MA

Martin Abadi

Microsoft: 28 patents #965 of 40,388Top 3%
DE Digital Equipment: 7 patents #143 of 2,100Top 7%
CC Compaq Computer: 3 patents #362 of 1,604Top 25%
Google: 3 patents #8,000 of 22,993Top 35%
CG Compaq Information Technologies Group: 1 patents #84 of 407Top 25%
Overall (All Time): #73,154 of 4,157,543Top 2%
42
Patents All Time

Issued Patents All Time

Showing 25 most recent of 42 patents

Patent #TitleCo-InventorsDate
11853860 Encoding and reconstructing inputs using neural networks David Godbe Andersen 2023-12-26
11308385 Encoding and reconstructing inputs using neural networks David Godbe Andersen 2022-04-19
10044718 Authorization in a distributed system using access control lists and groups Michael Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly 2018-08-07
9319469 Host agnostic integration and interoperation system Matthew J. Ruhlen, Kenneth John Yuhas, JR., Mark Fields 2016-04-19
8997220 Automatic detection of search results poisoning attacks Fang Yu, Yinglian Xie, John Payyappillil John, Arvind Krishnamurthy 2015-03-31
8745738 Vouching for user account using social networking relationship Yinglian Xie, Fang Yu, Qifa Ke, Eliot C. Gillum, Krishna Vitaldevara +1 more 2014-06-03
8615605 Automatic identification of travel and non-travel network addresses Fang Yu, Yinglian Xie, Stefan Savage, Geoffrey Michael Voelker, Andreas Pitsillidis 2013-12-24
8505065 Access control policy in a weakly-coherent distributed collection Edward P. Wobber, Thomas L. Rodeheffer 2013-08-06
8495742 Identifying malicious queries Yinglian Xie, Fang Yu, John Payyappillil John 2013-07-23
8434150 Using social graphs to combat malicious attacks Yinglian Xie, Fang Yu, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao +2 more 2013-04-30
8434098 Synchronizing split user-mode/kernel-mode device driver architecture Mingtzong Lee, Peter Wieland, Nar Ganapathy, Ulfar Erlingson, John Richardson 2013-04-30
8387145 Blocking malicious activity using blacklist Yinglian Xie, Fang Yu 2013-02-26
8266604 Transactional memory compatibility management Dana Groff, Yosseff Levanoni, Stephen Toub, Michael M. Magruder, Weirong Zhu +8 more 2012-09-11
8239954 Access control based on program properties Edward P. Wobber, Andrew Birrell 2012-08-07
8185613 Host accountability using unreliable identifiers Yinglian Xie, Fang Yu 2012-05-22
8185783 Split user-mode/kernel-mode device driver architecture Mingtzong Lee, Peter Wieland, Nar Ganapathy, Ulfar Erlingsson, John Richardson 2012-05-22
8180986 Memory conflict detection via mapping of the physical heap to control access permissions to the memory Timothy L. Harris 2012-05-15
8136091 Architectural support for software-based protection Ulfar Erlingsson, Mihai Budiu 2012-03-13
8104021 Verifiable integrity guarantees for machine code programs Ulfar Erlingsson, Michael Vrable 2012-01-24
8020141 Operating-system process construction Galen C. Hunt, James R. Larus, John D. DeTreville, Edward P. Wobber, Michael B. Jones +1 more 2011-09-13
7908265 Transactional memory with dynamic separation Andrew Birrell, Timothy L. Harris, Michael Isard, Johnson Hsieh 2011-03-15
7870336 Operating system protection against side-channel attacks on secrecy Ulfar Erlingsson 2011-01-11
7865934 Access-control permissions with inter-process message-based communications Edward P. Wobber, Manuel A. Fahndrich, Ulfar Erlingsson 2011-01-04
7788637 Operating system process identification Galen C. Hunt, James R. Larus, John D. DeTreville, Edward P. Wobber, Michael B. Jones +1 more 2010-08-31
7730058 Searching for information utilizing a probabilistic detector Gaurav Sareen, Mark Manasse, Michael Isard 2010-06-01