Issued Patents All Time
Showing 25 most recent of 37 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12304090 | Systems and methods for anomaly detection and correction | Jayavardhana Rama Gubbi Lakshminarasimha, Vartika Sengar, Vighnesh Vatsal, Balamuralidhar Purushothaman, Arpan Pal +1 more | 2025-05-20 |
| 11829304 | Pairing of external device with random user action | Cedric Cochin, Jonathan L. Edwards | 2023-11-28 |
| 11556648 | Machine learning model for malware dynamic analysis | Xuan Zhao, Matthew Wolff, Andrew Davis, Derek A. Soeder, Ryan Permeh | 2023-01-17 |
| 11210394 | Anomaly based malware detection | Michael Wojnowicz, Matthew Wolff | 2021-12-28 |
| 11032266 | Determining the reputation of a digital certificate | James Douglas Bean, Joel R. Spurlock, Cedric Cochin, Ramnath Venugopalan | 2021-06-08 |
| 10726040 | Lossless conversion of database tables between formats | Manish Sinha, Vipul Khullar | 2020-07-28 |
| 10691476 | Protection of sensitive data | Jonathan L. Edwards | 2020-06-23 |
| 10685112 | Machine learning model for malware dynamic analysis | Xuan Zhao, Matthew Wolff, Andrew Davis, Derek A. Soeder, Ryan Permeh | 2020-06-16 |
| 10579544 | Virtualized trusted storage | Joel R. Spurlock, Zheng Zhang, Jonathan L. Edwards, Khai N. Pham | 2020-03-03 |
| 10489589 | Anomaly based malware detection | Michael Wojnowicz, Matthew Wolff | 2019-11-26 |
| 10176344 | Data verification using enclave attestation | Ned M. Smith, Esteban Gutierrez, Andrew Woodruff | 2019-01-08 |
| 10162767 | Virtualized trusted storage | Joel R. Spurlock, Zheng Zhang, Jonathan L. Edwards, Khai N. Pham | 2018-12-25 |
| 10127118 | Method and system for sharepoint server 2013 backup and restore | Anupam Chakraborty, Tushar Dethe, Sunil Yadav, Pradeep Anappa, Amarendra Behera | 2018-11-13 |
| 10083296 | Detection of malicious thread suspension | Joel R. Spurlock, Jonathan L. Edwards | 2018-09-25 |
| 9852086 | Pairing of external device with random user action | Cedric Cochin, Jonathan L. Edwards | 2017-12-26 |
| 9715597 | Data verification using enclave attestation | Ned M. Smith, Esteban Gutierrez, Andrew Woodruff | 2017-07-25 |
| 9712545 | Detection of a malicious peripheral | Jonathan L. Edwards, Cedric Cochin | 2017-07-18 |
| 9679140 | Outbreak pathology inference | Ned M. Smith, Esteban Gutierrez, Andrew Woodruff | 2017-06-13 |
| 9565214 | Real-time module protection | Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael S. Hughes | 2017-02-07 |
| 9384349 | Negative light-weight rules | Guy Roberts | 2016-07-05 |
| 9317687 | Identifying rootkits based on access permissions | Jonathan L. Edwards, Michael S. Hughes | 2016-04-19 |
| 9311330 | Method and system for performing full backup in a failover cluster | Elango Chockalingam, Krishnendu Bagchi, Nikhil Ambastha, Anupam Chakraborty | 2016-04-12 |
| 9275223 | Real-time module protection | Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael S. Hughes | 2016-03-01 |
| 9268659 | Detecting failover in a database mirroring environment | Wenlu Ma, Craig Duncan | 2016-02-23 |
| 9201739 | Method and system for a database management system add-in for third party backup and restore applications | Krishnendu Bagchi, Elango Chockalingam, Vedavathi Ht, Upanshu Singhal | 2015-12-01 |