Issued Patents All Time
Showing 51–75 of 100 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9998483 | Service assurance and security of computing systems using fingerprinting | Vadim Sukhomlinov, Kshitij A. Doshi, Alex Nayshtut | 2018-06-12 |
| 9948468 | Digital heritage notary | Alex Nayshtut, Oleg Pogorelik, Avishay Sharaga, Ned M. Smith | 2018-04-17 |
| 9889559 | Robotic system for updating devices | — | 2018-02-13 |
| 9881072 | Dynamic feature set management | Paul H. Whittington | 2018-01-30 |
| 9864615 | User driven emulation of applications | — | 2018-01-09 |
| 9864629 | Real-time code and data protection via CPU transactional memory suppport | Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev | 2018-01-09 |
| 9842209 | Hardened event counters for anomaly detection | Eliezer Tamir, Andreas Kleen, Alex Nayshtut, Vadim Sukhomlinov, Eliel Louzoun | 2017-12-12 |
| 9843622 | Adaptive and recursive filtering for sample submission | — | 2017-12-12 |
| 9798895 | Platform identity architecture with a temporary pseudonymous identity | Alex Nayshtur, Ned M. Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel +3 more | 2017-10-24 |
| 9769133 | Protecting user identity and personal information by sharing a secret between personal IoT devices | Oleg Pogorelik, Alex Nayshtut, Justin Lipman | 2017-09-19 |
| 9680849 | Rootkit detection by using hardware resources to detect inconsistencies in network traffic | Omer Ben-Shalom, Alex Nayshtut | 2017-06-13 |
| 9621547 | Trust establishment between a trusted execution environment and peripheral devices | Avishay Sharaga, Alex Nayshtut, Oleg Pogorelik, Ned M. Smith | 2017-04-11 |
| 9614866 | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature | Joel R. Spurlock | 2017-04-04 |
| 9558348 | Ranking software applications by combining reputation and code similarity | — | 2017-01-31 |
| 9525675 | Encryption key retrieval | Vincent J. Zimmer, Rajesh Poornachandran, Jiewen Yao, Mohan Atreya, Gopinatth Selvaraje | 2016-12-20 |
| 9507938 | Real-time code and data protection via CPU transactional memory support | Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev | 2016-11-29 |
| 9462471 | Identification of call participants | — | 2016-10-04 |
| 9384148 | Detection of unauthorized memory modification and access using transactional memory | Roman Dementiev, Alex Nayshtut | 2016-07-05 |
| 9369906 | Optimizing communication for mobile and embedded devices | — | 2016-06-14 |
| 9306796 | System, method, and computer program product for dynamically configuring a virtual environment for identifying unwanted data | Mikhail Yu. Vorozhtsov | 2016-04-05 |
| 9274816 | User driven emulation of applications | — | 2016-03-01 |
| 9262624 | Device-tailored whitelists | — | 2016-02-16 |
| 9197654 | Rootkit detection by using HW resources to detect inconsistencies in network traffic | Omer Ben-Shalom, Alex Nayshtut | 2015-11-24 |
| 9106688 | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature | Joel R. Spurlock | 2015-08-11 |
| 8914886 | Dynamic quarantining for malware detection | Michael G. Bishop, Raoul Tiddy, Alexander James Hinchliffe, Christopher C. Williams | 2014-12-16 |