Issued Patents All Time
Showing 25 most recent of 153 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12423441 | Method for using generative large language models (LLM) for cybersecurity deception and honeypots | Hugo Latapie, Blake Harrell Anderson | 2025-09-23 |
| 12375505 | Endpoint-assisted inspection of encrypted network traffic | Martin Rehak, Blake Harrell Anderson, Scott William Dunlop | 2025-07-29 |
| 12348386 | Automatically detecting authorized remote administration sessions in a network monitoring system | Martin Rehak, Blake Harrell Anderson, Sunil Amin | 2025-07-01 |
| 12335279 | Blocking and alerting with domain fronting intelligence | Blake Harrell Anderson | 2025-06-17 |
| 12301593 | Associating a user identifier detected from web traffic with a client address | Blake Harrell Anderson, Ivan Nikolaev | 2025-05-13 |
| 12254123 | Using a trust anchor to verify an identity of an ASIC | Chirag Shroff | 2025-03-18 |
| 12244640 | Automatic retraining of machine learning models to detect DDoS attacks | K. Tirumaleswar Reddy, Daniel G. Wing, Blake Harrell Anderson | 2025-03-04 |
| 12238014 | Identifying unmanaged cloud resources with endpoint and network logs | Blake Harrell Anderson, Andrew Chi, Saran Singh Ahluwalia | 2025-02-25 |
| 12184694 | Multi-protocol / multi-session process identification | Blake Harrell Anderson, Keith R. Schomburg, Michael Scott Dorsey, Constantinos Kleopa | 2024-12-31 |
| 12126653 | Detecting targeted data exfiltration in encrypted traffic | Blake Harrell Anderson, Chris Allen Shenefiel, Robert M. Waitman | 2024-10-22 |
| 12088607 | Endpoint-assisted inspection of encrypted network traffic | Martin Rehak, Blake Harrell Anderson, Scott William Dunlop | 2024-09-10 |
| 12072981 | Using a trust anchor to control functionality of an ASIC | Chirag Shroff | 2024-08-27 |
| 11979430 | Network telemetry collection with packet metadata filtering | Blake Harrell Anderson | 2024-05-07 |
| 11936690 | Automatically generating a fingerprint prevalence database without ground truth | Blake Harrell Anderson | 2024-03-19 |
| 11936683 | Analyzing encrypted traffic behavior using contextual traffic data | Jan Kohout, Blake Harrell Anderson, Martin Grill, Martin Kopp, Tomas Pevny | 2024-03-19 |
| 11936533 | Automatically detecting authorized remote administration sessions in a network monitoring system | Martin Rehak, Blake Harrell Anderson, Sunil Amin | 2024-03-19 |
| 11916932 | Endpoint-assisted inspection of encrypted network traffic | Martin Rehak, Blake Harrell Anderson, Scott William Dunlop | 2024-02-27 |
| 11916887 | Detecting domain fronting through correlated connections | Blake Harrell Anderson | 2024-02-27 |
| 11909741 | Validating a device class claim using machine learning | Brian Weis, Blake Harrell Anderson, Rashmikant B. Shah | 2024-02-20 |
| 11909760 | Malware classification and attribution through server fingerprinting using server certificate data | Blake Harrell Anderson, Subharthi Paul, Ivan Nikolaev, Martin Grill | 2024-02-20 |
| 11888900 | Cryptographic security audit using network service zone locking | Matthew Scott Robertson, Timothy D. Keanini, Sunil Amin, Ellie Marie Daw | 2024-01-30 |
| 11888760 | Identifying unmanaged cloud resources with endpoint and network logs | Blake Harrell Anderson, Andrew Chi, Saran Singh Ahluwalia | 2024-01-30 |
| 11843632 | Automatic retraining of machine learning models to detect DDoS attacks | K. Tirumaleswar Reddy, Daniel G. Wing, Blake Harrell Anderson | 2023-12-12 |
| 11816219 | Binding a trust anchor and an ASIC | Chirag Shroff | 2023-11-14 |
| 11800260 | Network telemetry with byte distribution and cryptographic protocol data elements | Blake Harrell Anderson, Alison Kendler | 2023-10-24 |