Issued Patents All Time
Showing 226–250 of 271 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8151193 | Providing image-based guidance for remote assistance | Brian Hernacki, Timothy G. Brown | 2012-04-03 |
| 8150991 | Geolocation-based application streaming systems, apparatus, and methods | William E. Sobel | 2012-04-03 |
| 8112806 | Detecting network interface card level malware | William E. Sobel, Bruce McCorkendale | 2012-02-07 |
| 8112803 | IPv6 malicious code blocking system and method | Brian Hernacki | 2012-02-07 |
| 8108923 | Assessing risk based on offline activity history | Brian Hernacki | 2012-01-31 |
| 8103875 | Detecting email fraud through fingerprinting | Zulfikar Ramzan, Oliver Friedrichs | 2012-01-24 |
| 8095679 | Predictive transmission of content for application streaming and network file systems | Brian Hernacki, Zulfikar Ramzan | 2012-01-10 |
| 8079030 | Detecting stealth network communications | Brian Hernacki | 2011-12-13 |
| 8078909 | Detecting file system layout discrepancies | — | 2011-12-13 |
| 8069486 | Identifying the origin of hard-copy documents | Brian Hernacki | 2011-11-29 |
| 8045457 | Dropping packets to prevent unauthorized data transfer through multimedia tunnels | Brian Hernacki | 2011-10-25 |
| 8037526 | Detecting buffer overflows using frame pointer characteristics | Matthew Conover | 2011-10-11 |
| 8006116 | Systems and methods for storing health information with computing-system backups | William E. Sobel | 2011-08-23 |
| 7975308 | Method and apparatus to secure user confidential data from untrusted browser extensions | Govind Salinas, Zulfikar Ramzan | 2011-07-05 |
| 7975010 | Countering spam through address comparison | — | 2011-07-05 |
| 7970939 | Methods and systems for addressing DNS rebinding | Basil Gabriel | 2011-06-28 |
| 7966278 | Method for determining the health impact of an application based on information obtained from like-profiled computing systems using clustering | — | 2011-06-21 |
| 7962961 | Responding to detected application vulnerability exploits | Kent E. Griffin, Tzi-Cker Chiueh | 2011-06-14 |
| 7958102 | Method and apparatus for searching a storage system for confidential data | Brian Hernacki | 2011-06-07 |
| 7950056 | Behavior based processing of a new version or variant of a previously characterized program | Brian Hernacki | 2011-05-24 |
| 7945953 | Method to identify buffer overflows and RLIBC attacks | Govind Salinas, Matthew Conover | 2011-05-17 |
| 7941850 | Malware removal system and method | — | 2011-05-10 |
| 7908391 | Application streaming and network file system optimization via feature popularity | William E. Sobel, Brian Hernacki | 2011-03-15 |
| 7895448 | Risk profiling | — | 2011-02-22 |
| 7885639 | Method and apparatus for authenticating a wireless access point | Brian Hernacki | 2011-02-08 |