Patent Leaderboard
USPTO Patent Rankings Data through Sept 30, 2025
RH

Roy Hodgman

RARapid7: 58 patents #1 of 193Top 1%
EMEmc: 14 patents #218 of 3,345Top 7%
ECEmc Ip Holding Company: 3 patents #1,358 of 4,608Top 30%
Cambridge, MA: #51 of 8,183 inventorsTop 1%
Massachusetts: #474 of 88,656 inventorsTop 1%
Overall (All Time): #25,259 of 4,157,543Top 1%
75 Patents All Time

Issued Patents All Time

Showing 51–75 of 75 patents

Patent #TitleCo-InventorsDate
10601846 Neutralizing malicious locators Aditya Kuppa, Suchin Gururangan, Andrew Reece 2020-03-24
10594655 Classifying locator generation kits Aditya Kuppa, Suchin Gururangan, Andrew Reece 2020-03-17
10462162 Detecting malicious processes based on process location Oliver Keyes, Wah-Kwan Lin, Michael Scutt, Timothy Stiller 2019-10-29
10447734 Monitoring scan attempts in a network Jeffrey D. Myers 2019-10-15
10205704 Classifying locator generation kits Aditya Kuppa, Suchin Gururangan, Andrew Reece 2019-02-12
10200383 Neutralizing malicious locators Aditya Kuppa, Suchin Gururangan, Andrew Reece 2019-02-05
10033757 Identifying malicious identifiers Aditya Kuppa, Suchin Gururangan, Andrew Reece 2018-07-24
9830599 Human interaction detection Amnon Khen, Alon Kaufman 2017-11-28
9660813 Dynamic privacy management for communications of clients in privacy-preserving groups Marten Van Dijk, Eyal Kolman 2017-05-23
9594968 Biometric profile creation Christopher Corde, Joshua Ungar, John G. Linn, Todd A. Morneau 2017-03-14
9405891 User authentication Christopher Corde, Joshua Ungar, John G. Linn, Todd A. Morneau 2016-08-02
9264444 Systems and methods for determining an objective security assessment for a network of assets HD Moore, Dana Elizabeth Wolf, Matthew Robert Hathaway 2016-02-16
9122857 Authenticating a user in an authentication system Daniel Hassan, Shai Granot 2015-09-01
9021255 Techniques for multiple independent verifications for digital certificates Idan Aharoni, Ingo Schubert 2015-04-28
9015231 Distributed anonymized communications Marten Van Dijk, Eyal Kolman 2015-04-21
8924726 Robust message encryption Daniel Hassan 2014-12-30
8925058 Authentication involving authentication operations which cross reference authentication factors Yedidya Dotan, William M. Duane, John G. Linn, Derek Lin 2014-12-30
8910281 Identifying malware sources using phishing kit templates Idan Aharoni 2014-12-09
8904524 Detection of fast flux networks 2014-12-02
8904525 Techniques for detecting malware on a mobile device Samir Dilipkumar Saklikar, Kevin D. Bowers 2014-12-02
8902045 Controlling access to a computerized resource based on authentication using pulse data John G. Linn, William M. Duane, Yedidya Dotan 2014-12-02
8902043 Mitigating conformational bias in authentication systems Karl Ackerman, Kenneth D. Ray, Lawrence N. Friedman, Roy Dagan, Alex Vaystikh 2014-12-02
8855312 Mobile trust broker Samir Dilipkumar Saklikar 2014-10-07
8683452 Dynamically obfuscated javascript Ofer Mizrach, Ofri Mann, Alex Vaystikh 2014-03-25
8528049 Techniques of providing authentication from computer pointer interactions Amnon Khen, Alon Kaufman 2013-09-03