SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 226–250 of 271 patents

Patent #TitleCo-InventorsDate
8151193 Providing image-based guidance for remote assistance Brian Hernacki, Timothy G. Brown 2012-04-03
8150991 Geolocation-based application streaming systems, apparatus, and methods William E. Sobel 2012-04-03
8112806 Detecting network interface card level malware William E. Sobel, Bruce McCorkendale 2012-02-07
8112803 IPv6 malicious code blocking system and method Brian Hernacki 2012-02-07
8108923 Assessing risk based on offline activity history Brian Hernacki 2012-01-31
8103875 Detecting email fraud through fingerprinting Zulfikar Ramzan, Oliver Friedrichs 2012-01-24
8095679 Predictive transmission of content for application streaming and network file systems Brian Hernacki, Zulfikar Ramzan 2012-01-10
8079030 Detecting stealth network communications Brian Hernacki 2011-12-13
8078909 Detecting file system layout discrepancies 2011-12-13
8069486 Identifying the origin of hard-copy documents Brian Hernacki 2011-11-29
8045457 Dropping packets to prevent unauthorized data transfer through multimedia tunnels Brian Hernacki 2011-10-25
8037526 Detecting buffer overflows using frame pointer characteristics Matthew Conover 2011-10-11
8006116 Systems and methods for storing health information with computing-system backups William E. Sobel 2011-08-23
7975308 Method and apparatus to secure user confidential data from untrusted browser extensions Govind Salinas, Zulfikar Ramzan 2011-07-05
7975010 Countering spam through address comparison 2011-07-05
7970939 Methods and systems for addressing DNS rebinding Basil Gabriel 2011-06-28
7966278 Method for determining the health impact of an application based on information obtained from like-profiled computing systems using clustering 2011-06-21
7962961 Responding to detected application vulnerability exploits Kent E. Griffin, Tzi-Cker Chiueh 2011-06-14
7958102 Method and apparatus for searching a storage system for confidential data Brian Hernacki 2011-06-07
7950056 Behavior based processing of a new version or variant of a previously characterized program Brian Hernacki 2011-05-24
7945953 Method to identify buffer overflows and RLIBC attacks Govind Salinas, Matthew Conover 2011-05-17
7941850 Malware removal system and method 2011-05-10
7908391 Application streaming and network file system optimization via feature popularity William E. Sobel, Brian Hernacki 2011-03-15
7895448 Risk profiling 2011-02-22
7885639 Method and apparatus for authenticating a wireless access point Brian Hernacki 2011-02-08