Issued Patents All Time
Showing 25 most recent of 30 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12126644 | Methods and apparatus to identify and report cloud-based security vulnerabilities | Sriranga Seetharamaiah | 2024-10-22 |
| 12054250 | Apparatus and methods for unmanned aerial vehicle servicing of modular device assembly | Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Igor Muttik | 2024-08-06 |
| 11941119 | Mitigation of ransomware | Craig Schmugar, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin, John J. Loucaides +6 more | 2024-03-26 |
| 11847217 | Methods and apparatus to provide and monitor efficacy of artificial intelligence models | Sorcha Bairbre Healy, Gerard Donal Murphy, David McCormack | 2023-12-19 |
| 11829304 | Pairing of external device with random user action | Jonathan L. Edwards, Aditya Kapoor | 2023-11-28 |
| 11381597 | Expedition of web phishing detection for suspicious sites | German Lancioni | 2022-07-05 |
| 11368479 | Methods and apparatus to identify and report cloud-based security vulnerabilities | Sriranga Seetharamaiah | 2022-06-21 |
| 11288144 | Query optimized distributed ledger system | Ned M. Smith, Vincent J. Zimmer, Rajesh Poornachandran, Igor Muttik | 2022-03-29 |
| 11244047 | Intelligent backup and versioning | Igor Muttik, Simon Hunt, Craig Schmugar, Robert Leong, Christiaan Beek +1 more | 2022-02-08 |
| 11204998 | Detection and mitigation of fileless security threats | German Lancioni, Kunal Mehta | 2021-12-21 |
| 11171895 | Protection of sensitive chat data | Robert L. Vaughn, David M. Durham, Jonathan B. King | 2021-11-09 |
| 11063974 | Application phenotyping | John Teddy, Ofir Arkin, James Douglas Bean, Joel R. Spurlock, Carl D. Woodward | 2021-07-13 |
| 11032266 | Determining the reputation of a digital certificate | James Douglas Bean, Joel R. Spurlock, Aditya Kapoor, Ramnath Venugopalan | 2021-06-08 |
| 10831893 | Mitigation of ransomware | Craig Schmugar, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin, John J. Loucaides +6 more | 2020-11-10 |
| 10834027 | Protection of sensitive chat data | Robert L. Vaughn, David M. Durham, Jonathan B. King | 2020-11-10 |
| 10726129 | Persistence probing to detect malware | Craig Schmugar, John Teddy | 2020-07-28 |
| 10604251 | Apparatus and methods for unmanned aerial vehicle servicing of modular device assembly | Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Igor Muttik | 2020-03-31 |
| 10476899 | Application phenotyping | John Teddy, Ofir Arkin, James Douglas Bean, Joel R. Spurlock, Carl D. Woodward | 2019-11-12 |
| 10423782 | Intelligent backup and versioning | Igor Muttik, Simon Hunt, Craig Schmugar, Robert Leong, Christiaan Beek +1 more | 2019-09-24 |
| 10339014 | Query optimized distributed ledger system | Ned M. Smith, Vincent J. Zimmer, Rajesh Poornachandran, Igor Muttik | 2019-07-02 |
| 10318743 | Method for ransomware impact assessment and remediation assisted by data compression | Bidan Sinha, Arun Chundiriyil Pullat, Arpit Pradhan, German Lancioni, Priyadarshini Rao Rajan +1 more | 2019-06-11 |
| 10303876 | Persistence probing to detect malware | Craig Schmugar, John Teddy | 2019-05-28 |
| 10044700 | Identity attestation of a minor via a parent | Timothy J. Gresham, Tobias M. Kohlenberg, Ravi L. Sahita, Tracy E. Camp, Harvir Singh +2 more | 2018-08-07 |
| 9852086 | Pairing of external device with random user action | Jonathan L. Edwards, Aditya Kapoor | 2017-12-26 |
| 9769186 | Determining a reputation through network characteristics | John Teddy, Ramnath Venugopalan, Joel R. Spurlock | 2017-09-19 |