SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 251–271 of 271 patents

Patent #TitleCo-InventorsDate
7886282 Augmenting signature-based technologies with functional flow graphs Greg Vogel 2011-02-08
7886065 Detecting reboot events to enable NAC reassessment Brian Hernacki 2011-02-08
7877800 Preventing fraudulent misdirection of affiliate program cookie tracking Brian Hernacki 2011-01-25
7870597 Method and apparatus for managing digital identities through a single interface Brian Hernacki 2011-01-11
7856090 Automatic spim detection 2010-12-21
7831412 Systems and methods for providing guidance by category on the potential impact of an application on the health of a computing system William E. Sobel 2010-11-09
7831522 Evaluating relying parties Brian Hernacki 2010-11-09
7832005 Behavioral learning based security Harlan Seymour, Philip Lao, John Bonamico 2010-11-09
7814535 Method and apparatus for peer-to-peer compliancy validation in secure managed networks Ian Barile 2010-10-12
7808958 Rogue wireless access point detection Brian Hernacki 2010-10-05
7752242 Executing unmanaged content in a managed execution environment Matthew Conover 2010-07-06
7752664 Using domain name service resolution queries to combat spyware Brian Hernacki 2010-07-06
7729342 Privacy preservation for voice over internet protocol calling Carey Nachenberg 2010-06-01
7673139 Protecting administrative privileges Harlan Seymour 2010-03-02
7620983 Behavior profiling 2009-11-17
7562391 Reducing false positive indications of buffer overflow attacks Carey Nachenberg 2009-07-14
7552477 Detecting return-to-LIBC buffer overflows via dynamic disassembly of offsets Matthew Conover 2009-06-23
7552479 Detecting shellcode that modifies IAT entries Matthew Conover 2009-06-23
7506056 System analyzing configuration fingerprints of network nodes for granting network access and detecting security threat Brian Hernacki 2009-03-17
7296138 Method and apparatus to hook shared libraries across all processes on windows Matthew Conover 2007-11-13
7272748 Method and apparatus to detect and recover from a stack frame corruption Matthew Conover 2007-09-18