Issued Patents All Time
Showing 51–75 of 102 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8126894 | Click chain model | Chao Liu, Fan Guo | 2012-02-28 |
| 8078691 | Web page load time prediction and simulation | Ming Zhang, Albert Greenberg, Zhichun Li | 2011-12-13 |
| 8041710 | Automatic diagnosis of search relevance failures | Li-wei He, Wenzhao Tan, Jinliang Fan, Xiaoxin Yin | 2011-10-18 |
| 8024815 | Isolation environment-based information access | Jacob R. Lorch, Chad Verbowski, Helen Wang, Samuel John Edward King | 2011-09-20 |
| 7962571 | Method and system for collecting information from computer systems based on a trusted relationship | Chun Yuan, Jiahe Helen Wang, Zheng Zhang | 2011-06-14 |
| 7873635 | Search ranger system and double-funnel model for search spam analyses and browser protection | Ming Ma | 2011-01-18 |
| 7874001 | Detecting user-mode rootkits | Douglas Beck | 2011-01-18 |
| 7784101 | Identifying dependencies of an application upon a given security context | Chad Verbowski, John D. Dungan, Shuo Chen | 2010-08-24 |
| 7779480 | Identifying dependencies of an application upon a given security context | Chad Verbowski, John Dunagan, Shuo Chen | 2010-08-17 |
| 7774459 | Honey monkey network exploration | Douglas Beck | 2010-08-10 |
| 7765592 | Changed file identification, software conflict resolution and unwanted file removal | Aaron R. Johnson, David Ladd, Roussi Roussev, Chad Verbowski | 2010-07-27 |
| 7756987 | Cybersquatter patrol | Douglas Beck, Chad Verbowski, Bradford Daniels, Ming Ma | 2010-07-13 |
| 7698305 | Program modification and loading times in computing devices | Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev | 2010-04-13 |
| 7669049 | System and method for protecting privacy and anonymity of parties of network communications | Qixiang Sun, Daniel R. Simon, Wilfred Russell | 2010-02-23 |
| 7640215 | System and method for evaluating and enhancing source anonymity for encrypted web traffic | Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan | 2009-12-29 |
| 7627898 | Method and system for detecting infection of an operating system | Douglas Beck, Aaron R. Johnson, Roussi Roussev, Chad Verbowski, Binh Dou Vo | 2009-12-01 |
| 7624398 | Accelerating a distributed component architecture over a network using a modified RPC communication | Galen C. Hunt, Alessandro Florin | 2009-11-24 |
| 7620995 | Identifying dependencies of an application upon a given security context | Chad Verbowski, John Dunagan, Shuo Chen | 2009-11-17 |
| 7614046 | Method and system for analyzing the impact of a software update | Bradford Daniels, John Dunagan, Roussi Roussev, Chad Verbowski | 2009-11-03 |
| 7571482 | Automated rootkit detector | Alexey Polyakov, Gretchen L. Loihle, Mihai Costea, Robert John Hensing, Scott A. Field +2 more | 2009-08-04 |
| 7392295 | Method and system for collecting information from computer systems based on a trusted relationship | Chun Yuan, Jiahe Helen Wang, Zheng Zhang | 2008-06-24 |
| 7389444 | Method and system for troubleshooting a misconfiguration of a computer system based on product support services information | Wei-Ying Ma, Ji-Rong Wen | 2008-06-17 |
| 7337092 | Event-based automated diagnosis of known problems | Chun Yuan, Ji-Rong Wen, Wei-Ying Ma, Zheng Zhang | 2008-02-26 |
| 7200675 | Summary-based routing for content-based event distribution networks | Lili Qiu, Chad Verbowski, Demetrios Achlioptas, Gautam Das, Per-Ake Larson | 2007-04-03 |
| 7171337 | Event-based automated diagnosis of known problems | Chun Yuan, Ji-Rong Wen, Wei-Ying Ma, Zheng Zhang | 2007-01-30 |