Issued Patents All Time
Showing 25 most recent of 64 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11250034 | Classification of software based on user interface elements | Jacob Asher Langton, Kyle Adams | 2022-02-15 |
| 11163879 | Multi-file malware analysis | Jacob Asher Langton, Kyle Adams, Declan Conlon | 2021-11-02 |
| 10996937 | Automated software installation using a click area prediction model | Jacob Asher Langton, Kyle Adams | 2021-05-04 |
| 10834103 | Tracking and mitigation of an infected host device | Karthik Ragunath Balasundaram, Prakash T. Seshadri, Volodymyr Kuznetsov, Rakesh Kumar | 2020-11-10 |
| 10834099 | Identifying a file using metadata and determining a security classification of the file before completing receipt of the file | Yuly N. Becerra Tenorio, WEI-HAN KAO, Volodymyr Kuznetsov, Yuriy Voynalovych | 2020-11-10 |
| 10645114 | Remote remediation of malicious files | Kyle Adams, Jacob Asher Langton | 2020-05-05 |
| 10474817 | Dynamically optimizing performance of a security appliance | Jacob Asher Langton | 2019-11-12 |
| 10467260 | Classification of software based on user interface elements | Jacob Asher Langton, Kyle Adams | 2019-11-05 |
| 10469510 | Intermediate responses for non-html downloads | — | 2019-11-05 |
| 10389740 | Detecting a malicious file infection via sandboxing | Jacob Asher Langton, Kyle Adams, Declan Conlon | 2019-08-20 |
| 10382479 | Malware detection using internal and/or external malware detection operations | Kyle Adams | 2019-08-13 |
| 10380337 | Configuring a sandbox environment for malware testing | Jacob Asher Langton, Kyle Adams, Zhenxin Zhan | 2019-08-13 |
| 10210332 | Identifying an evasive malicious object based on a behavior delta | Kyle Adams | 2019-02-19 |
| 10110496 | Providing policy information on an existing communication channel | Jacob Asher Langton, Kyle Adams, Declan Conlon | 2018-10-23 |
| 10104106 | Determining internet-based object information using public internet search | Jacob Asher Langton, Zhenxin Zhan, Kyle Adams | 2018-10-16 |
| 10089468 | Detecting keylogging | Kyle Adams, Jacob Asher Langton | 2018-10-02 |
| 10091222 | Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs | Jacob Asher Langton, Kyle Adams, Zhenxin Zhan | 2018-10-02 |
| 10079806 | Protecting sensitive web transactions using a communication channel associated with a user | Kyle Adams | 2018-09-18 |
| 10075453 | Detecting suspicious files resident on a network | Kyle Adams, Jacob Asher Langton | 2018-09-11 |
| 10021132 | Limiting the efficacy of a denial of service attack by increasing client resource demands | Kyle Adams | 2018-07-10 |
| 9990496 | Analyzing a password-protected file for malware | Kyle Adams, Jacob Asher Langton | 2018-06-05 |
| 9984233 | Identifying malware based on a relationship between a downloader file and a downloaded file | Kyle Adams, Jacob Asher Langton | 2018-05-29 |
| 9953164 | Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes | Jacob Asher Langton, Kyle Adams | 2018-04-24 |
| 9922193 | Identifying an evasive malicious object based on a behavior delta | Kyle Adams | 2018-03-20 |
| 9848016 | Identifying malicious devices within a computer network | Oskar Ibatullin, Kyle Adams | 2017-12-19 |