Issued Patents All Time
Showing 26–50 of 59 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8966624 | System and method for securing an input/output path of an application against malware with a below-operating system security agent | — | 2015-02-24 |
| 8959638 | System and method for below-operating system trapping and securing of interdriver communication | — | 2015-02-17 |
| 8955131 | Method and system for proactive detection of malicious shared libraries via a remote reputation system | — | 2015-02-10 |
| 8925089 | System and method for below-operating system modification of malicious code on an electronic device | — | 2014-12-30 |
| 8863159 | System, method and computer program product for inserting an emulation layer in association with a COM server DLL | — | 2014-10-14 |
| 8863283 | System and method for securing access to system calls | — | 2014-10-14 |
| 8819826 | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation | — | 2014-08-26 |
| 8813227 | System and method for below-operating system regulation and control of self-modifying code | — | 2014-08-19 |
| 8650642 | System and method for below-operating system protection of an operating system kernel | — | 2014-02-11 |
| 8621620 | System and method for protecting and securing storage devices using below-operating system trapping | — | 2013-12-31 |
| 8613006 | System, method, and computer program product for terminating a hidden kernel process | — | 2013-12-17 |
| 8549644 | Systems and method for regulating software access to security-sensitive processor resources | — | 2013-10-01 |
| 8549648 | Systems and methods for identifying hidden processes | — | 2013-10-01 |
| 8527978 | System, method, and computer program product for populating a list of known wanted data | — | 2013-09-03 |
| 8474039 | System and method for proactive detection and repair of malware memory infection via a remote memory reputation system | — | 2013-06-25 |
| 8458794 | System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity | — | 2013-06-04 |
| 8365276 | System, method and computer program product for sending unwanted activity information to a central system | — | 2013-01-29 |
| 8307434 | Method and system for discrete stateful behavioral analysis | — | 2012-11-06 |
| 8291494 | System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object | Joel R. Spurlock | 2012-10-16 |
| 8285958 | System, method, and computer program product for copying a modified page table entry to a translation look aside buffer | — | 2012-10-09 |
| 8281393 | Method and system for detecting windows rootkit that modifies the kernel mode system service dispatch table | — | 2012-10-02 |
| 8108937 | Robustly regulating access to executable class registry entries | — | 2012-01-31 |
| 8099740 | System, method, and computer program product for terminating a hidden kernel process | — | 2012-01-17 |
| 7966490 | Using mobility tokens to observe malicious mobile code | — | 2011-06-21 |
| 7840501 | Behavioral analysis apparatus and associated method that utilizes a system selected based on a level of data | — | 2010-11-23 |