RH

Russell Humphries

SL Sophos Limited: 33 patents #4 of 202Top 2%
Microsoft: 10 patents #4,352 of 40,388Top 15%
📍 Mickleham, WA: #1 of 1 inventorsTop 100%
Overall (All Time): #69,639 of 4,157,543Top 2%
43
Patents All Time

Issued Patents All Time

Showing 1–25 of 43 patents

Patent #TitleCo-InventorsDate
12361358 Enterprise network threat detection Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2025-07-15
12354043 Computer augmented threat evaluation Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy 2025-07-08
12153674 Tracking malware root causes with an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2024-11-26
12093383 Tracking malware root causes with an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2024-09-17
12079757 Endpoint with remotely programmable data recorder Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2024-09-03
12052272 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray 2024-07-30
11928631 Threat detection with business impact scoring Andrew J. Thomas 2024-03-12
11836664 Enterprise network threat detection Karl Ackerman, Mark Russo, Andrew J. Thomas 2023-12-05
11755974 Computer augmented threat evaluation Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy 2023-09-12
11741222 Sandbox environment for document preview and analysis Ross McKerchar, John Edward Tyrone Shaw, Andrew J. Thomas, Kenneth D. Ray, Daniel Salvatore Schiappa 2023-08-29
11727333 Endpoint with remotely programmable data recorder Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2023-08-15
11720844 Enterprise network threat detection Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2023-08-08
11716351 Intrusion detection with honeypot keys Harald Schütz, Andreas Berger, Mark David Harris, Kenneth D. Ray 2023-08-01
11552962 Computer assisted identification of intermediate level threats Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy 2023-01-10
11550909 Tracking malicious software movement with an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2023-01-10
11297073 Forensic query of local event streams in an enterprise network Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2022-04-05
11288385 Chain of custody for enterprise documents Karl Ackerman, Daniel Salvatore Schiappa, Kenneth D. Ray, Andrew J. Thomas 2022-03-29
11095669 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray 2021-08-17
11089056 Intrusion detection with honeypot keys Harald Schütz, Andreas Berger, Mark David Harris, Kenneth D. Ray 2021-08-10
10979449 Key throttling to mitigate unauthorized file access Kenneth D. Ray, Anthony John Merry, Harald Schütz 2021-04-13
10972485 Enterprise network threat detection Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas 2021-04-06
10938839 Threat detection with business impact scoring Andrew J. Thomas 2021-03-02
10938838 Computer augmented threat evaluation Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy 2021-03-02
10896254 Sandbox environment for document preview and analysis Ross McKerchar, John Edward Tyrone Shaw, Andrew J. Thomas, Kenneth D. Ray, Daniel Salvatore Schiappa 2021-01-19
10834061 Perimeter enforcement of encryption rules Gordon Sullivan, Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger 2020-11-10