DQ

Daniel J. Quinlan

JN Juniper Networks: 54 patents #11 of 2,602Top 1%
IS Ironport Systems: 9 patents #1 of 36Top 3%
Overall (All Time): #34,760 of 4,157,543Top 1%
64
Patents All Time

Issued Patents All Time

Showing 25 most recent of 64 patents

Patent #TitleCo-InventorsDate
11250034 Classification of software based on user interface elements Jacob Asher Langton, Kyle Adams 2022-02-15
11163879 Multi-file malware analysis Jacob Asher Langton, Kyle Adams, Declan Conlon 2021-11-02
10996937 Automated software installation using a click area prediction model Jacob Asher Langton, Kyle Adams 2021-05-04
10834103 Tracking and mitigation of an infected host device Karthik Ragunath Balasundaram, Prakash T. Seshadri, Volodymyr Kuznetsov, Rakesh Kumar 2020-11-10
10834099 Identifying a file using metadata and determining a security classification of the file before completing receipt of the file Yuly N. Becerra Tenorio, WEI-HAN KAO, Volodymyr Kuznetsov, Yuriy Voynalovych 2020-11-10
10645114 Remote remediation of malicious files Kyle Adams, Jacob Asher Langton 2020-05-05
10474817 Dynamically optimizing performance of a security appliance Jacob Asher Langton 2019-11-12
10467260 Classification of software based on user interface elements Jacob Asher Langton, Kyle Adams 2019-11-05
10469510 Intermediate responses for non-html downloads 2019-11-05
10389740 Detecting a malicious file infection via sandboxing Jacob Asher Langton, Kyle Adams, Declan Conlon 2019-08-20
10382479 Malware detection using internal and/or external malware detection operations Kyle Adams 2019-08-13
10380337 Configuring a sandbox environment for malware testing Jacob Asher Langton, Kyle Adams, Zhenxin Zhan 2019-08-13
10210332 Identifying an evasive malicious object based on a behavior delta Kyle Adams 2019-02-19
10110496 Providing policy information on an existing communication channel Jacob Asher Langton, Kyle Adams, Declan Conlon 2018-10-23
10104106 Determining internet-based object information using public internet search Jacob Asher Langton, Zhenxin Zhan, Kyle Adams 2018-10-16
10089468 Detecting keylogging Kyle Adams, Jacob Asher Langton 2018-10-02
10091222 Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs Jacob Asher Langton, Kyle Adams, Zhenxin Zhan 2018-10-02
10079806 Protecting sensitive web transactions using a communication channel associated with a user Kyle Adams 2018-09-18
10075453 Detecting suspicious files resident on a network Kyle Adams, Jacob Asher Langton 2018-09-11
10021132 Limiting the efficacy of a denial of service attack by increasing client resource demands Kyle Adams 2018-07-10
9990496 Analyzing a password-protected file for malware Kyle Adams, Jacob Asher Langton 2018-06-05
9984233 Identifying malware based on a relationship between a downloader file and a downloaded file Kyle Adams, Jacob Asher Langton 2018-05-29
9953164 Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes Jacob Asher Langton, Kyle Adams 2018-04-24
9922193 Identifying an evasive malicious object based on a behavior delta Kyle Adams 2018-03-20
9848016 Identifying malicious devices within a computer network Oskar Ibatullin, Kyle Adams 2017-12-19