AT

Andrew J. Thomas

SL Sophos Limited: 128 patents #1 of 202Top 1%
SI Sideassure: 3 patents #2 of 6Top 35%
SP Sophos Plc: 2 patents #3 of 28Top 15%
BP Bae Systems Plc: 1 patents #384 of 927Top 45%
CI Ciena: 1 patents #757 of 1,406Top 55%
📍 Church Hanborough, OR: #1 of 1 inventorsTop 100%
Overall (All Time): #7,323 of 4,157,543Top 1%
138
Patents All Time

Issued Patents All Time

Showing 101–125 of 138 patents

Patent #TitleCo-InventorsDate
10558800 Labeling objects on an endpoint for encryption management Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more 2020-02-11
10515211 Use of an application controller to monitor and control software file and application environments 2019-12-24
10516531 Key management for compromised enterprise endpoints Harald Schütz, Kenneth D. Ray, Daniel Salvatore Schiappa 2019-12-24
10516682 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray 2019-12-24
10489588 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries 2019-11-26
10460105 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries 2019-10-29
10447708 Server drift monitoring Kenneth D. Ray, Mark David Harris 2019-10-15
10382459 Threat detection using a time-based cache of reputation information on an enterprise endpoint Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Robert W. Cook 2019-08-13
10225286 Using indications of compromise for reputation based network security Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Robert W. Cook +1 more 2019-03-05
10122753 Using reputation to avoid false malware detections 2018-11-06
10122687 Firewall techniques for colored objects on endpoints Neil Robert Tyndale Watkiss, Daniel Salvatore Schiappa, Kenneth D. Ray 2018-11-06
10063373 Key management for compromised enterprise endpoints Harald Schütz, Kenneth D. Ray, Daniel Salvatore Schiappa 2018-08-28
10038702 Server drift monitoring Kenneth D. Ray, Mark David Harris 2018-07-31
10013535 Software configuration of module dependent on history Mark Skrebels, Stewart Irvine 2018-07-03
9992228 Using indications of compromise for reputation based network security Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Robert W. Cook +1 more 2018-06-05
9984248 Behavioral-based control of access to encrypted content by a process Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw 2018-05-29
9967264 Threat detection using a time-based cache of reputation information on an enterprise endpoint Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Robert W. Cook 2018-05-08
9967283 Normalized indications of compromise Kenneth D. Ray, Robert W. Cook, Dmitri Samosseiko, Mark David Harris 2018-05-08
9965627 Labeling objects on an endpoint for encryption management Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more 2018-05-08
9967282 Labeling computing objects for improved threat detection Mark David Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Kenneth D. Ray 2018-05-08
9967267 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray 2018-05-08
9928366 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries 2018-03-27
9852292 Use of an application controller to monitor and control software file and application environments 2017-12-26
9774613 Server drift monitoring Kenneth D. Ray, Mark David Harris 2017-09-26
9654489 Advanced persistent threat detection 2017-05-16