Issued Patents All Time
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12328322 | Method, product, and system for network security management using software representation that embodies network configuration and policy data | Sohrob Kazerounian, William Stow Finlayson, IV, Karl Matthew Lynn | 2025-06-10 |
| 12219070 | Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates | Sohrob Kazerounian, William Stow Finlayson, IV, Karl Matthew Lynn | 2025-02-04 |
| 12212585 | Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management | Sohrob Kazerounian, William Stow Finlayson, IV, Karl Matthew Lynn | 2025-01-28 |
| 11973768 | Method and system for detecting malicious payloads | John Steven Mancini | 2024-04-30 |
| 11595416 | Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network | Hsin-Chung Chen, Himanshu Mhatre, John Steven Mancini | 2023-02-28 |
| 11330005 | Privileged account breach detections based on behavioral access patterns | Himanshu Mhatre, Daniel Carlton Hannah | 2022-05-10 |
| 11184369 | Malicious relay and jump-system detection using behavioral indicators of actors | Himanshu Mhatre | 2021-11-23 |
| 10623428 | Method and system for detecting suspicious administrative activity | Kevin Song-Kai Ni | 2020-04-14 |
| 9985979 | Method and system for detecting threats using passive cluster mapping | David Lopes Pegna | 2018-05-29 |
| 9930053 | Method and system for detecting bot behavior | — | 2018-03-27 |
| 9900336 | System for detecting threats using scenario-based tracking of internal and external network traffic | David Lopes Pegna | 2018-02-20 |
| 9853988 | Method and system for detecting threats using metadata vectors | David Lopes Pegna, Karl Matthew Lynn | 2017-12-26 |
| 9847968 | Method and system for generating durable host identifiers using network artifacts | Monty Sher Gill, Oliver Tavakoli | 2017-12-19 |
| 9628512 | Malicious relay detection on networks | Ryan Prenger, Karl Matthew Lynn | 2017-04-18 |
| 9602533 | Detecting network reconnaissance by tracking intranet dark-net communications | Sungwook Yoon | 2017-03-21 |
| 9565208 | System and method for detecting network intrusions using layered host scoring | Oskar Ibatullin, Ryan Prenger, Karl Matthew Lynn, Oliver Tavakoli | 2017-02-07 |
| 9407647 | Method and system for detecting external control of compromised hosts | Ryan Prenger | 2016-08-02 |
| 8429403 | Systems and methods for provisioning network devices | Eric J. M. Moret, Robert B. Hubbard, Kent A. Watsen, Muku Murthy | 2013-04-23 |