SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 76–100 of 271 patents

Patent #TitleCo-InventorsDate
10425440 Implementing security actions in an advisement system based on obtained software characteristics Oliver Friedrichs, Atif Mahadik, Govind Salinas 2019-09-24
10425441 Translating security actions to action procedures in an advisement system Oliver Friedrichs, Atif Mahadik, Govind Salinas 2019-09-24
10320845 Recommended security action feature sets Oliver Friedrichs, Atif Mahadik, Govind Salinas, Ryan Scott Russell 2019-06-11
10193920 Managing security actions in a computing environment based on communication activity of a security threat Oliver Friedrichs, Atif Mahadik, Govind Salinas 2019-01-29
10158663 Incident response using asset configuration data Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-12-18
10116687 Management of administrative incident response based on environmental characteristics associated with a security incident Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-10-30
10063587 Management of security actions based on computing asset classification Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-08-28
10049190 Method and apparatus for remotely managing a resource at a computer Keith Newstadt, Shaun Cooley, Timothy G. Brown, Brian Hernacki 2018-08-14
9971776 Method and apparatus for extending functionality of an operating system Brian Hernacki 2018-05-15
9959404 Methods and systems for creating and updating approved-file and trusted-domain databases Carey Nachenberg, Michael Spertus, Gerry A. Egan 2018-05-01
9954888 Security actions for computing assets based on enrichment information Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-04-24
9888029 Classifying kill-chains for security incidents Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-02-06
9871818 Managing workflows upon a security incident Oliver Friedrichs, Atif Mahadik, Govind Salinas 2018-01-16
9846772 Systems and methods for detecting misplaced applications using functional categories 2017-12-19
9805115 Systems and methods for updating generic file-classification definitions 2017-10-31
9781159 Method, apparatus and system for protecting identity information Brian Hernacki, Michael Spertus 2017-10-03
9781151 Techniques for identifying malicious downloadable applications Bruce McCorkendale, Xuefeng Tian, Jingnan Si, Jun Mao, Xiaole Zhu +1 more 2017-10-03
9762607 Incident response automation engine Oliver Friedrichs, Atif Mahadik, Govind Salinas 2017-09-12
9712555 Automated responses to security threats Oliver Friedrichs, Atif Mahadik, Govind Salinas 2017-07-18
9684705 Systems and methods for clustering data Govind Salinas 2017-06-20
9622081 Systems and methods for evaluating reputations of wireless networks 2017-04-11
9621585 Applying functional classification to tune security policies and posture according to role and likely activity Bruce McCorkendale 2017-04-11
9571509 Systems and methods for identifying variants of samples based on similarity analysis Himanshu Dubey, Vipul Sawant 2017-02-14
9412066 Systems and methods for predicting optimum run times for software samples 2016-08-09
9385869 Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions Christopher Peterson 2016-07-05