Issued Patents All Time
Showing 101–125 of 271 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9373080 | Using historical accuracy of user decision making to improve accuracy of predictive modeling based automatic classification | — | 2016-06-21 |
| 9361460 | Detecting malware through package behavior | — | 2016-06-07 |
| 9332033 | Methods and systems for enabling community-tested security features for legacy applications | William E. Sobel | 2016-05-03 |
| 9330258 | Systems and methods for identifying uniform resource locators that link to potentially malicious resources | Jingjing Ren | 2016-05-03 |
| 9323930 | Systems and methods for reporting security vulnerabilities | — | 2016-04-26 |
| 9323924 | Systems and methods for establishing reputations of files | Kevin Roundy, Acar Tamersoy | 2016-04-26 |
| 9276947 | Identifying misuse of legitimate objects | — | 2016-03-01 |
| 9246931 | Communication-based reputation system | Carey Nachenberg | 2016-01-26 |
| 9246887 | Method and apparatus for securing confidential data for a user in a computer | Brian Hernacki | 2016-01-26 |
| 9245123 | Systems and methods for identifying malicious files | — | 2016-01-26 |
| 9235390 | Application optimization for use based on feature popularity | Brian Hernacki | 2016-01-12 |
| 9230115 | Educating computer users concerning security threats | — | 2016-01-05 |
| 9230105 | Detecting malicious tampering of web forms | Abubakar Wawda | 2016-01-05 |
| 9231969 | Determining file risk based on security reputation of associated objects | — | 2016-01-05 |
| 9223966 | Systems and methods for replicating computing system environments | Abubakar Wawda | 2015-12-29 |
| 9171253 | Identifying predictive models resistant to concept drift | Adam Wright, Jeffrey Wilhelm | 2015-10-27 |
| 9152703 | Systems and methods for clustering data samples | — | 2015-10-06 |
| 9141795 | Techniques for detecting malicious activity | — | 2015-09-22 |
| 9130962 | Calculating domain registrar reputation by analysis of hosted domains | Brian Hernacki | 2015-09-08 |
| 9083729 | Systems and methods for determining that uniform resource locators are malicious | Nishant Doshi | 2015-07-14 |
| 9077715 | Social trust based security model | Brian Hernacki | 2015-07-07 |
| 9075989 | Identifying misuse of legitimate objects | — | 2015-07-07 |
| 9064120 | Systems and methods for directing application updates | Abubakar Wawda, Petrus Johannes Viljoen, Gerry A. Egan | 2015-06-23 |
| 9058492 | Techniques for reducing executable code vulnerability | — | 2015-06-16 |
| 8997228 | Techniques for detecting infected websites | Nishant Doshi | 2015-03-31 |