Issued Patents All Time
Showing 26–50 of 64 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9838427 | Dynamic service handling using a honeypot | Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron | 2017-12-05 |
| 9769197 | Malware detection using external malware detection operations | Kyle Adams | 2017-09-19 |
| 9769198 | Malware detection using internal and/or external malware detection operations | Kyle Adams | 2017-09-19 |
| 9740853 | Configuring a sandbox environment for malware testing | Jacob Asher Langton, Kyle Adams, Zhenxin Zhan | 2017-08-22 |
| 9740862 | Identifying malware based on a relationship between a downloader file and a downloaded file | Kyle Adams, Jacob Asher Langton | 2017-08-22 |
| 9729572 | Remote remediation of malicious files | Kyle Adams, Jacob Asher Langton | 2017-08-08 |
| 9721096 | Dynamically optimizing performance of a security appliance | Jacob Asher Langton | 2017-08-01 |
| 9699212 | Limiting the efficacy of a denial of service attack by increasing client resource demands | Kyle Adams | 2017-07-04 |
| 9679141 | Detecting keylogging | Kyle Adams, Jacob Asher Langton | 2017-06-13 |
| 9680845 | Detecting a malicious file infection via sandboxing | Jacob Asher Langton, Kyle Adams, Declan Conlon | 2017-06-13 |
| 9654496 | Obtaining suspect objects based on detecting suspicious activity | Jacob Asher Langton, Kyle Adams, Zhenxin Zhan | 2017-05-16 |
| 9646159 | Multi-file malware analysis | Jacob Asher Langton, Kyle Adams, Declan Conlon | 2017-05-09 |
| 9594908 | Identifying an evasive malicious object based on a behavior delta | Kyle Adams | 2017-03-14 |
| 9594902 | Analyzing a password-protected file for malware | Kyle Adams, Jacob Asher Langton | 2017-03-14 |
| 9594906 | Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes | Jacob Asher Langton, Kyle Adams | 2017-03-14 |
| 9569520 | Classification of software based on user interface elements | Jacob Asher Langton, Kyle Adams | 2017-02-14 |
| 9497163 | Identifying malicious devices within a computer network | Oskar Ibatullin, Kyle Adams | 2016-11-15 |
| 9485276 | Dynamic service handling using a honeypot | Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron | 2016-11-01 |
| 9477457 | Automated software installation using a click area prediction model | Jacob Asher Langton, Kyle Adams | 2016-10-25 |
| 9477837 | Configuring a sandbox environment for malware testing | Jacob Asher Langton, Kyle Adams, Zhenxin Zhan | 2016-10-25 |
| 9411959 | Identifying an evasive malicious object based on a behavior delta | Kyle Adams | 2016-08-09 |
| 9413782 | Malware detection using internal malware detection operations | Kyle Adams | 2016-08-09 |
| 9392018 | Limiting the efficacy of a denial of service attack by increasing client resource demands | Kyle Adams | 2016-07-12 |
| 9386104 | Preventing extraction of secret information over a compromised encrypted connection | Kyle Adams | 2016-07-05 |
| 9367685 | Dynamically optimizing performance of a security appliance | Jacob Asher Langton | 2016-06-14 |