Issued Patents All Time
Showing 25 most recent of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12020506 | Methods and apparatus to detect deepfake content | Utkarsh Verma, Sherin M. Mathews, Amanda House, Celeste R. Fralick, Jonathan B. King | 2024-06-25 |
| 11977630 | Detecting ransomware | Kunal Mehta, Sherin M. Mathews, Celeste R. Fralick, Jonathan B. King | 2024-05-07 |
| 11941119 | Mitigation of ransomware | Craig Schmugar, Cedric Cochin, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin +6 more | 2024-03-26 |
| 11907362 | Trusted execution of an executable object on a local device | Steve Grobman, James D. Beaney, Jr., Jimmy Scott Raynor | 2024-02-20 |
| 11847215 | Model development and application to identify and halt malware | Celeste R. Fralick, Jonathan B. King, ANDREW V. HOLTZMANN, Kunal Mehta, Sherin M. Mathews | 2023-12-19 |
| 11727721 | Methods and apparatus to detect deepfake content | Utkarsh Verma, Sherin M. Mathews, Amanda House, Celeste R. Fralick, Jonathan B. King | 2023-08-15 |
| 11392695 | Detecting ransomware | Kunal Mehta, Sherin M. Mathews, Celeste R. Fralick, Jonathan B. King | 2022-07-19 |
| 11386205 | Detection of malicious polyglot files | German Lancioni | 2022-07-12 |
| 11363058 | Detecting execution of modified executable code | Venkata Ramanan Sambandam, Dmitri Rubakha, Steven Grobman | 2022-06-14 |
| 11347853 | Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection | Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Vadim Sukhomlinov, Igor Muttik, Oleksandr Bazhaniuk +6 more | 2022-05-31 |
| 11233828 | Methods, systems, and media for protecting computer networks using adaptive security workloads | German Lancioni | 2022-01-25 |
| 11184373 | Cryptojacking detection | German Lancioni, Kunal Mehta | 2021-11-23 |
| 11063978 | Protecting personally identifiable information from electronic user devices | Ryan Durand, Kunal Mehta, Lynda M. Grindstaff | 2021-07-13 |
| 11063974 | Application phenotyping | Cedric Cochin, John Teddy, Ofir Arkin, James Douglas Bean, Joel R. Spurlock | 2021-07-13 |
| 11005868 | Methods, systems, and media for detecting anomalous network activity | Sherin M. Mathews, Vaisakh Shaj, Sriranga Seetharamaiah, Kantheti VVSMB Kumar | 2021-05-11 |
| 10956568 | Model development and application to identify and halt malware | Celeste R. Fralick, Jonathan B. King, ANDREW V. HOLTZMANN, Kunal Mehta, Sherin M. Mathews | 2021-03-23 |
| 10909638 | Verified social media content | Kunal Mehta, Steven Grobman, Ryan Durand, Simon Hunt | 2021-02-02 |
| 10902123 | Remediation of flush reload attacks | Kunal Mehta | 2021-01-26 |
| 10860718 | Protecting computer systems used in virtualization environments against fileless malware | Sriranga Seetharamaiah | 2020-12-08 |
| 10831893 | Mitigation of ransomware | Craig Schmugar, Cedric Cochin, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin +6 more | 2020-11-10 |
| 10825111 | Verified social media content | Kunal Mehta, Steven Grobman, Ryan Durand, Simon Hunt | 2020-11-03 |
| 10795994 | Detecting ransomware | Kunal Mehta, Sherin M. Mathews, Celeste R. Fralick, Jonathan B. King | 2020-10-06 |
| 10721248 | Methods, systems and apparatus to mitigate steganography-based malware attacks | German Lancioni, Sherin M. Mathews, Fernando Ruiz | 2020-07-21 |
| 10678908 | Trusted execution of an executable object on a local device | Steve Grobman, James D. Beaney, Jr., Jimmy Scott Raynor | 2020-06-09 |
| 10652218 | Message protection | German Lancioni, Mario Leandro Bertogna | 2020-05-12 |