Issued Patents All Time
Showing 51–75 of 181 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8713687 | Methods and systems for enabling community-tested security features for legacy applications | Sourabh Satish | 2014-04-29 |
| 8706745 | Systems and methods for determining a file set | Shaun Cooley, Bruce McCorkendale | 2014-04-22 |
| 8700896 | Techniques for automatic management of file system encryption drivers | — | 2014-04-15 |
| 8694983 | Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing system | Sourabh Satish | 2014-04-08 |
| 8667592 | Systems and methods for looking up anti-malware metadata | Sourabh Satish | 2014-03-04 |
| 8667489 | Systems and methods for sharing the results of analyses among virtual machines | Bruce McCorkendale | 2014-03-04 |
| 8656490 | Safe and secure access to dynamic domain name systems | — | 2014-02-18 |
| 8645923 | Enforcing expected control flow in program execution | Sourabh Satish, Bruce McCorkendale | 2014-02-04 |
| 8621591 | Software signing certificate reputation model | Bruce McCorkendale | 2013-12-31 |
| 8610600 | Techniques for providing missed arrival notifications | — | 2013-12-17 |
| 8584234 | Secure network cache content | Sourabh Satish | 2013-11-12 |
| 8578056 | Optimized application streaming for just in time compiled components | Sourabh Satish | 2013-11-05 |
| 8578006 | Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests | Bruce McCorkendale | 2013-11-05 |
| 8572730 | Systems and methods for revoking digital signatures | Sourabh Satish | 2013-10-29 |
| 8566899 | Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure | Bruce McCorkendale, Matthew R. Barnes | 2013-10-22 |
| 8561181 | Detecting man-in-the-middle attacks via security transitions | Brian Hernacki | 2013-10-15 |
| 8561142 | Clustered device access control based on physical and temporal proximity to the user | — | 2013-10-15 |
| 8549401 | Systems and methods for automatically generating computer-assistance videos | Brian Hernacki | 2013-10-01 |
| 8504680 | Automatically adjusting polling intervals based on remote administrative activity | Brian Hernacki | 2013-08-06 |
| 8505100 | User account level anti-malware exclusions | James E. Brennan | 2013-08-06 |
| 8499063 | Uninstall and system performance based software application reputation | Sourabh Satish | 2013-07-30 |
| 8499354 | Preventing malware from abusing application data | Sourabh Satish | 2013-07-30 |
| 8477747 | Automatic capture of wireless endpoints for connection enforcement | Brian Hernacki | 2013-07-02 |
| 8473924 | Enabling efficient use of an endpoint | Sourabh Satish | 2013-06-25 |
| 8473461 | File infection removal by differential copy | Brendon Woirhaye | 2013-06-25 |