Issued Patents All Time
Showing 1–25 of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12373730 | Programmable feature extractor | Kenneth D. Ray, Joshua Daniel Saxe | 2025-07-29 |
| 12354043 | Computer augmented threat evaluation | Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray | 2025-07-08 |
| 11995205 | Centralized event detection | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2024-05-28 |
| 11989326 | Programmable feature extractor with anonymization | Kenneth D. Ray, Joshua Daniel Saxe | 2024-05-21 |
| 11928231 | Dynamic multi-factor authentication | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2024-03-12 |
| 11818165 | Malware detection using machine learning | — | 2023-11-14 |
| 11755974 | Computer augmented threat evaluation | Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray | 2023-09-12 |
| 11657174 | Dynamic multi-factor authentication | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-05-23 |
| 11599660 | Dynamic policy based on user experience | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-03-07 |
| 11562088 | Threat response using event vectors | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-01-24 |
| 11562089 | Interface for network security marketplace | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-01-24 |
| 11556664 | Centralized event detection | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-01-17 |
| 11552962 | Computer assisted identification of intermediate level threats | Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray | 2023-01-10 |
| 11087014 | Dynamic policy based on user experience | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-08-10 |
| 11068615 | Dynamic multi-factor authentication | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-07-20 |
| 10938781 | Secure labeling of network flows | Daniel Salvatore Schiappa, Andrew J. Thomas, Kenneth D. Ray | 2021-03-02 |
| 10938838 | Computer augmented threat evaluation | Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray | 2021-03-02 |
| 10841333 | Malware detection using machine learning | — | 2020-11-17 |
| 10721210 | Secure labeling of network flows | Daniel Salvatore Schiappa, Andrew J. Thomas, Kenneth D. Ray | 2020-07-21 |
| 10454792 | Apparatus and method for utilizing fourier transforms to characterize network traffic | Matthew S. Wood | 2019-10-22 |
| 10419398 | Method and apparatus for resource locator identifier rewrite | John Gmuender, Huy M. Nguyen, Michael Brian Massing, Zhong Chen, David M. Telehowski | 2019-09-17 |
| 9961091 | Apparatus and method for characterizing the risk of a user contracting malicious software | Matthew S. Wood | 2018-05-01 |
| 9807121 | Apparatus and method for decryption of secure communication sessions | David L. Wells, Paul Kraus | 2017-10-31 |
| 9491070 | Apparatus and method for utilizing fourier transforms to characterize network traffic | Matthew S. Wood | 2016-11-08 |
| 9419990 | Apparatus and method for characterizing the risk of a user contracting malicious software | Matthew S. Wood | 2016-08-16 |