Issued Patents All Time
Showing 25 most recent of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12411940 | Technologies for untrusted code execution with processor sandbox support | Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang | 2025-09-09 |
| 11847206 | Technologies for untrusted code execution with processor sandbox support | Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang | 2023-12-19 |
| 11700025 | Wireless single-phase AC-to-AC conversion circuit based on 2.4G microwave | Wei Zhou, Zidong Zhang, Xin Fang, Shijun Shen, Dawei Gong +1 more | 2023-07-11 |
| 11650818 | Mode-specific endbranch for control flow termination | Vedvyas Shanbhogue, Jason W. Brandt, Ravi L. Sahita | 2023-05-16 |
| 11568051 | Malicious object detection in a runtime environment | Mingwei Zhang, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang +1 more | 2023-01-31 |
| 11251942 | Secure communication channel between encryption/decryption component and trusted execution environment | Li Shen, Yanhui Zhao | 2022-02-15 |
| 11099847 | Mode-specific endbranch for control flow termination | Vedvyas Shanbhogue, Jason W. Brandt, Ravi L. Sahita | 2021-08-24 |
| 11055401 | Technologies for untrusted code execution with processor sandbox support | Mingwei Zhang, Mingqiu Sun, Ravi L. Sahita, Chunhui Zhang | 2021-07-06 |
| 11038852 | Method and system for preventing data leakage from trusted network to untrusted network | Li Shen, Yanhui Zhao | 2021-06-15 |
| 10802989 | Detecting data corruption by control flow interceptions | Lixin Lu, Ravi L. Sahita | 2020-10-13 |
| 10574672 | System and method to detect bypass of a sandbox application | Haifei Li, Bing Sun, Lu Deng | 2020-02-25 |
| 10552609 | Malicious object detection in a runtime environment | Mingwei Zhang, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang +1 more | 2020-02-04 |
| 10540498 | Technologies for hardware assisted native malware detection | Ravi L. Sahita, David M. Durham | 2020-01-21 |
| 10445494 | Attack protection for valid gadget control transfers | Vedvyas Shanbhogue, Ravi L. Sahita, Yuriy Bulygin, Jason W. Brandt | 2019-10-15 |
| 10325108 | Method and apparatus for range based checkpoints in a storage device | Ravi L. Sahita, Benjamin W. Boyer, Sanjeev N. Trika, Adrian R. Pearson | 2019-06-18 |
| 10311252 | Technologies for protecting dynamically generated managed code with protection domains | Mingqiu Sun, David A. Koufaty, Ravi L. Sahita | 2019-06-04 |
| 10289570 | Detecting data corruption by control flow interceptions | Lixin Lu, Ravi L. Sahita | 2019-05-14 |
| 10272126 | Nanoparticle-stabilized microcapsules, dispersions comprising nanoparticle-stabilized microcapsules, and method for the treatment of bacterial biofilms | Bradley P. Duncan, Vincent M. Rotello | 2019-04-30 |
| 10210331 | Executing full logical paths for malware detection | Ravi L. Sahita, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu +3 more | 2019-02-19 |
| 10025930 | Hardware assisted branch transfer self-check mechanism | Lixin Lu, Ravi L. Sahita | 2018-07-17 |
| 9961102 | Detection of stack pivoting | Lixin Lu, Lu Deng | 2018-05-01 |
| 9898605 | Monitoring executed script for zero-day attack of malware | Ravi L. Sahita, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu +3 more | 2018-02-20 |
| 9893897 | Encrypted data inspection in a network environment | Karanvir S. Grewal, Geoffrey Cooper, John Richard Guzik | 2018-02-13 |
| 9880947 | Return oriented programming stack pivoting protection | Rodrigo Rubira Branco | 2018-01-30 |
| 9858411 | Execution profiling mechanism | Ravi L. Sahita, Barry E. Huntley, Ofer Levy, Vedvyas Shanbhogue, Yuriy Bulygin +3 more | 2018-01-02 |