| 11334686 |
Comprehensive system wide cross-reference mechanism using runtime data collection |
Mark J. Anderson, Scott Forstie |
2022-05-17 |
| 10990664 |
Eliminating and reporting kernel instruction alteration |
Michael Brinker, Daniel M. Hursh |
2021-04-27 |
| 10650156 |
Environmental security controls to prevent unauthorized access to files, programs, and objects |
Mark J. Anderson, Scott Forstie |
2020-05-12 |
| 10540523 |
Comprehensive system wide cross-reference mechanism using runtime data collection |
Mark J. Anderson, Scott Forstie |
2020-01-21 |
| 10346625 |
Automated mechanism to analyze elevated authority usage and capability |
Mark J. Anderson, Carol S. Budnik, Anna P. Dietenberger, Scott Forstie, Brian J. Hasselbeck +2 more |
2019-07-09 |
| 9928365 |
Automated mechanism to obtain detailed forensic analysis of file access |
Mark J. Anderson, Carol S. Budnik, Anna P. Dietenberger, Scott Forstie, Brian J. Hasselbeck +2 more |
2018-03-27 |
| 9830469 |
Automated mechanism to secure customer data |
Mark J. Anderson, Carol S. Budnik, Anna P. Dietenberger, Scott Forstie, Brian J. Hasselbeck +2 more |
2017-11-28 |
| 8490184 |
Verification for computer programs that include external call references |
Michael Brinker, Rick Dale Hemmer, Daniel M. Hursh |
2013-07-16 |
| 8225105 |
Method and apparatus for verifying integrity of computer system vital data components |
Michael Brinker, Rick Dale Hemmer, Daniel M. Hursh |
2012-07-17 |