Issued Patents All Time
Showing 25 most recent of 36 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12229317 | Systems and methods for protecting user data privacy against web tracking on Wi-Fi captive portals | Iskander Sanchez Rola | 2025-02-18 |
| 11469904 | Systems and methods for authenticating digital media content | Daniel Kats, Acar Tamersoy, Daniel Marino | 2022-10-11 |
| 11361100 | Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates | Yufei Han | 2022-06-14 |
| 11227050 | Systems and methods for verifying decentralized federated data using influence evaluation | Yufei Han | 2022-01-18 |
| 11163875 | Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data | Kevin Roundy, Mahmood Sharif, Matteo Dell'Amico, Daniel Kats, Dong Chung | 2021-11-02 |
| 11128473 | Systems and methods for assuring authenticity of electronic sensor data | Daniel Kats, Acar Tamersoy, Daniel Marino | 2021-09-21 |
| 10984323 | Estimating asset sensitivity using information associated with users | Suresh N. Chari, Stephen C. Gates, Youngja Park, Wilfried Teiken | 2021-04-20 |
| 10984322 | Estimating asset sensitivity using information associated with users | Suresh N. Chari, Stephen C. Gates, Youngja Park, Wilfried Teiken | 2021-04-20 |
| 10877946 | Efficient incident response through tree-based visualizations of hierarchical clustering | David Luz Silva, Matteo Dell'Amico, Kevin Roundy, Michael Hart | 2020-12-29 |
| 10678917 | Systems and methods for evaluating unfamiliar executables | Brian Witten | 2020-06-09 |
| 10579794 | Securing a network device by automatically identifying files belonging to an application | Kyle Soska, Kevin Roundy | 2020-03-03 |
| 10534933 | Encrypting and decrypting sensitive files on a network device | Kevin Roundy, Yuqiong Sun, Michael Hart, Saurabh Shintre, Brian Witten | 2020-01-14 |
| 10313379 | Systems and methods for making security-related predictions | Yufei Han, Kevin Roundy, Michael Hart | 2019-06-04 |
| 10284564 | Systems and methods for dynamically validating remote requests within enterprise networks | Kevin Roundy, Petrus Johannes Viljoen | 2019-05-07 |
| 10262137 | Security recommendations based on incidents of malware | Michael Hart, Kevin Roundy, Shang-Tse Chen | 2019-04-16 |
| 10200369 | Systems and methods for dynamically validating remote requests within enterprise networks | Kevin Roundy, Petrus Johannes Viljoen | 2019-02-05 |
| 10200395 | Systems and methods for automated whitelisting of files | Kevin Roundy | 2019-02-05 |
| 10169584 | Systems and methods for identifying non-malicious files on computing devices within organizations | Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu, Anand Kashyap +1 more | 2019-01-01 |
| 10089469 | Systems and methods for whitelisting file clusters in connection with trusted software packages | Kevin Roundy | 2018-10-02 |
| 10073983 | Systems and methods for identifying suspicious singleton files using correlational predictors | Bo Li, Kevin Roundy | 2018-09-11 |
| 10055586 | Systems and methods for determining the trustworthiness of files within organizations | Kevin Roundy, Sandeep Bhatkar, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2018-08-21 |
| 10057274 | Systems and methods for profiling client systems | Kevin Roundy, Leylya Bilge | 2018-08-21 |
| 10025937 | Practical and dynamic approach to enterprise hardening | Anand Kashyap, Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu +1 more | 2018-07-17 |
| 10003606 | Systems and methods for detecting security threats | Kevin Roundy, Michael Hart | 2018-06-19 |
| 9998480 | Systems and methods for predicting security threats | Yining Wang, Nikolaos Vasiloglou, Kevin Roundy, Michael Hart | 2018-06-12 |