Issued Patents All Time
Showing 25 most recent of 41 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12216760 | Method and apparatus to identify creator of com process created using ole automation | Manish Kumar | 2025-02-04 |
| 12056233 | Responsible parent process identification | David McCormack, Leandro Ignacio Costantino, Manish Kumar | 2024-08-06 |
| 11829304 | Pairing of external device with random user action | Cedric Cochin, Aditya Kapoor | 2023-11-28 |
| 11238154 | Multi-lateral process trees for malware remediation | Saurabh Gautam, Dhananjay Kumar, Joel R. Spurlock | 2022-02-01 |
| 10691476 | Protection of sensitive data | Aditya Kapoor | 2020-06-23 |
| 10579544 | Virtualized trusted storage | Joel R. Spurlock, Zheng Zhang, Aditya Kapoor, Khai N. Pham | 2020-03-03 |
| 10162767 | Virtualized trusted storage | Joel R. Spurlock, Zheng Zhang, Aditya Kapoor, Khai N. Pham | 2018-12-25 |
| 10146962 | Method and apparatus for protecting a PCI device controller from masquerade attacks by malware | Nitin V. Sarangdhar, Scott H. Robinson, Karanvir S. Grewal | 2018-12-04 |
| 10114948 | Hypervisor-based buffer overflow detection and prevention | — | 2018-10-30 |
| 10083296 | Detection of malicious thread suspension | Aditya Kapoor, Joel R. Spurlock | 2018-09-25 |
| 10032024 | System and method for virtual partition monitoring | Gregory William Dalcher | 2018-07-24 |
| 9852086 | Pairing of external device with random user action | Cedric Cochin, Aditya Kapoor | 2017-12-26 |
| 9712545 | Detection of a malicious peripheral | Cedric Cochin, Aditya Kapoor | 2017-07-18 |
| 9565214 | Real-time module protection | Aditya Kapoor, Craig Schmugar, Vladimir Konobeev, Michael S. Hughes | 2017-02-07 |
| 9317687 | Identifying rootkits based on access permissions | Aditya Kapoor, Michael S. Hughes | 2016-04-19 |
| 9311126 | System and method for virtual partition monitoring | Gregory William Dalcher, John Teddy | 2016-04-12 |
| 9311478 | Behavioral tracking system, method, and computer program product for undoing events based on user input | Joel R. Spurlock, Gregory William Dalcher | 2016-04-12 |
| 9298910 | System and method for virtual partition monitoring | Gregory William Dalcher | 2016-03-29 |
| 9275223 | Real-time module protection | Aditya Kapoor, Craig Schmugar, Vladimir Konobeev, Michael S. Hughes | 2016-03-01 |
| 9104868 | System, method, and computer program product for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis | Gregory William Dalcher | 2015-08-11 |
| 8752171 | Behavioral tracking system, method, and computer program product for undoing events based on user input | Joel R. Spurlock, Gregory William Dalcher | 2014-06-10 |
| 8645949 | System, method, and computer program product for scanning data utilizing one of a plurality of virtual machines of a device | John Teddy | 2014-02-04 |
| 8627305 | System, method, and computer program product for hooking code inserted into an address space of a new process | Gregory William Dalcher | 2014-01-07 |
| 8572729 | System, method and computer program product for interception of user mode code execution and redirection to kernel mode | Joe C. Lowe, Gregory William Dalcher | 2013-10-29 |
| 8516478 | Subsequent processing of scanning task utilizing subset of virtual machines predetermined to have scanner process and adjusting amount of subsequest VMs processing based on load | John Teddy | 2013-08-20 |