Issued Patents All Time
Showing 25 most recent of 39 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12242397 | System and method for replay of peripheral device attacks | Imityaz Yunus Pathan, Raja Kannan, Vinoo Thomas, Rajendra Kumar Sharma | 2025-03-04 |
| 11775634 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, David M. Durham, Balaji Vembu +4 more | 2023-10-03 |
| 11580219 | System and method for malware signature generation | Craig Schmugar, Zheng Zhang, Michael S. Hughes | 2023-02-14 |
| 11496368 | Dynamically identifying criticality of services and data sources | Thiago Macieira, Ned M. Smith, Zheng Zhang, Arthur S. Zeigler | 2022-11-08 |
| 11270015 | Secure disk access control | Atul Kabra, Michael S. Hughes | 2022-03-08 |
| 11206261 | Distributed authentication with thresholds in IoT devices | Glen J. Anderson, Chakradhar Kotamraju | 2021-12-21 |
| 11063974 | Application phenotyping | Cedric Cochin, Ofir Arkin, James Douglas Bean, Joel R. Spurlock, Carl D. Woodward | 2021-07-13 |
| 10944636 | Dynamically identifying criticality of services and data sources | Thiago Macieira, Ned M. Smith, Zheng Zhang, Arthur S. Zeigler | 2021-03-09 |
| 10834124 | Remote malware remediation | James Douglas Bean, Gregory William Dalcher, Jeff Hetzler | 2020-11-10 |
| 10726129 | Persistence probing to detect malware | Craig Schmugar, Cedric Cochin | 2020-07-28 |
| 10572660 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, David M. Durham, Balaji Vembu +4 more | 2020-02-25 |
| 10476899 | Application phenotyping | Cedric Cochin, Ofir Arkin, James Douglas Bean, Joel R. Spurlock, Carl D. Woodward | 2019-11-12 |
| 10372472 | System, method, and computer program product for conditionally preventing use of hardware virtualization | Peter Blaimschein, Thomas C. H. Steeiner, Gregory William Dalcher | 2019-08-06 |
| 10367813 | Distributed authentication with thresholds in IoT devices | Glen J. Anderson, Chakradhar Kotamraju | 2019-07-30 |
| 10360398 | Secure disk access control | Atul Kabra, Michael S. Hughes | 2019-07-23 |
| 10303876 | Persistence probing to detect malware | Craig Schmugar, Cedric Cochin | 2019-05-28 |
| 10205744 | Remote malware remediation | James Douglas Bean, Gregory William Dalcher, Jeff Hetzler | 2019-02-12 |
| 10083295 | System and method to combine multiple reputations | Joel R. Spurlock | 2018-09-25 |
| 10073972 | Computing platform security methods and apparatus | Paritosh Saxena, Michael S. Hughes, David M. Durham, Balaji Vembu, Prashant Dewan +3 more | 2018-09-11 |
| 10061919 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, David M. Durham, Balaji Vembu +4 more | 2018-08-28 |
| 9898340 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, David M. Durham, Balaji Vembu +4 more | 2018-02-20 |
| 9769186 | Determining a reputation through network characteristics | Ramnath Venugopalan, Cedric Cochin, Joel R. Spurlock | 2017-09-19 |
| 9723006 | Temporary process deprivileging | Zheng Zhang, Craig Schmugar, Erdem Aktas, Clint R. Merrill, Kunal Mehta | 2017-08-01 |
| 9690928 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, David M. Durham, Balaji Vembu +4 more | 2017-06-27 |
| 9672374 | Secure disk access control | Atul Kabra, Michael S. Hughes | 2017-06-06 |