MH

Mark David Harris

SL Sophos Limited: 49 patents #3 of 202Top 2%
MC Mcafee: 4 patents #296 of 1,127Top 30%
NT Networks Associates Technology: 1 patents #100 of 189Top 55%
Overall (All Time): #47,070 of 4,157,543Top 2%
54
Patents All Time

Issued Patents All Time

Showing 25 most recent of 54 patents

Patent #TitleCo-InventorsDate
12361358 Enterprise network threat detection Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2025-07-15
12153674 Tracking malware root causes with an event graph Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries 2024-11-26
12093383 Tracking malware root causes with an event graph Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries 2024-09-17
12079757 Endpoint with remotely programmable data recorder Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2024-09-03
12052272 Forensic analysis of computing activity Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray 2024-07-30
12021831 Network security Andrew J. Thomas, Kenneth D. Ray 2024-06-25
11843631 Detecting triggering events for distributed denial of service attacks Karl Ackerman, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray 2023-12-12
11727333 Endpoint with remotely programmable data recorder Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2023-08-15
11720844 Enterprise network threat detection Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2023-08-08
11716351 Intrusion detection with honeypot keys Harald Schütz, Andreas Berger, Russell Humphries, Kenneth D. Ray 2023-08-01
11550909 Tracking malicious software movement with an event graph Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries 2023-01-10
11297073 Forensic query of local event streams in an enterprise network Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2022-04-05
11277416 Labeling network flows according to source applications Kenneth D. Ray, Andrew J. Thomas 2022-03-15
11182486 Early boot driver for start-up detection of malicious code Richard Paul Cosgrove, Andrew G. P. Smith 2021-11-23
11165797 Detecting endpoint compromise based on network usage history Karl Ackerman, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz 2021-11-02
11102238 Detecting triggering events for distributed denial of service attacks Karl Ackerman, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray 2021-08-24
11095669 Forensic analysis of computing activity Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray 2021-08-17
11089056 Intrusion detection with honeypot keys Harald Schütz, Andreas Berger, Russell Humphries, Kenneth D. Ray 2021-08-10
10972485 Enterprise network threat detection Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries 2021-04-06
10963569 Early boot driver for start-up detection of malicious code Andrew G. P. Smith, Richard Paul Cosgrove 2021-03-30
10951642 Context-dependent timeout for remote security services Neil Robert Tyndale Watkiss, Emile Marcus Kenning 2021-03-16
10841339 Normalized indications of compromise Kenneth D. Ray, Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko 2020-11-17
10817602 Endpoint malware detection using an event graph Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries 2020-10-27
10778725 Using indications of compromise for reputation based network security Kenneth D. Ray, Simon Neil Reed, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more 2020-09-15
10728269 Method for conditionally hooking endpoint processes with a security agent Neil Robert Tyndale Watkiss 2020-07-28