Issued Patents All Time
Showing 25 most recent of 87 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12075124 | Systems and methods for real-time adaptive bitrate transcoding and transmission of transcoded media | Steven Mayhew, Maciej Dobrzynski | 2024-08-27 |
| 12019782 | Privacy protection for customer events logs of cybersecurity events | — | 2024-06-25 |
| 12013937 | Detection and identification of malware using a hierarchical evolutionary tree | Chia-Yen Chang, Wen-Kwang Tsao, Joseph Cepe, Maria Estella Manly Reyes, Paul Christian D. Pajares +4 more | 2024-06-18 |
| 11804961 | Secure video content transmission over a computer network | Chia-Yen Chang, Wen-Kwang Tsao, Ping Huan Wu, Federico Maggi, Jiri Gogela +1 more | 2023-10-31 |
| 11736498 | Stateful detection of cyberattacks | Wen-Kwang Tsao, Mun-Hou Wong, Annie Bu, Chia-Yen Chang, Liam Huang +3 more | 2023-08-22 |
| 11516542 | Systems and methods for real-time adaptive bitrate transcoding and transmission of transcoded media | Steven Mayhew, Maciej Dobrzynski | 2022-11-29 |
| 11263500 | Image detection methods and apparatus | Yun-Chian Chang | 2022-03-01 |
| 11182481 | Evaluation of files for cyber threats using a machine learning model | Chia-Yen Chang, Wen-Kwang Tsao, Li-Hsin Hsu | 2021-11-23 |
| 11128916 | Systems and methods for real-time adaptive bitrate transcoding and transmission of transcoded media | Steven Mayhew, Maciej Dobrzynski | 2021-09-21 |
| 11101995 | Secure video content transmission over a computer network | Chia-Yen Chang, Wen-Kwang Tsao, Ping Huan Wu, Federico Maggi, Jiri Gogela +1 more | 2021-08-24 |
| 10848455 | Detection of abusive user accounts in social networks | Jennifer Rihn | 2020-11-24 |
| 10834127 | Detection of business email compromise attacks | Che-Fu Yeh, I-Ting Lien, Ming-Lun Li, Shih-Yu Chou, Po-Yuan Teng +5 more | 2020-11-10 |
| 10785176 | Method and apparatus for classifying electronic messages | David A. Koblas, Brian K. Wilson | 2020-09-22 |
| 10162967 | Methods and systems for identifying legitimate computer files | Jayson Pryde, Victor Hargrave, Scott Forman, Chun-Pin CHENG | 2018-12-25 |
| 10116614 | Detection of abusive user accounts in social networks | Jennifer Rihn | 2018-10-30 |
| 10084801 | Time zero classification of messages | Jennifer Rihn | 2018-09-25 |
| 10078750 | Methods and systems for finding compromised social networking accounts | — | 2018-09-18 |
| 10069851 | Managing infectious forwarded messages | Jennifer Rihn | 2018-09-04 |
| 10057198 | Controlling social network usage in enterprise environments | Bharath Kumar Chandrasekhar, Victor Hargrave | 2018-08-21 |
| 10044656 | Statistical message classifier | Scott Roy, Scott D. Eikenberry, Bryan Kim, David A. Koblas, Brian K. Wilson | 2018-08-07 |
| 10027611 | Method and apparatus for classifying electronic messages | David A. Koblas, Brian K. Wilson | 2018-07-17 |
| 10027702 | Identification of malicious shortened uniform resource locators | — | 2018-07-17 |
| 9860167 | Classifying a message based on likelihood of spoofing | David A. Koblas | 2018-01-02 |
| 9674126 | Efficient use of resources in message classification | Brian K. Wilson, David A. Koblas, Scott D. Eikenberry, Paul R. Wieneke, Damon K. Uyeda +1 more | 2017-06-06 |
| 9516047 | Time zero classification of messages | Jennifer Rihn | 2016-12-06 |