SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 176–200 of 271 patents

Patent #TitleCo-InventorsDate
8495096 Decision tree induction that is sensitive to attribute computational complexity Shane Pereira, Zulfikar Ramzan 2013-07-23
8490190 Use of interactive messaging channels to verify endpoints Brian Hernacki 2013-07-16
8473924 Enabling efficient use of an endpoint William E. Sobel 2013-06-25
8468608 Enforcing digital rights management in a heterogeneous environment Brian Hernacki, William E. Sobel 2013-06-18
8464345 Behavioral signature generation using clustering Shane Pereira 2013-06-11
8452848 Facilitating secure 24x7 on-demand service availability while minimizing power consumption and power load spikes Atif Mahadik 2013-05-28
8443354 Detecting new or modified portions of code Brian Hernacki 2013-05-14
8434073 Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment Bruce McCorkendale, William E. Sobel 2013-04-30
8434149 Method and apparatus for identifying web attacks Zulfikar Ramzan 2013-04-30
8424007 Prioritizing tasks from virtual machines Brian Hernacki, William E. Sobel 2013-04-16
8418251 Detecting malware using cost characteristics 2013-04-09
8401982 Using sequencing and timing information of behavior events in machine learning to detect malware Zulfikar Ramzan 2013-03-19
8397087 Systems and methods for individually managing the power usage of software applications Patrick Gardner 2013-03-12
8387108 Controlling identity disclosures Brian Hernacki 2013-02-26
8381289 Communication-based host reputation system Shane Pereira 2013-02-19
8370926 Systems and methods for authenticating users 2013-02-05
8365283 Detecting mutating malware using fingerprints William E. Sobel 2013-01-29
8353032 Method and system for detecting identity theft or unauthorized access Brian Hernacki, Govinda Salinas 2013-01-08
8352409 Systems and methods for improving the effectiveness of decision trees Nicholas Graf, Lachlan Orr, Shane Pereira, Scott Charles Sullivan 2013-01-08
8353021 Determining firewall rules for an application on a client based on firewall rules and reputations of other clients William E. Sobel 2013-01-08
8353058 Methods and systems for detecting rootkits Bruce McCorkendale, William E. Sobel 2013-01-08
8347380 Protecting users from accidentally disclosing personal information in an insecure environment Shreyans Mehta, Vijay Seshadri 2013-01-01
8341737 Detecting fraudulent web sites through an obfuscated reporting mechanism Zulfikar Ramzan, Oliver Friedrichs, Andrea Del Miglio, Candid Wüest 2012-12-25
8335661 Scoring applications for green computing scenarios 2012-12-18
8332570 Methods and systems for defragmenting virtual machine prefetch data on physical storage Randall R. Cook, Brian Hernacki, William E. Sobel 2012-12-11