| 8990353 |
Recommended alteration to a processing system |
— |
2015-03-24 |
| 8887278 |
Restricting a processing system being compromised with a threat |
Simon Clausen |
2014-11-11 |
| 8769674 |
Instant message scanning |
Simon Clausen |
2014-07-01 |
| 8640235 |
Determination of malicious entities |
Simon Clausen |
2014-01-28 |
| 8307276 |
Distributed content verification and indexing |
Simon Clausen |
2012-11-06 |
| 8196201 |
Detecting malicious activity |
Simon Clausen, Ian Oliver, Ryan Pereira |
2012-06-05 |
| 8112403 |
Providing a rating for a web site based on weighted user feedback |
Simon Clausen |
2012-02-07 |
| 8065699 |
Providing rating information for an event based on user feedback |
Simon Clausen |
2011-11-22 |
| 8028301 |
Restricting recordal of user activity in a processing system |
Simon Clausen |
2011-09-27 |
| 8001367 |
Performing application setting activity using a removable storage device |
Simon Clausen |
2011-08-16 |
| 7971257 |
Obtaining network origins of potential software threats |
Ian Oliver, Ryan Pereira, Neil Younusov |
2011-06-28 |
| 7941852 |
Detecting an audio/visual threat |
Simon Clausen |
2011-05-10 |
| 7877801 |
Method and system to detect malicious software |
Simon Clausen |
2011-01-25 |
| 7877806 |
Real time malicious software detection |
Simon Clausen, Ian Oliver, Ryan Pereira |
2011-01-25 |
| 7870394 |
Method and system to scan firmware for malware |
Simon Clausen |
2011-01-11 |
| 7801840 |
Threat identification utilizing fuzzy logic analysis |
Simon Clausen, Ian Oliver, Ryan Pereira |
2010-09-21 |