencer Smith | 2016-05-24 |
| 9152790 | Systems and methods for detecting fraudulent software applications that generate misleading notifications | Adam Glick, Spencer Smith | 2015-10-06 |
| 8904538 | Systems and methods for user-directed malware remediation | Adam Glick, Spencer Smith | 2014-12-02 |
| 8844024 | Systems and methods for using tiered signing certificates to manage the behavior of executables | Spencer Smith, Adam Glick | 2014-09-23 |
| 8782790 | Signature creation for malicious network traffic | Spencer Smith, Adam Glick, Uriel Mann | 2014-07-15 |
| 8776196 | Systems and methods for automatically detecting and preventing phishing attacks | Ian Oliver, Adam Glick, Spencer Smith | 2014-07-08 |
| 8776227 | User interface based malware detection | Adam Glick, Spencer Smith | 2014-07-08 |
| 8701192 | Behavior based signatures | Adam Glick, Spencer Smith | 2014-04-15 |
| 8627463 | Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions | Adam Glick, Spencer Smith | 2014-01-07 |
| 8621632 | Systems and methods for locating malware | Spencer Smith, Adam Glick | 2013-12-31 |
| 8566950 | Method and apparatus for detecting potentially misleading visual representation objects to secure a computer | Spencer Smith, Adam Lyle Glice | 2013-10-22 |
| 8549626 | Method and apparatus for securing a computer from malicious threats through generic remediation | Adam Glick, Spencer Smith | 2013-10-01 |
| 8418223 | Systems and methods for updating parental-control settings | Spencer Smith, Adam Glick | 2013-04-09 |
| 8352409 | Systems and methods for improving the effectiveness of decision trees | Sourabh Satish, Lachlan Orr, Shane Pereira, Scott Charles Sullivan | 2013-01-08 |
| 8336100 | Systems and methods for using reputation data to detect packed malware | Adam Glick, Spencer Smith | 2012-12-18 |
| 8132186 | Automatic detection of hardware and device drivers during restore operations | Okan Okcu, Mitchell Mikula, Jason Anthony Miller | 2012-03-06 |
| 7941814 | Device driver processing for automated system restores | Okan Okcu | 2011-05-10 |
| 7769990 | Using a monitoring process to update system configuration settings during restore operations | Okan Okcu | 2010-08-03 |
| 7680957 | Computer system configuration representation and transfer | Thomas R. Ketterhagen, Bruce Bramhall, Okan Okcu | 2010-03-16 |
| 7496783 | Merging cluster nodes during a restore | Thomas R. Ketterhagen | 2009-02-24 |
| 7334157 | Restore of data to a computer system having different hardware | Okan Okcu | 2008-02-19 |
| 7328325 | System and method for hierarchical storage mapping | Eduardo A. Solis | 2008-02-05 |
| 7293272 | Device driver processing for automated system restores | Okan Okcu | 2007-11-06 |