| 11405367 |
Secure computer peripheral devices |
Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen |
2022-08-02 |
| 11176276 |
Systems and methods for managing endpoint security states using passive data integrity attestations |
Joseph Chen, QuBo Song, Spencer Smith, Shaun Aimoto, Haik Mesropian +3 more |
2021-11-16 |
| 10546117 |
Systems and methods for managing security programs |
Chengi Jimmy Kuo, Haik Mesropian |
2020-01-28 |
| 10284530 |
Secure computer peripheral devices |
Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen |
2019-05-07 |
| 10140454 |
Systems and methods for restarting computing devices into security-application-configured safe modes |
Robert Spath, Wilson Meng, Sonia Subramanian |
2018-11-27 |
| 9607152 |
Detect encrypted program based on CPU statistics |
— |
2017-03-28 |
| 9465937 |
Methods and systems for securely managing file-attribute information for files in a file system |
Mark Spiegel, David Buches, Patrick Gardner |
2016-10-11 |
| 9411953 |
Tracking injected threads to remediate malware |
Wilson Meng |
2016-08-09 |
| 9311829 |
Point of sale manufacture of products with a general decal and personalized label including security code |
— |
2016-04-12 |
| 9064130 |
Data loss prevention in the event of malware detection |
Daniel Asheghian |
2015-06-23 |
| 8769685 |
Systems and methods for using file paths to identify potentially malicious computer files |
Robert Conrad |
2014-07-01 |
| 8725702 |
Systems and methods for repairing system files |
Nivedhitha Raman, Sonia Subramanian, Wilson Meng |
2014-05-13 |
| 8595829 |
Systems and methods for automatically blacklisting an internet domain based on the activities of an application |
— |
2013-11-26 |
| 7917952 |
Replace malicious driver at boot time |
Adam Glick, Yung-Shuo Lin |
2011-03-29 |
| 7594272 |
Detecting malicious software through file group behavior |
Mark Kennedy |
2009-09-22 |