Issued Patents All Time
Showing 76–100 of 181 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8468608 | Enforcing digital rights management in a heterogeneous environment | Brian Hernacki, Sourabh Satish | 2013-06-18 |
| 8433895 | Methods and systems for securely managing multimedia data captured by mobile computing devices | Brian Hernacki | 2013-04-30 |
| 8434073 | Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment | Sourabh Satish, Bruce McCorkendale | 2013-04-30 |
| 8429180 | Cooperative identification of malicious remote objects | Bruce McCorkendale | 2013-04-23 |
| 8429734 | Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes | Paul Agbabian, Bruce McCorkendale | 2013-04-23 |
| 8424007 | Prioritizing tasks from virtual machines | Brian Hernacki, Sourabh Satish | 2013-04-16 |
| 8413146 | Hypervisor assisted single instance data access by multiple virtual machines | Bruce McCorkendale, David Buches | 2013-04-02 |
| 8407471 | Selecting a network service for communicating with a server | — | 2013-03-26 |
| 8402528 | Portable firewall adapter | Bruce McCorkendale | 2013-03-19 |
| 8402458 | Methods and systems for converting non-layered-software-application installations into layered installations | Bruce McCorkendale | 2013-03-19 |
| 8365283 | Detecting mutating malware using fingerprints | Sourabh Satish | 2013-01-29 |
| 8359649 | Use of geo-location data for spam detection | Bruce McCorkendale | 2013-01-22 |
| 8353058 | Methods and systems for detecting rootkits | Bruce McCorkendale, Sourabh Satish | 2013-01-08 |
| 8353021 | Determining firewall rules for an application on a client based on firewall rules and reputations of other clients | Sourabh Satish | 2013-01-08 |
| 8341734 | Method and system to audit physical copy data leakage | Brian Hernacki | 2012-12-25 |
| 8332947 | Security threat reporting in light of local security tools | Mark F. Bregman | 2012-12-11 |
| 8332570 | Methods and systems for defragmenting virtual machine prefetch data on physical storage | Randall R. Cook, Brian Hernacki, Sourabh Satish | 2012-12-11 |
| 8321934 | Anti-phishing early warning system based on end user data submission statistics | Shaun Cooley | 2012-11-27 |
| 8312547 | Anti-malware scanning in a portable application virtualized environment | Bruce McCorkendale | 2012-11-13 |
| 8281388 | Hardware secured portable storage | Brian Hernacki | 2012-10-02 |
| 8281363 | Methods and systems for enforcing network access control in a virtual environment | Brian Hernacki, Bruce McCorkendale | 2012-10-02 |
| 8281410 | Methods and systems for providing resource-access information | Brian Hernacki | 2012-10-02 |
| 8239827 | System and method for prioritizing the compilation of bytecode modules during installation of a software application | Sourabh Satish | 2012-08-07 |
| 8239953 | Applying differing security policies for users who contribute differently to machine hygiene | Sourabh Satish | 2012-08-07 |
| 8225401 | Methods and systems for detecting man-in-the-browser attacks | Sourabh Satish | 2012-07-17 |