Issued Patents All Time
Showing 1–19 of 19 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12353543 | Systems and methods for utilizing multiple analysis techniques to distinguish stalkerware from privacy-invasive application types | Kevin Roundy | 2025-07-08 |
| 11816209 | Systems and methods for protecting data on devices | Yufei Han, Kevin Roundy, Daniel Kats | 2023-11-14 |
| 11812272 | Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices | Kevin Roundy, Yufei Han, Anil Sharma, Arif Mohammed Shaikh | 2023-11-07 |
| 11556653 | Systems and methods for detecting inter-personal attack applications | Yufei Han, Kevin Roundy | 2023-01-17 |
| 11469904 | Systems and methods for authenticating digital media content | Daniel Kats, Christopher Gates, Daniel Marino | 2022-10-11 |
| 11295015 | Identifying and protecting against surveillance apps installed on client devices | Kevin Roundy | 2022-04-05 |
| 11172258 | Protecting against an impersonation scam in a live video stream | Kevin Roundy, Daniel Kats, Platon Kotzias | 2021-11-09 |
| 11128473 | Systems and methods for assuring authenticity of electronic sensor data | Daniel Kats, Christopher Gates, Daniel Marino | 2021-09-21 |
| 11010680 | Memory efficiency of production rule systems | Daniel Marino, Kevin Roundy, Sandeep Bhatkar | 2021-05-18 |
| 10795999 | Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP) | Mehmet Emre Gursoy | 2020-10-06 |
| 10789363 | Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP) | Mehmet Emre Gursoy | 2020-09-29 |
| 10530805 | Systems and methods for detecting security incidents | Kevin Roundy, Michael Hart, Daniel Kats, Michael Spertus | 2020-01-07 |
| 10452841 | Modeling malicious behavior that occurs in the absence of users | Sandeep Bhatkar, Daniel Marino, Kevin Roundy | 2019-10-22 |
| 10455085 | Systems and methods for real-time scam protection on phones | Kevin Roundy, Mahmood Sharif | 2019-10-22 |
| 10142357 | Systems and methods for preventing malicious network connections using correlation-based anomaly detection | Kevin Roundy | 2018-11-27 |
| 9323924 | Systems and methods for establishing reputations of files | Kevin Roundy, Sourabh Satish | 2016-04-26 |
| 9185119 | Systems and methods for detecting malware using file clustering | Kevin Roundy, Daniel Marino | 2015-11-10 |
| 9148441 | Systems and methods for adjusting suspiciousness scores in event-correlation graphs | Kevin Roundy, Sandeep Bhatkar, Elias Khalil | 2015-09-29 |
| 9141790 | Systems and methods for using event-correlation graphs to detect attacks on computing systems | Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu +4 more | 2015-09-22 |