SS

Sourabh Satish

Broadcom: 183 patents #13 of 9,346Top 1%
CI Cisco: 81 patents #66 of 13,007Top 1%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
VT Veritas Technologies: 1 patents #252 of 551Top 50%
📍 Fremont, CA: #6 of 9,298 inventorsTop 1%
🗺 California: #288 of 386,348 inventorsTop 1%
Overall (All Time): #1,651 of 4,157,543Top 1%
271
Patents All Time

Issued Patents All Time

Showing 201–225 of 271 patents

Patent #TitleCo-InventorsDate
8321940 Systems and methods for detecting data-stealing malware Shane Pereira 2012-11-27
8307453 Zone breakout detection 2012-11-06
8266698 Using machine infection characteristics for behavior-based detection of malware Vijay Seshardi, Zulfikar Ramzan, Chandrasekhar Kalle 2012-09-11
8266177 Empirical database access adjustment Harlan Seymour, Anne Yeh, Benjamin Yeung 2012-09-11
8256013 Method and apparatus for dynamic creation of persona Brian Hernacki 2012-08-28
8255902 Systems and methods for determining and quantifying the impact of an application on the health of a system 2012-08-28
8255517 Method and apparatus to determine device mobility history Brian Hernacki 2012-08-28
8250085 Method to improve data loss prevention via cross leveraging fingerprints 2012-08-21
8239953 Applying differing security policies for users who contribute differently to machine hygiene William E. Sobel 2012-08-07
8239915 Endpoint management using trust rating data Brian Hernacki 2012-08-07
8239827 System and method for prioritizing the compilation of bytecode modules during installation of a software application William E. Sobel 2012-08-07
8225401 Methods and systems for detecting man-in-the-browser attacks William E. Sobel 2012-07-17
8225104 Data access security 2012-07-17
8219983 Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing system William E. Sobel 2012-07-10
8214900 Method and apparatus for monitoring a computer to detect operating system process manipulation William E. Sobel, Bruce McCorkendale 2012-07-03
8214878 Policy control of virtual environments Brian Hernacki, William E. Sobel 2012-07-03
8205257 Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process Shane Pereira, Uri Mann 2012-06-19
8205239 Methods and systems for adaptively setting network security policies 2012-06-19
8190755 Method and apparatus for host authentication in a network implementing network access control Brian Hernacki, Shane Pereira 2012-05-29
8190732 Method and apparatus for providing information associated with service providers using a social network Shaun Cooley, Keith Newstadt, Laura Garcia-Manrique, Brian Hernacki, Timothy G. Brown 2012-05-29
8190647 Decision tree induction that is sensitive to attribute computational complexity Shane Pereira, Zulfikar Ramzan 2012-05-29
8181028 Method for secure system shutdown Brian Hernacki 2012-05-15
8176562 Privacy protection during remote administration Brian Hernacki, Timothy G. Brown 2012-05-08
8171256 Systems and methods for preventing subversion of address space layout randomization (ASLR) William E. Sobel, Bruce McCorkendale 2012-05-01
8156228 Method and apparatus to enable confidential browser referrals Brian Hernacki 2012-04-10