DJ

David Jevans

IM Imation: 9 patents #24 of 622Top 4%
PR Proofpoint: 9 patents #13 of 163Top 8%
CT Cipher Trace: 6 patents #1 of 5Top 20%
Apple: 3 patents #7,422 of 18,612Top 40%
AX Axway: 3 patents #6 of 22Top 30%
TC Tumbleweed Communications: 1 patents #8 of 15Top 55%
Overall (All Time): #101,312 of 4,157,543Top 3%
34
Patents All Time

Issued Patents All Time

Showing 25 most recent of 34 patents

Patent #TitleCo-InventorsDate
12388864 Cryptocurrency based malware and ransomware detection systems and methods Rudi Cilibrasi 2025-08-12
12026789 Systems and methods of forensic analysis of cryptocurrency transactions Shannon Holland 2024-07-02
11888892 Cryptocurrency based malware and ransomware detection systems and methods Rudi Cilibrasi 2024-01-30
11836718 Systems and methods for crypto currency automated transaction flow detection Shannon Holland, Stephen Eric Ryan 2023-12-05
11546373 Cryptocurrency based malware and ransomware detection systems and methods Rudi Cilibrasi 2023-01-03
11540133 Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy 2022-12-27
11336678 Methods and systems for security analysis of applications on mobile devices brought into an enterprise network environment Suresh Kumar Basandra 2022-05-17
11251937 Distributed security mechanism for blockchains and distributed ledgers 2022-02-15
11032711 Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy 2021-06-08
10623435 Application security analysis Suresh Kumar Basandra 2020-04-14
10505933 Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy 2019-12-10
10270769 Privately performing application security analysis 2019-04-23
10218680 Mechanism for efficient private bulk messaging 2019-02-26
10097576 Systems and methods for application security analysis Suresh Kumar Basandra 2018-10-09
9967278 Systems and methods for application security analysis Suresh Kumar Basandra 2018-05-08
9838391 Systems and methods for privately performing application security analysis 2017-12-05
8924719 Mechanism for efficient private bulk messaging 2014-12-30
8745365 Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system Gil Spencer, Eric R. Smith 2014-06-03
8683088 Peripheral device data integrity Gil Spencer 2014-03-25
8639873 Detachable storage device with RAM cache Gil Spencer 2014-01-28
8543764 Storage device with accessible partitions Gil Spencer 2013-09-24
8505075 Enterprise device recovery Gil Spencer 2013-08-06
8438647 Recovery of encrypted data from a secure storage device 2013-05-07
8381294 Storage device with website trust indication Steve Ryan, Gil Spencer, Shannon Holland 2013-02-19
8356105 Enterprise device policy management Gil Spencer 2013-01-15