OI

Osman Abdoul Ismael

FI Fireeye: 50 patents #2 of 189Top 2%
Oracle: 6 patents #2,063 of 14,854Top 15%
MU Musarubra Us: 3 patents #7 of 104Top 7%
FU Fireeye Security Holdings Us: 2 patents #7 of 49Top 15%
📍 Palo Alto, CA: #242 of 9,675 inventorsTop 3%
🗺 California: #5,306 of 386,348 inventorsTop 2%
Overall (All Time): #35,655 of 4,157,543Top 1%
63
Patents All Time

Issued Patents All Time

Showing 1–25 of 63 patents

Patent #TitleCo-InventorsDate
12166786 Malware detection verification and enhancement by coordinating endpoint and malware detection systems Ashar Aziz 2024-12-10
12099864 Formally verified trusted computing base with active security and policy enforcement Ashar Aziz, Jonas Pfoh 2024-09-24
11979428 Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints Ashar Aziz 2024-05-07
11936666 Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk Ashar Aziz 2024-03-19
11442770 Formally verified trusted computing base with active security and policy enforcement Ashar Aziz, Jonas Pfoh 2022-09-13
11244056 Verification of trusted threat-aware visualization layer Hendrik Tews 2022-02-08
11240262 Malware detection verification and enhancement by coordinating endpoint and malware detection systems Ashar Aziz 2022-02-01
11153341 System and method for detecting malicious network content using virtual environment components Samuel Yie, Jayaraman Manni, Muhammad Amin, Bahman Mahbod 2021-10-19
11089057 System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Ashar Aziz, Muhammad Amin, Zheng Bu 2021-08-10
11075945 System, apparatus and method for reconfiguring virtual machines 2021-07-27
10929266 Real-time visual playback with synchronous textual analysis log display and event/time indexing Harnish Goradia, Noah Johnson, Adrian Mettler, Ashar Aziz 2021-02-23
10893059 Verification and enhancement using detection systems located at the network periphery and endpoint devices Ashar Aziz 2021-01-12
10826933 Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints Ashar Aziz 2020-11-03
10740456 Threat-aware architecture Ashar Aziz 2020-08-11
10623434 System and method for virtual analysis of network data Ashar Aziz, Ramesh Radhakrishnan 2020-04-14
10592678 Secure communications between peers using a verified virtual trusted platform module Hendrik Tews 2020-03-17
10528726 Microvisor-based malware detection appliance architecture 2020-01-07
10474813 Code injection technique for remediation at an endpoint of a network 2019-11-12
10476909 System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Ashar Aziz, Muhammad Amin, Zheng Bu 2019-11-12
10469512 Optimized resource allocation for virtual machines within a malware content detection system 2019-11-05
10462173 Malware detection verification and enhancement by coordinating endpoint and malware detection systems Ashar Aziz 2019-10-29
10296437 Framework for efficient security coverage of mobile software applications Dawn Song, Ashar Aziz, Noah Johnson, Prashanth Mohan, Hui Xue 2019-05-21
10198574 System and method for analysis of a memory dump associated with a potentially malicious content suspect Emmanuel Thioux, Muhammad Amin 2019-02-05
10191861 Technique for implementing memory views using a layered virtualization architecture Udo Steinberg 2019-01-29
10181029 Security cloud service framework for hardening in the field code of mobile software applications Dawn Song, Ashar Aziz, Noah Johnson, Adrian Mettler 2019-01-15