Issued Patents All Time
Showing 1–25 of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12144562 | Systems and methods for surgical navigation with a tracker instrument | Andre Novomir Hladio, Kevin Morency, Samantha McCabe | 2024-11-19 |
| 11259878 | Systems and methods for surgical navigation with a tracker instrument | Andre Novomir Hladio, Kevin Morency, Samantha McCabe | 2022-03-01 |
| 10635824 | Methods and apparatus for private set membership using aggregation for reduced communications | Nikolaos Triandopoulos, Kevin D. Bowers, James A. Kelley, Ronald L. Rivest | 2020-04-28 |
| 10122742 | Classifying software modules based on comparisons using a neighborhood distance metric | Zhou Li, Ahmet Buyukkayhan | 2018-11-06 |
| 10063562 | Flexible access management framework based on measuring application usage behavior | Andres D. Molina-Markham, Kevin D. Bowers | 2018-08-28 |
| 9998484 | Classifying potentially malicious and benign software modules through similarity analysis | Ahmet Buyukkayhan, Zhou Li, Martin Rosa | 2018-06-12 |
| 9838407 | Detection of malicious web activity in enterprise computer networks | Zhou Li, Robin Norris, Kevin D. Bowers | 2017-12-05 |
| 9674210 | Determining risk of malware infection in enterprise hosts | Ting-Fang Yen, Viktor Heorhiadi, Michael Kendrick Reiter, Ari Juels | 2017-06-06 |
| 9635049 | Detection of suspicious domains through graph inference algorithm processing of host-domain contacts | Zhou Li, Sang H. Chin, Ting-Fang Yen | 2017-04-25 |
| 9621576 | Detecting malicious websites | Sumayah Alrwais, Kevin D. Bowers, Todd Leetham, Zhou Li, Ronald L. Rivest | 2017-04-11 |
| 9516039 | Behavioral detection of suspicious host activities in an enterprise | Ting-Fang Yen, Kaan Onarlioglu, Todd Leetham, William Gordon Robertson, Ari Juels +1 more | 2016-12-06 |
| 9503468 | Detecting suspicious web traffic from an enterprise network | Ting-Fang Yen, Kaan Onarlioglu | 2016-11-22 |
| 9471777 | Scheduling of defensive security actions in information processing systems | Ari Juels, Marten Van Dijk, Ronald L. Rivest | 2016-10-18 |
| 9430501 | Time sanitization of network logs from a geographically distributed computer system | Ting-Fang Yen, Ari Juels, Kaan Onarlioglu | 2016-08-30 |
| 9378361 | Anomaly sensor framework for detecting advanced persistent threat attacks | Ting-Fang Yen, Ari Juels, Aditya Kuppa, Kaan Onarlioglu | 2016-06-28 |
| 9338187 | Modeling user working time using authentication events within an enterprise network | Ting-Fang Yen | 2016-05-10 |
| 9323765 | Scalable cloud file system with efficient integrity checks | Emil P. Stefanov, Marten Van Dijk, Ari Juels | 2016-04-26 |
| 9256725 | Credential recovery with the assistance of trusted entities | Kevin D. Bowers, Nikolaos Triandopoulos, Ting-Fang Yen, Ari Juels | 2016-02-09 |
| 9231962 | Identifying suspicious user logins in enterprise networks | Ting-Fang Yen | 2016-01-05 |
| 9230114 | Remote verification of file protections for cloud data storage | Ari Juels, Marten Van Dijk, Emil P. Stefanov | 2016-01-05 |
| 9049221 | Detecting suspicious web traffic from an enterprise network | Ting-Fang Yen, Kaan Onarlioglu | 2015-06-02 |
| 9009385 | Co-residency detection in a cloud-based system | Ari Juels, Michael Kendrick Reiter, Yinqian Zhang | 2015-04-14 |
| 8984363 | Proof of retrievability for archived files | Ari Juels, Burton S. Kaliski, Jr., Kevin D. Bowers | 2015-03-17 |
| 8984384 | Distributed storage system with efficient handling of file updates | Ari Juels, Kevin D. Bowers | 2015-03-17 |
| 8978159 | Methods and apparatus for mediating access to derivatives of sensitive data | Marten Van Dijk, Samuel J. Curry, Robert D. Hopley, John G. Linn, Kenneth D. Ray | 2015-03-10 |