| 12099610 |
Dynamic application deployment in trusted code environments |
Ondrej Stastny, David Field, Tomas Vetrovsky, Ahmad Bilal |
2024-09-24 |
| 11714659 |
Device provisioning with manufacturer boot environment |
Ondrej Stastny |
2023-08-01 |
| 11669337 |
Bare metal device management |
Ahmad Bilal, Tomas Vetrovsky |
2023-06-06 |
| 11269655 |
Bare metal device management |
Ahmad Bilal, Tomas Vetrovsky |
2022-03-08 |
| 11263021 |
Management platform recovery for a user device |
Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more |
2022-03-01 |
| 11182141 |
Management platform recovery for a user device |
Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more |
2021-11-23 |
| 11132188 |
Management platform recovery for a user device |
Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more |
2021-09-28 |
| 11126419 |
Management platform recovery for a user device |
Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more |
2021-09-21 |
| 11126441 |
Management platform recovery for a user device |
Nitin Rao, Nikhil Ravishankar, Xueliang Hua, Shravan Shantharam, Ondrej Stastny +1 more |
2021-09-21 |
| 11093260 |
Device provisioning with manufacturer boot environment |
Ondrej Stastny |
2021-08-17 |
| 11036862 |
Dynamic application deployment in trusted code environments |
Ondrej Stastny, David Field, Tomas Vetrovsky, Ahmad Bilal |
2021-06-15 |
| 10838736 |
Bare metal device management |
Ahmad Bilal, Tomas Vetrovsky |
2020-11-17 |
| 8863284 |
System and method for determining a security status of potentially malicious files |
Konstantin V. Sapronov |
2014-10-14 |
| 8739287 |
Determining a security status of potentially malicious files |
Konstantin V. Sapronov |
2014-05-27 |
| 8719935 |
Mitigating false positives in malware detection |
Ravi Bikkula |
2014-05-06 |
| 8667583 |
Collecting and analyzing malware data |
Marc E. Seinfeld, Jigar J. Mody, Ning Sun, Tony Lee, Chengyun Chu |
2014-03-04 |
| 8201253 |
Performing security functions when a process is created |
Lee Guang Yan |
2012-06-12 |
| 8042186 |
System and method for detection of complex malware |
Vladislav V. Martynenko, Yuri G. Slobodyanuk, Denis A. Nazarov, Mikhail A. Pavlyushchik |
2011-10-18 |
| 7809670 |
Classification of malware using clustering that orders events in accordance with the time of occurance |
Tony Lee, Jigar J. Mody, Ying Lin, Adrian Marinescu |
2010-10-05 |
| 7647636 |
Generic RootKit detector |
Neil A. Cowie |
2010-01-12 |
| 7636946 |
Unwanted file modification and transactions |
Surendra Verma, Dana Groff, Jonathan M. Cargille, Andrew Herron, Christian Gregory Allred +1 more |
2009-12-22 |
| 7571482 |
Automated rootkit detector |
Gretchen L. Loihle, Mihai Costea, Robert John Hensing, Scott A. Field, Vincent R. Orgovan +2 more |
2009-08-04 |