Issued Patents All Time
Showing 26–50 of 53 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9027132 | System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface | — | 2015-05-05 |
| 8955121 | System, method, and computer program product for dynamically adjusting a level of security applied to a system | — | 2015-02-10 |
| 8935792 | System, method, and computer program product for conditionally performing an action based on an attribute | Joel R. Spurlock | 2015-01-13 |
| 8914887 | System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system | — | 2014-12-16 |
| 8887302 | System, method and computer program product for utilizing code stored in a protected area of memory for securing an associated system | — | 2014-11-11 |
| 8776233 | System, method, and computer program product for removing malware from a system while the system is offline | Joel R. Spurlock | 2014-07-08 |
| 8752171 | Behavioral tracking system, method, and computer program product for undoing events based on user input | Jonathan L. Edwards, Joel R. Spurlock | 2014-06-10 |
| 8739189 | System, method, and computer program product for invoking an application program interface within an interception of another application program interface | — | 2014-05-27 |
| 8739188 | System, method and computer program product for deferring interface monitoring based on whether a library associated with the interface is loaded | Joe C. Lowe | 2014-05-27 |
| 8707434 | System and method for indirect interface monitoring and plumb-lining | — | 2014-04-22 |
| 8646025 | Automated local exception rule generation system, method and computer program product | Hemang Satish Nadkarni | 2014-02-04 |
| 8627305 | System, method, and computer program product for hooking code inserted into an address space of a new process | Jonathan L. Edwards | 2014-01-07 |
| 8621608 | System, method, and computer program product for dynamically adjusting a level of security applied to a system | — | 2013-12-31 |
| 8613084 | System, method, and computer program product for detecting at least potentially unwanted activity based on execution profile monitoring | — | 2013-12-17 |
| 8572729 | System, method and computer program product for interception of user mode code execution and redirection to kernel mode | Joe C. Lowe, Jonathan L. Edwards | 2013-10-29 |
| 8561204 | System, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system | — | 2013-10-15 |
| 8561176 | System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface | — | 2013-10-15 |
| 8533830 | System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system | — | 2013-09-10 |
| 8533778 | System, method and computer program product for detecting unwanted effects utilizing a virtual machine | — | 2013-09-10 |
| 8490186 | System, method, and computer program product for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis | Jonathan L. Edwards | 2013-07-16 |
| 8479286 | Systems and methods for behavioral sandboxing | John Teddy | 2013-07-02 |
| 7987451 | System, method and computer program product for verifying invocations of interfaces | — | 2011-07-26 |
| 7784034 | System, method and computer program product for hooking a COM interface | Oded Horovitz | 2010-08-24 |
| 7779422 | System, method, and computer program product for compatibility among hooking applications | — | 2010-08-17 |
| 7757100 | Protected volume on a data storage device with dual operating systems and configurable access and encryption controls | Gregg Weissman, Hon Tran, Jay H. Hoffmeier, James E. Zmuda, Mark J. Sutherland +1 more | 2010-07-13 |