Issued Patents All Time
Showing 26–50 of 72 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8806046 | Application streaming and network file system optimization via integration with identity management solutions | Sourabh Satish, Brian Hernacki | 2014-08-12 |
| 8800030 | Individualized time-to-live for reputation scores of computer files | Vijay Seshadri, James Hoagland, Adam Glick, Adam Wright | 2014-08-05 |
| 8799494 | Application streaming proactive failover | Sourabh Satish, Brian Hernacki | 2014-08-05 |
| 8707426 | Method and apparatus for resolving a cousin domain name to detect web-based fraud | Shaun Cooley | 2014-04-22 |
| 8621233 | Malware detection using file names | Pratyusa K. Manadhata, Mark Kennedy | 2013-12-31 |
| 8621654 | Using metadata in security tokens to prevent coordinated gaming in a reputation system | Carey Nachenberg | 2013-12-31 |
| 8572007 | Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold | Pratyusa K. Manadhata, Kent E. Griffin | 2013-10-29 |
| 8495096 | Decision tree induction that is sensitive to attribute computational complexity | Shane Pereira, Sourabh Satish | 2013-07-23 |
| 8479284 | Referrer context identification for remote object links | Shaun Cooley | 2013-07-02 |
| 8434149 | Method and apparatus for identifying web attacks | Sourabh Satish | 2013-04-30 |
| 8412952 | Systems and methods for authenticating requests from a client running trialware through a proof of work protocol | Walter Bogorad, Vijay Seshadri, Vadim Antonov, Pieter Viljoen | 2013-04-02 |
| 8401982 | Using sequencing and timing information of behavior events in machine learning to detect malware | Sourabh Satish | 2013-03-19 |
| 8341737 | Detecting fraudulent web sites through an obfuscated reporting mechanism | Oliver Friedrichs, Andrea Del Miglio, Candid Wüest, Sourabh Satish | 2012-12-25 |
| 8321664 | Method and apparatus for efficient certificate revocation | Craig B. Gentry | 2012-11-27 |
| 8312272 | Secure authentication token management | Denis Serenyi | 2012-11-13 |
| 8266698 | Using machine infection characteristics for behavior-based detection of malware | Vijay Seshardi, Sourabh Satish, Chandrasekhar Kalle | 2012-09-11 |
| 8256015 | Method and apparatus for authentication of data streams with adaptively controlled losses | Craig B. Gentry, Alejandro Hevia, Ravi Jain, Toshiro Kawahara | 2012-08-28 |
| 8209531 | Revocation of cryptographic digital certificates | Craig B. Gentry, Bernhard Bruhn | 2012-06-26 |
| 8190647 | Decision tree induction that is sensitive to attribute computational complexity | Shane Pereira, Sourabh Satish | 2012-05-29 |
| 8156327 | Revocation of cryptographic digital certificates | Craig B. Gentry, Bernhard Bruhn | 2012-04-10 |
| 8132006 | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | Craig B. Gentry, Philip Mackenzie | 2012-03-06 |
| 8103875 | Detecting email fraud through fingerprinting | Sourabh Satish, Oliver Friedrichs | 2012-01-24 |
| 8095679 | Predictive transmission of content for application streaming and network file systems | Sourabh Satish, Brian Hernacki | 2012-01-10 |
| 8065332 | Method and apparatus for communication efficient private information retrieval and oblivious transfer | Craig B. Gentry | 2011-11-22 |
| 8024562 | Revocation of cryptographic digital certificates | Craig B. Gentry, Bernhard Bruhn | 2011-09-20 |