Issued Patents All Time
Showing 25 most recent of 72 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11487873 | Risk score generation utilizing monitored behavior and predicted impact of compromise | Sashka T. Davis, Kevin J. Arunski, Ed G. Quackenbush, Scott E. Moore, Kevin T. Douglas +1 more | 2022-11-01 |
| 11269595 | Encoding and evaluating multisets using prime numbers | Sashka T. Davis, Nicholas H. Hoang | 2022-03-08 |
| 11171949 | Generating authentication information utilizing linear feedback shift registers | Piers Bowness | 2021-11-09 |
| 11171995 | Identifying and mitigating risks of cryptographic obsolescence | Eric Young | 2021-11-09 |
| 11139982 | Communication-efficient device delegation | Salah Machani | 2021-10-05 |
| 11128638 | Location assurance using location indicators modified by shared secrets | Brian Mullins | 2021-09-21 |
| 11025658 | Generating summaries of messages associated with assets in an enterprise system | Sashka T. Davis, Kevin J. Arunski, Scott E. Moore, Abram Thielke, Ed G. Quackenbush +1 more | 2021-06-01 |
| 10999311 | Risk score generation for assets of an enterprise system utilizing user authentication activity | Sashka T. Davis, Zohar Duchin, Gregory A. Gerber, JR., Mark Gergely, Steve G. Schlarman | 2021-05-04 |
| 10938847 | Automated determination of relative asset importance in an enterprise system | Sashka T. Davis, Kevin T. Douglas | 2021-03-02 |
| 10860626 | Addressable array indexing data structure for efficient query operations | Kevin J. Arunski, Sashka T. Davis | 2020-12-08 |
| 10437997 | Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning | Oliver Friedrichs, Alfred Huger | 2019-10-08 |
| 9747445 | Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning | Oliver Friedrichs, Alfred Huger | 2017-08-29 |
| 9639697 | Method and apparatus for retroactively detecting malicious or otherwise undesirable software | Oliver Friedrichs, Alfred Huger, Adam J. O'Donnell | 2017-05-02 |
| 9465921 | Systems and methods for selectively authenticating queries based on an authentication policy | Walter Bogorad | 2016-10-11 |
| 9245120 | Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning | Oliver Friedrichs, Alfred Huger | 2016-01-26 |
| 9081958 | Using confidence about user intent in a reputation system | Walter Bogorad, Ameet Zaveri, Vadim Antonov, Carey Nachenberg | 2015-07-14 |
| 9071598 | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | Craig B. Gentry, Philip Mackenzie | 2015-06-30 |
| 9038186 | Malware detection using file names | Pratyusa K. Manadhata, Mark Kennedy | 2015-05-19 |
| 8997190 | Using metadata in security tokens to prevent coordinated gaming in a reputation system | Carey Nachenberg | 2015-03-31 |
| 8978137 | Method and apparatus for retroactively detecting malicious or otherwise undesirable software | Oliver Friedrichs, Alfred Huger, Adam J. O'Donnell | 2015-03-10 |
| 8977764 | Profiling application usage from application streaming | Sourabh Satish, Brian Hernacki | 2015-03-10 |
| 8869269 | Method and apparatus for identifying domain name abuse | Shaun Cooley | 2014-10-21 |
| 8856937 | Methods and systems for identifying fraudulent websites | Candid Wüest | 2014-10-07 |
| 8850570 | Filter-based identification of malicious websites | — | 2014-09-30 |
| 8824677 | Provably secure and efficient pseudorandom number generation | Sanjay Sawhney, Virendra Kumar | 2014-09-02 |