Issued Patents All Time
Showing 1–25 of 32 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12413606 | Techniques for detecting cyberattacks on an authentication system | Roy Hodgman, Katherine Wilbur | 2025-09-09 |
| 12367204 | Event prediction | Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan | 2025-07-22 |
| 12321454 | Command line parsing for classification of process start alerts | Matthew Berninger, Roy Hodgman, Katherine Wilbur, Lauren L. Johnson, Jacqueline Daniel +1 more | 2025-06-03 |
| 12314385 | Automated generation of anomaly scenarios for testing machine learned anomaly detection models | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2025-05-27 |
| 12289404 | Password similarity checking using homomorphic encryption operations | Roy Hodgman | 2025-04-29 |
| 12238127 | Anomalous data transfer detection | Roy Hodgman | 2025-02-25 |
| 12206699 | Identifying high-influence features for model-detected anomalies | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2025-01-21 |
| 12182670 | Automated dimensionality reduction for machine learning anomaly detection pipeline | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2024-12-31 |
| 12120136 | Anomalous data transfer detection | Roy Hodgman | 2024-10-15 |
| 12101342 | System and method for monitoring network activity for detecting data exfiltration events | Dustin Myers, Roy Hodgman | 2024-09-24 |
| 12088600 | Machine learning system for detecting anomalies in hunt data | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2024-09-10 |
| 12069079 | Generating synthetic datapoints from observed datapoints for training machine learning models | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2024-08-20 |
| 11995092 | Event prediction | Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan | 2024-05-28 |
| 11956260 | Attack monitoring service that selectively analyzes connection graphs for suspected attack paths | Roy Hodgman, Katherine Wilbur | 2024-04-09 |
| 11930108 | Password requirement conformity check | Roy Hodgman | 2024-03-12 |
| 11853853 | Providing human-interpretable explanation for model-detected anomalies | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2023-12-26 |
| 11856017 | Machine learning correlator to infer network properties | Roy Hodgman, Kwan Lin | 2023-12-26 |
| 11770387 | Graph-based detection of lateral movement in computer networks | Roy Hodgman, Katherine Wilbur | 2023-09-26 |
| 11741132 | Cluster-based scheduling of security operations | Roy Hodgman, Wah-Kwan Lin | 2023-08-29 |
| 11687569 | Optimizing role level identification for resource allocation | Wah-Kwan Lin, Roy Hodgman | 2023-06-27 |
| 11595423 | Honeypot network with dynamically updated alert modules for detecting anomalous connections | Roy Hodgman, Wah-Kwan Lin | 2023-02-28 |
| 11574236 | Automating cluster interpretation in security environments | Roy Hodgman, Wah-Kwan Lin | 2023-02-07 |
| 11509674 | Generating machine learning data in salient regions of a feature space | Jocelyn Beauchesne, John Lim Oh, Roy Hodgman | 2022-11-22 |
| 11481644 | Event prediction | Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan | 2022-10-25 |
| 11368474 | Detecting anomalous internet behavior | Roy Hodgman, Wah-Kwan Lin | 2022-06-21 |