Issued Patents All Time
Showing 25 most recent of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12314449 | Systems and methods for managing privacy policy violations | Daniel Kats, Johann Roturier, David Luz Silva | 2025-05-27 |
| 12174960 | Systems and methods for identifying and remediating security threats against graph neural network models | — | 2024-12-24 |
| 11975221 | Anti-microbial multilayer fabric media and method for making same | Danmeng Shuai, Braydon McCormick | 2024-05-07 |
| 11941156 | Systems and methods for managing privacy policy violations | Daniel Kats, Johann Roturier, David Luz Silva | 2024-03-26 |
| 11928232 | Protecting sensitive data from being exposed in graph embedding vectors | Yufei Han | 2024-03-12 |
| 11811792 | Systems and methods for preventing social engineering attacks using distributed fact checking | David Luz Silva, Johann Roturier, Pratyush Banerjee | 2023-11-07 |
| 11683692 | Protecting against potentially harmful app installation on a mobile device | Pierre-Antoine Vervier | 2023-06-20 |
| 11232457 | Systems and methods for protecting users | Qing Li, Brian Varner, Stanley Kiefer, Daniel Kats, David Luz Silva | 2022-01-25 |
| 11184370 | Identifying and protecting against evolving cyberattacks using temporal word embeddings | — | 2021-11-23 |
| 11122040 | Systems and methods for fingerprinting devices | Yuqiong Sun, Xueqiang Wang, Susanta K. Nanda, Pierre-Antoine Vervier, Petros Efstathopoulos | 2021-09-14 |
| D930495 | Label for device security | Pierre-Antoine Vervier, Petros Efstathopoulos | 2021-09-14 |
| 11108787 | Securing a network device by forecasting an attack event using a recurrent neural network | Pierre-Antoine Vervier | 2021-08-31 |
| 11023580 | Systems and methods for cross-product malware categorization | Yufei Han | 2021-06-01 |
| 11025666 | Systems and methods for preventing decentralized malware attacks | Yufei Han, Yuzhe Ma, Kevin Roundy, Chris Gates | 2021-06-01 |
| 10977374 | Method to assess internal security posture of a computing system using external variables | Aditya Kuppa, Pierre-Antoine Vervier, Slawomir Grzonkowski | 2021-04-13 |
| 10572663 | Systems and methods for identifying malicious file droppers | Azzedine Benameur, Nathan Evans | 2020-02-25 |
| 10547623 | Security network devices by forecasting future security incidents for a network based on past security incidents | Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Petros Efstathopoulos | 2020-01-28 |
| 10440047 | Systems and methods for mapping internet protocol addresses for an organization | Pierre-Antoine Vervier | 2019-10-08 |
| 10437994 | Systems and methods for determining the reputations of unknown files | Yufei Han, Pierre-Antoine Vervier | 2019-10-08 |
| 10313386 | Systems and methods for assessing security risks of users of computer networks of organizations | Johann Roturier, David Luz Silva | 2019-06-04 |
| 10277621 | Systems and methods for detecting vulnerabilities on servers | Pierre-Antoine Vervier | 2019-04-30 |
| 10278074 | Systems and methods for categorizing mobile devices as rooted | Azzedine Benameur, Nathan Evans | 2019-04-30 |
| 10243963 | Systems and methods for generating device-specific security policies for applications | Azzedine Benameur, Nathan Evans | 2019-03-26 |
| 10225284 | Techniques of obfuscation for enterprise data center services | Nathan Evans, Azzedine Benameur | 2019-03-05 |
| 10185838 | Methods to impede common file/process hiding techniques | Nathan Evans, Azzedine Benameur | 2019-01-22 |