KA

Karl Ackerman

SL Sophos Limited: 22 patents #6 of 202Top 3%
EM Emc: 14 patents #218 of 3,345Top 7%
EC Emc Ip Holding Company: 1 patents #2,584 of 4,608Top 60%
Overall (All Time): #84,364 of 4,157,543Top 3%
38
Patents All Time

Issued Patents All Time

Showing 25 most recent of 38 patents

Patent #TitleCo-InventorsDate
12309200 Detecting phishing attacks Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz 2025-05-20
12273382 Multi-factor authentication John Edward Tyrone Shaw, Craig Paradis, Andrew J. Thomas, Kenneth D. Ray 2025-04-08
12244641 Application firewall Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz 2025-03-04
12184510 Implementing a machine-learning model to identify critical systems in an enterprise environment 2024-12-31
12050715 Live discovery of enterprise threats based on security query activity Andrew J. Thomas, Kenneth D. Ray 2024-07-30
12041067 Behavior detection and verification Andrew J. Thomas, Johan Petter Nordwall, Thomas John Walsh, Christoph Georg Hoyer, Mirco Stratmann +1 more 2024-07-16
12026276 Data augmentation for threat investigation in an enterprise network Kenneth D. Ray, Andrew J. Thomas 2024-07-02
12010133 Security threat monitoring for network-accessible devices 2024-06-11
11853425 Dynamic sandbox scarecrow for malware management Ross McKerchar, Erik Jan Loman, Simon Neil Reed, Kenneth D. Ray, Andrew J. Thomas 2023-12-26
11843631 Detecting triggering events for distributed denial of service attacks Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray 2023-12-12
11836664 Enterprise network threat detection Russell Humphries, Mark Russo, Andrew J. Thomas 2023-12-05
11736522 Server-client authentication with integrated status update Andrew J. Thomas, Kenneth D. Ray 2023-08-22
11727143 Live discovery of enterprise threats based on security query activity Andrew J. Thomas, Kenneth D. Ray 2023-08-15
11722521 Application firewall Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz 2023-08-08
11695647 Implementing a machine-learning model to identify critical systems in an enterprise environment 2023-07-04
11616811 Tracking usage of corporate credentials Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz 2023-03-28
11288385 Chain of custody for enterprise documents Russell Humphries, Daniel Salvatore Schiappa, Kenneth D. Ray, Andrew J. Thomas 2022-03-29
11258821 Application firewall Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz 2022-02-22
11184391 Server-client authentication with integrated status update Andrew J. Thomas, Kenneth D. Ray 2021-11-23
11165797 Detecting endpoint compromise based on network usage history Mark David Harris, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz 2021-11-02
11102238 Detecting triggering events for distributed denial of service attacks Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray 2021-08-24
10986109 Local proxy detection Fraser Howard, Andrew J. Thomas, Dmitri Samosseiko 2021-04-20
9525551 Randomly skewing secret values as a countermeasure to compromise Marten Van Dijk, Ari Juels, Emily H. Shen 2016-12-20
9305153 User authentication Lawrence N. Friedman 2016-04-05
9240986 Managing security and wireless signal detection William Duane, Yedidya Dotan 2016-01-19