Issued Patents All Time
Showing 251–271 of 271 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7886282 | Augmenting signature-based technologies with functional flow graphs | Greg Vogel | 2011-02-08 |
| 7886065 | Detecting reboot events to enable NAC reassessment | Brian Hernacki | 2011-02-08 |
| 7877800 | Preventing fraudulent misdirection of affiliate program cookie tracking | Brian Hernacki | 2011-01-25 |
| 7870597 | Method and apparatus for managing digital identities through a single interface | Brian Hernacki | 2011-01-11 |
| 7856090 | Automatic spim detection | — | 2010-12-21 |
| 7831412 | Systems and methods for providing guidance by category on the potential impact of an application on the health of a computing system | William E. Sobel | 2010-11-09 |
| 7831522 | Evaluating relying parties | Brian Hernacki | 2010-11-09 |
| 7832005 | Behavioral learning based security | Harlan Seymour, Philip Lao, John Bonamico | 2010-11-09 |
| 7814535 | Method and apparatus for peer-to-peer compliancy validation in secure managed networks | Ian Barile | 2010-10-12 |
| 7808958 | Rogue wireless access point detection | Brian Hernacki | 2010-10-05 |
| 7752242 | Executing unmanaged content in a managed execution environment | Matthew Conover | 2010-07-06 |
| 7752664 | Using domain name service resolution queries to combat spyware | Brian Hernacki | 2010-07-06 |
| 7729342 | Privacy preservation for voice over internet protocol calling | Carey Nachenberg | 2010-06-01 |
| 7673139 | Protecting administrative privileges | Harlan Seymour | 2010-03-02 |
| 7620983 | Behavior profiling | — | 2009-11-17 |
| 7562391 | Reducing false positive indications of buffer overflow attacks | Carey Nachenberg | 2009-07-14 |
| 7552477 | Detecting return-to-LIBC buffer overflows via dynamic disassembly of offsets | Matthew Conover | 2009-06-23 |
| 7552479 | Detecting shellcode that modifies IAT entries | Matthew Conover | 2009-06-23 |
| 7506056 | System analyzing configuration fingerprints of network nodes for granting network access and detecting security threat | Brian Hernacki | 2009-03-17 |
| 7296138 | Method and apparatus to hook shared libraries across all processes on windows | Matthew Conover | 2007-11-13 |
| 7272748 | Method and apparatus to detect and recover from a stack frame corruption | Matthew Conover | 2007-09-18 |