Issued Patents All Time
Showing 25 most recent of 39 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12255905 | Machine learning malware classifications using behavioral artifacts | Vitaly Zaytsev, Brett Meyer | 2025-03-18 |
| 11989293 | Systems, methods, and media for identifying and responding to malicious files having similar features | Leonardo Frittelli | 2024-05-21 |
| 11941119 | Mitigation of ransomware | Craig Schmugar, Cedric Cochin, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin +6 more | 2024-03-26 |
| 11870793 | Determining a reputation for a process | — | 2024-01-09 |
| 11399033 | Malicious advertisement protection | Nikhil B. Meshram, Prashanth Palasamudram Ramagopal, Daniel L. Burke | 2022-07-26 |
| 11379583 | Malware detection using a digital certificate | Ramnath Venugopalan | 2022-07-05 |
| 11238154 | Multi-lateral process trees for malware remediation | Jonathan L. Edwards, Saurabh Gautam, Dhananjay Kumar | 2022-02-01 |
| 11063974 | Application phenotyping | Cedric Cochin, John Teddy, Ofir Arkin, James Douglas Bean, Carl D. Woodward | 2021-07-13 |
| 11049039 | Static and dynamic device profile reputation using cloud-based machine learning | Vincent J. Zimmer, Ramnath Venugopalan, Ned M. Smith, Igor Muttik, Rajesh Poornachandran | 2021-06-29 |
| 11032266 | Determining the reputation of a digital certificate | James Douglas Bean, Cedric Cochin, Aditya Kapoor, Ramnath Venugopalan | 2021-06-08 |
| 10831893 | Mitigation of ransomware | Craig Schmugar, Cedric Cochin, Andrew A. Furtak, Adam James Carrivick, Yury Bulygin +6 more | 2020-11-10 |
| 10834109 | Determining a reputation for a process | — | 2020-11-10 |
| 10642976 | Malware detection using a digital certificate | Ramnath Venugopalan | 2020-05-05 |
| 10579544 | Virtualized trusted storage | Zheng Zhang, Aditya Kapoor, Jonathan L. Edwards, Khai N. Pham | 2020-03-03 |
| 10476899 | Application phenotyping | Cedric Cochin, John Teddy, Ofir Arkin, James Douglas Bean, Carl D. Woodward | 2019-11-12 |
| 10162767 | Virtualized trusted storage | Zheng Zhang, Aditya Kapoor, Jonathan L. Edwards, Khai N. Pham | 2018-12-25 |
| 10129291 | Anomaly detection to identify malware | James Douglas Bean | 2018-11-13 |
| 10083295 | System and method to combine multiple reputations | John Teddy | 2018-09-25 |
| 10083296 | Detection of malicious thread suspension | Aditya Kapoor, Jonathan L. Edwards | 2018-09-25 |
| 10050980 | Enterprise reputations for uniform resource locators | James Douglas Bean, Ramnath Venugopalan | 2018-08-14 |
| 9906537 | System, method, and computer program product for conditionally performing an action based on an attribute | Gregory William Dalcher | 2018-02-27 |
| 9769186 | Determining a reputation through network characteristics | John Teddy, Ramnath Venugopalan, Cedric Cochin | 2017-09-19 |
| 9614866 | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature | Igor Muttik | 2017-04-04 |
| 9311478 | Behavioral tracking system, method, and computer program product for undoing events based on user input | Jonathan L. Edwards, Gregory William Dalcher | 2016-04-12 |
| 9106688 | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature | Igor Muttik | 2015-08-11 |