Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11610024 | Systems and methods for protecting search privacy | Kevin Roundy, Ashwin Kayyoor | 2023-03-21 |
| 11550691 | Computing resources schedule recommendation | Ayyappa Muthusami, Jiani Chen, Amanjit Singh Johal, Devarajan Sundararajan | 2023-01-10 |
| 11283881 | Management and protection of internet of things devices | Yuqiong Sun | 2022-03-22 |
| 11184162 | Privacy preserving secure task automation | Sandeep Bhatkar, Yuqiong Sun, Saurabh Shintre | 2021-11-23 |
| 11132447 | Determining security vulnerabilities of Internet of Things devices | Yuqiong Sun, Xueqiang Wang, Petros Efstathopoulos | 2021-09-28 |
| 11122040 | Systems and methods for fingerprinting devices | Yuqiong Sun, Xueqiang Wang, Yun Shen, Pierre-Antoine Vervier, Petros Efstathopoulos | 2021-09-14 |
| 11048809 | Systems and methods for detecting misuse of online service access tokens | Yuqiong Sun, Sandeep Bhatkar, Mingliang Pei | 2021-06-29 |
| 10958666 | Systems and methods for verifying connection integrity | Brian Witten, Qing Li, Ronald Frederick, Roelof Nico du Toit, Saurabh Shintre +1 more | 2021-03-23 |
| 10887351 | Security for IoT home voice assistants | Yuqiong Sun, Saurabh Shintre | 2021-01-05 |
| 10601864 | Using disposable profiles for privacy in internet sessions | — | 2020-03-24 |
| 10447663 | Decrypting network traffic on a middlebox device using a trusted execution environment | Yuqiong Sun, Daniel Marino, Saurabh Shintre, Brian Witten, Ronald Frederick +1 more | 2019-10-15 |
| 10264020 | Systems and methods for scalable network monitoring in virtual data centers | Yuqiong Sun | 2019-04-16 |
| 10044691 | Decrypting network traffic on a middlebox device using a trusted execution environment | Yuqiong Sun, Daniel Marino, Saurabh Shintre, Brian Witten, Ronald Frederick +1 more | 2018-08-07 |
| 9961105 | Systems and methods for monitoring virtual networks | Yuqiong Sun | 2018-05-01 |
| 9800560 | Systems and methods for monitoring encrypted data transmission | Fanglu Guo | 2017-10-24 |
| 9692768 | Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection | Ashwin Kayyoor, Petros Efstathopoulos | 2017-06-27 |
| 9686304 | Systems and methods for healing infected document files | Fanglu Guo, Sandeep Bhatkar | 2017-06-20 |
| 9317679 | Systems and methods for detecting malicious documents based on component-object reuse | Sandeep Bhatkar, Fanglu Guo | 2016-04-19 |
| 9230111 | Systems and methods for protecting document files from macro threats | Sandeep Bhatkar, Fanglu Guo | 2016-01-05 |
| 9135447 | Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area | Kent E. Griffin | 2015-09-15 |
| 9065725 | Techniques for virtual environment-based web client management | Tzi-Cker Chiueh | 2015-06-23 |
| 9009459 | Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications | Carey Nachenberg, Fanglu Guo, Sandeep Bhatkar, Darren Shou, Marc Dacier | 2015-04-14 |
| 8555083 | Systems and methods for protecting against unauthorized access of encrypted data during power-management modes | Kent E. Griffin | 2013-10-08 |
| 8555385 | Techniques for behavior based malware analysis | Sandeep Bhatkar, Jeffrey Wilhelm | 2013-10-08 |
| 8429745 | Systems and methods for data loss prevention on mobile computing systems | Jim Casaburi, Kent E. Griffin, Sanjay Sawhney, Matthew Conover | 2013-04-23 |