Issued Patents All Time
Showing 26–43 of 43 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10817602 | Endpoint malware detection using an event graph | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith | 2020-10-27 |
| 10681078 | Key throttling to mitigate unauthorized file access | Kenneth D. Ray, Anthony John Merry, Harald Schütz | 2020-06-09 |
| 10516682 | Forensic analysis of computing activity | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray | 2019-12-24 |
| 10489588 | Endpoint malware detection using an event graph | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith | 2019-11-26 |
| 10460105 | Endpoint malware detection using an event graph | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith | 2019-10-29 |
| RE47518 | Image or pictographic based computer login systems and methods | Matthew Kowalczyk, Erik Holt | 2019-07-16 |
| 10263966 | Perimeter enforcement of encryption rules | Gordon Sullivan, Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger | 2019-04-16 |
| 9967267 | Forensic analysis of computing activity | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray | 2018-05-08 |
| 9928366 | Endpoint malware detection using an event graph | Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith | 2018-03-27 |
| RE46301 | Image or pictographic based computer login systems and methods | Erik Holt, Matthew Kowalczyk | 2017-02-07 |
| RE44725 | Image or pictographic based computer login systems and methods | Erik Holt, Matthew Kowalczyk | 2014-01-21 |
| 8417969 | Storage volume protection supporting legacy systems | Octavian T. Ureche, Niels T. Ferguson, Ping Xie | 2013-04-09 |
| 8046593 | Storage device controlled access | Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara | 2011-10-25 |
| 8028172 | Systems and methods for updating a secure boot process on a computer with a hardware security module | Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2011-09-27 |
| 7953983 | Image or pictographic based computer login systems and methods | Erik Holt, Matthew Kowalczyk | 2011-05-31 |
| 7725703 | Systems and methods for securely booting a computer with a trusted processing module | Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2010-05-25 |
| 7565553 | Systems and methods for controlling access to data on a computer with a secure boot process | Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2009-07-21 |
| 7506380 | Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module | Jamie Hunter, Paul England, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2009-03-17 |