RH

Russell Humphries

SL Sophos Limited: 33 patents #4 of 202Top 2%
Microsoft: 10 patents #4,352 of 40,388Top 15%
📍 Mickleham, WA: #1 of 1 inventorsTop 100%
Overall (All Time): #69,639 of 4,157,543Top 2%
43
Patents All Time

Issued Patents All Time

Showing 26–43 of 43 patents

Patent #TitleCo-InventorsDate
10817602 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2020-10-27
10681078 Key throttling to mitigate unauthorized file access Kenneth D. Ray, Anthony John Merry, Harald Schütz 2020-06-09
10516682 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray 2019-12-24
10489588 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2019-11-26
10460105 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2019-10-29
RE47518 Image or pictographic based computer login systems and methods Matthew Kowalczyk, Erik Holt 2019-07-16
10263966 Perimeter enforcement of encryption rules Gordon Sullivan, Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger 2019-04-16
9967267 Forensic analysis of computing activity Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray 2018-05-08
9928366 Endpoint malware detection using an event graph Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith 2018-03-27
RE46301 Image or pictographic based computer login systems and methods Erik Holt, Matthew Kowalczyk 2017-02-07
RE44725 Image or pictographic based computer login systems and methods Erik Holt, Matthew Kowalczyk 2014-01-21
8417969 Storage volume protection supporting legacy systems Octavian T. Ureche, Niels T. Ferguson, Ping Xie 2013-04-09
8046593 Storage device controlled access Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara 2011-10-25
8028172 Systems and methods for updating a secure boot process on a computer with a hardware security module Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more 2011-09-27
7953983 Image or pictographic based computer login systems and methods Erik Holt, Matthew Kowalczyk 2011-05-31
7725703 Systems and methods for securely booting a computer with a trusted processing module Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more 2010-05-25
7565553 Systems and methods for controlling access to data on a computer with a secure boot process Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more 2009-07-21
7506380 Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more 2009-03-17