Issued Patents All Time
Showing 25 most recent of 132 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12413553 | Methods and systems for efficient network protection | Jess P. Parnell, Jonathan R. Rogers | 2025-09-09 |
| 12395481 | Methods and systems for certificate filtering | David K. Ahn | 2025-08-19 |
| 12375447 | Efficient packet capture for cyber threat analysis | David K. Ahn | 2025-07-29 |
| 12335235 | Methods and systems for efficient cybersecurity policy enforcement on network communications | Vincent Mutolo, Alexander Chinchilli, Paul Sprague, Christopher Rodney, Justin Makoto Leach | 2025-06-17 |
| 12278822 | Malicious homoglyphic domain name generation and associated cyber security applications | Vincent Mutolo, Alexander Chinchilli, Matthew Sparrow, Connor Tess | 2025-04-15 |
| 12255871 | Methods and systems for efficient encrypted SNI filtering for cybersecurity applications | Vincent Mutolo, Jonathan R. Rogers | 2025-03-18 |
| 12218959 | Efficient threat context-aware packet filtering for network protection | Jonathan R. Rogers, Vincent Mutolo, Peter P. Geremia | 2025-02-04 |
| 12184666 | Malicious homoglyphic domain name detection and associated cyber security applications | Vincent Mutolo, Alexander Chinchilli, Matthew Sparrow, Connor Tess | 2024-12-31 |
| 12177180 | Methods and systems for efficient cybersecurity policy enforcement on network communications | Vincent Mutolo, Alexander Chinchilli, Paul Sprague, Christopher Rodney, Justin Makoto Leach | 2024-12-24 |
| 12166744 | Methods and systems for efficient encrypted SNI filtering for cybersecurity applications | Vincent Mutolo, Jonathan R. Rogers | 2024-12-10 |
| 12113772 | Cyber protections of remote networks via selective policy enforcement at a central network | Peter P. Geremia | 2024-10-08 |
| 12113771 | Methods and systems for efficient adaptive logging of cyber threat incidents | John Fenton, Peter P. Geremia, Richard Goodwin, Vincent Mutolo, Jess P. Parnell +1 more | 2024-10-08 |
| 12107893 | Methods and systems for protecting a secured network | Steven Rogers, David K. Ahn, Peter P. Geremia | 2024-10-01 |
| 12034710 | Efficient SSL/TLS proxy | — | 2024-07-09 |
| 12028311 | Methods and systems for efficient virtualization of inline transparent computer networking devices | Richard Goodwin, Paul Sprague, Peter P. Geremia | 2024-07-02 |
| 12021835 | Methods and systems for efficient packet filtering | Jonathan R. Rogers, Steven Rogers | 2024-06-25 |
| 12019745 | Cyberanalysis workflow acceleration | Jonathan R. Rogers, Jess P. Parnell, Zachary Ehnerd | 2024-06-25 |
| 12015590 | Methods and systems for efficient cyber protections of mobile devices | Peter P. Geremia | 2024-06-18 |
| 12015626 | Rule-based network-threat detection | David K. Ahn, Keith A. George, Peter P. Geremia, Pierre Mallett, III, Robert T. Perry +1 more | 2024-06-18 |
| 12010135 | Rule-based network-threat detection for encrypted communications | David K. Ahn, Douglas M. Disabello | 2024-06-11 |
| 11997109 | Malicious homoglyphic domain name detection and associated cyber security applications | Vincent Mutolo, Alexander Chinchilli, Matthew Sparrow, Connor Tess | 2024-05-28 |
| 11956338 | Correlating packets in communications networks | David K. Ahn, Peter P. Geremia, Pierre Mallett, III, Robert T. Perry | 2024-04-09 |
| 11902250 | Methods and systems for prevention of attacks associated with the domain name system | Jonathan R. Rogers, Steven Rogers | 2024-02-13 |
| 11902240 | Methods and systems for efficient virtualization of inline transparent computer networking devices | Richard Goodwin, Paul Sprague, Peter P. Geremia | 2024-02-13 |
| 11855966 | Methods and systems for efficient encrypted SNI filtering for cybersecurity applications | Vincent Mutolo, Jonathan R. Rogers | 2023-12-26 |