IM

Igor Muttik

MC Mcafee: 88 patents #1 of 1,127Top 1%
IN Intel: 7 patents #5,403 of 30,777Top 20%
NT Networks Associates Technology: 5 patents #6 of 189Top 4%
Overall (All Time): #14,393 of 4,157,543Top 1%
100
Patents All Time

Issued Patents All Time

Showing 51–75 of 100 patents

Patent #TitleCo-InventorsDate
9998483 Service assurance and security of computing systems using fingerprinting Vadim Sukhomlinov, Kshitij A. Doshi, Alex Nayshtut 2018-06-12
9948468 Digital heritage notary Alex Nayshtut, Oleg Pogorelik, Avishay Sharaga, Ned M. Smith 2018-04-17
9889559 Robotic system for updating devices 2018-02-13
9881072 Dynamic feature set management Paul H. Whittington 2018-01-30
9864615 User driven emulation of applications 2018-01-09
9864629 Real-time code and data protection via CPU transactional memory suppport Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev 2018-01-09
9842209 Hardened event counters for anomaly detection Eliezer Tamir, Andreas Kleen, Alex Nayshtut, Vadim Sukhomlinov, Eliel Louzoun 2017-12-12
9843622 Adaptive and recursive filtering for sample submission 2017-12-12
9798895 Platform identity architecture with a temporary pseudonymous identity Alex Nayshtur, Ned M. Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel +3 more 2017-10-24
9769133 Protecting user identity and personal information by sharing a secret between personal IoT devices Oleg Pogorelik, Alex Nayshtut, Justin Lipman 2017-09-19
9680849 Rootkit detection by using hardware resources to detect inconsistencies in network traffic Omer Ben-Shalom, Alex Nayshtut 2017-06-13
9621547 Trust establishment between a trusted execution environment and peripheral devices Avishay Sharaga, Alex Nayshtut, Oleg Pogorelik, Ned M. Smith 2017-04-11
9614866 System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature Joel R. Spurlock 2017-04-04
9558348 Ranking software applications by combining reputation and code similarity 2017-01-31
9525675 Encryption key retrieval Vincent J. Zimmer, Rajesh Poornachandran, Jiewen Yao, Mohan Atreya, Gopinatth Selvaraje 2016-12-20
9507938 Real-time code and data protection via CPU transactional memory support Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev 2016-11-29
9462471 Identification of call participants 2016-10-04
9384148 Detection of unauthorized memory modification and access using transactional memory Roman Dementiev, Alex Nayshtut 2016-07-05
9369906 Optimizing communication for mobile and embedded devices 2016-06-14
9306796 System, method, and computer program product for dynamically configuring a virtual environment for identifying unwanted data Mikhail Yu. Vorozhtsov 2016-04-05
9274816 User driven emulation of applications 2016-03-01
9262624 Device-tailored whitelists 2016-02-16
9197654 Rootkit detection by using HW resources to detect inconsistencies in network traffic Omer Ben-Shalom, Alex Nayshtut 2015-11-24
9106688 System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature Joel R. Spurlock 2015-08-11
8914886 Dynamic quarantining for malware detection Michael G. Bishop, Raoul Tiddy, Alexander James Hinchliffe, Christopher C. Williams 2014-12-16