SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 151–175 of 271 patents

Patent #TitleCo-InventorsDate
8763076 Endpoint management using trust rating data Brian Hernacki 2014-06-24
8745742 Methods and systems for processing web content encoded with malicious code William E. Sobel, Bruce McCorkendale 2014-06-03
8713687 Methods and systems for enabling community-tested security features for legacy applications William E. Sobel 2014-04-29
8694983 Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing system William E. Sobel 2014-04-08
8689001 Method and system for protecting user identification information Brian Hernacki 2014-04-01
8677346 Providing installer package information to a user Kent E. Griffin, Vijay Seshadri, Abubakar Wawda, Jing Zhou 2014-03-18
8667592 Systems and methods for looking up anti-malware metadata William E. Sobel 2014-03-04
8645923 Enforcing expected control flow in program execution Bruce McCorkendale, William E. Sobel 2014-02-04
8627407 Systems and methods for preventing unauthorized modification of network resources Nishant Doshi 2014-01-07
8626675 Systems and methods for user-specific tuning of classification heuristics 2014-01-07
8627476 Altering application behavior based on content provider reputation Patrick Gardner 2014-01-07
8607348 Process boundary isolation using constrained processes Mark Kennedy 2013-12-10
8600995 User role determination based on content and application classification Bruce McCorkendale 2013-12-03
8595211 Techniques for managing search engine results 2013-11-26
8584234 Secure network cache content William E. Sobel 2013-11-12
8578345 Malware detection efficacy by identifying installation and uninstallation scenarios Mark Kennedy, Alexander Danileiko, Ming-Jen Wang 2013-11-05
8578056 Optimized application streaming for just in time compiled components William E. Sobel 2013-11-05
8572730 Systems and methods for revoking digital signatures William E. Sobel 2013-10-29
8566589 Method and apparatus for identifying a web server 2013-10-22
8566401 Method and apparatus for enabling e-mail routing and filtering based on dynamic identities Brian Hernacki 2013-10-22
8533842 Method and apparatus for evaluating internet resources using a computer health metric 2013-09-10
8533831 Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing 2013-09-10
8499354 Preventing malware from abusing application data William E. Sobel 2013-07-30
8499063 Uninstall and system performance based software application reputation William E. Sobel 2013-07-30
8499350 Detecting malware through package behavior 2013-07-30