Patent | Date |
---|
Identifying evidence within an information technology (IT) operations platform Grant 11,416,561 - Satish , et al. August 16, 2 | 2022-08-16 |
Extension Framework For An Information Technology And Security Operations Application App 20220247784 - SATISH; Sourabh ;   et al. | 2022-08-04 |
Utilizing predicted resolution times to allocate incident response resources in an information technology environment Grant 11,403,393 - Satish August 2, 2 | 2022-08-02 |
User role-based interface layout profiles in an information technology (IT) and security operations application Grant 11,372,532 - Catakli , et al. June 28, 2 | 2022-06-28 |
Optimizing display of suggested actions in a workbook Grant 11,327,827 - Satish , et al. May 10, 2 | 2022-05-10 |
Identifying automated responses to security threats based on obtained communication interactions Grant 11,323,472 - Satish , et al. May 3, 2 | 2022-05-03 |
Dynamic updates of incident status information Grant 11,265,206 - Satish March 1, 2 | 2022-03-01 |
Modifying Incident Response Time Periods Based On Incident Volume App 20220053017 - Satish; Sourabh ;   et al. | 2022-02-17 |
Simulating multiple paths of a course of action executed in an information technology environment Grant 11,240,120 - Mahadik , et al. February 1, 2 | 2022-02-01 |
Aggregation of incident data for correlated incidents Grant 11,218,357 - Salinas , et al. January 4, 2 | 2022-01-04 |
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data App 20210385123 - Friedrichs; Oliver ;   et al. | 2021-12-09 |
Modifying incident response time periods based on containment action effectiveness Grant 11,190,539 - Satish , et al. November 30, 2 | 2021-11-30 |
Customizable courses of action for responding to incidents in information technology environments Grant 11,182,163 - Beals , et al. November 23, 2 | 2021-11-23 |
Containment of security threats within a computing environment Grant 11,165,812 - Satish , et al. November 2, 2 | 2021-11-02 |
User Role-based Interface Layout Profiles In An Information Technology (it) And Security Operations Application App 20210326032 - CATAKLI; Timur ;   et al. | 2021-10-21 |
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating App 20210314347 - Satish; Sourabh ;   et al. | 2021-10-07 |
Anonymizing action implementation data obtained from incident analysis systems Grant 11,133,977 - Friedrichs , et al. September 28, 2 | 2021-09-28 |
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments App 20210281601 - Satish; Sourabh ;   et al. | 2021-09-09 |
Generating Action Recommendations For Courses Of Action Used For Incident Response App 20210281602 - Friedrichs; Oliver ;   et al. | 2021-09-09 |
Translating Security Actions Into Computing Asset-specific Action Procedures App 20210258340 - SATISH; Sourabh ;   et al. | 2021-08-19 |
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat App 20210250373 - SATISH; Sourabh ;   et al. | 2021-08-12 |
Simulating Multiple Paths Of A Course Of Action Executed In An Information Technology Environment App 20210226852 - Mahadik; Atif ;   et al. | 2021-07-22 |
Context-sensitive user interfaces in an information technology (IT) and security operations application Grant 11,061,548 - Catakli , et al. July 13, 2 | 2021-07-13 |
Dynamic generation of courses of action for incident response in an information technology environment Grant 11,038,915 - Friedrichs , et al. June 15, 2 | 2021-06-15 |
Identifying security actions for responding to security threats based on threat state information Grant 11,025,664 - Satish , et al. June 1, 2 | 2021-06-01 |
Learning based security threat containment Grant 11,019,092 - Satish , et al. May 25, 2 | 2021-05-25 |
Graphical interface for incident response automation Grant 11,019,093 - Satish , et al. May 25, 2 | 2021-05-25 |
Generating Suggested Courses Of Actions For Incidents Based On Previous Incident Handling App 20210150026 - Satish; Sourabh ;   et al. | 2021-05-20 |
Identifying Recommended Feature Sets Based On Application Feature Popularity App 20210144182 - Satish; Sourabh ;   et al. | 2021-05-13 |
Selecting actions responsive to computing environment incidents based on action impact information Grant 10,986,120 - Satish , et al. April 20, 2 | 2021-04-20 |
Simulated incident response using simulated result when actual result is unavailable Grant 10,985,994 - Mahadik , et al. April 20, 2 | 2021-04-20 |
Identifying Related Communication Interactions To A Security Threat In A Computing Environment App 20210092152 - Satish; Sourabh ;   et al. | 2021-03-25 |
Securely Managing Authentication Information For Automated Incident Responses App 20210081523 - Salinas; Govind ;   et al. | 2021-03-18 |
Identifying Automated Response Actions Based On Asset Classification App 20210084066 - Satish; Sourabh ;   et al. | 2021-03-18 |
Incident handling assistance based on previous incident handling Grant 10,936,716 - Satish , et al. March 2, 2 | 2021-03-02 |
Incident response in an information technology environment using cached data from external services Grant 10,936,488 - Earle , et al. March 2, 2 | 2021-03-02 |
Dynamically updating feature set recommendation databases Grant 10,904,295 - Satish , et al. January 26, 2 | 2021-01-26 |
Management of actions in a computing environment based on asset classification Grant 10,855,718 - Satish , et al. December 1, 2 | 2020-12-01 |
Encrypted storage and provision of authentication information for use when responding to an information technology incident Grant 10,853,478 - Salinas , et al. December 1, 2 | 2020-12-01 |
Identifying related communication interactions to a security threat in a computing environment Grant 10,834,120 - Satish , et al. November 10, 2 | 2020-11-10 |
Runtime Credential Requirement Identification For Incident Response App 20200351259 - Salinas; Govind ;   et al. | 2020-11-05 |
Dynamically updating feature set recommendation databases App 20200344268 - Satish; Sourabh ;   et al. | 2020-10-29 |
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems App 20200344113 - Friedrichs; Oliver ;   et al. | 2020-10-29 |
Identifying Security Actions For Responding To Security Threats Based On Threat State Information App 20200287930 - SATISH; Sourabh ;   et al. | 2020-09-10 |
Identification of runtime credential requirements Grant 10,757,093 - Salinas , et al. A | 2020-08-25 |
Identifying Security Actions Based On Computing Asset Relationship Data App 20200259858 - A1 | 2020-08-13 |
Generating action suggestions based on anonymized data from multiple information technology environments Grant 10,742,484 - Friedrichs , et al. A | 2020-08-11 |
Modifying Incident Response Time Periods Based On Containment Action Effectiveness App 20200213348 - Satish; Sourabh ;   et al. | 2020-07-02 |
Identifying recommended feature sets for software under development Grant 10,630,727 - Satish , et al. | 2020-04-21 |
Incident response management based on asset configurations in a computing environment Grant 10,616,264 - Friedrichs , et al. | 2020-04-07 |
Determining security actions for security threats using enrichment information Grant 10,567,424 - Satish , et al. Feb | 2020-02-18 |
Incident response management based on environmental characteristics Grant 10,554,687 - Satish , et al. Fe | 2020-02-04 |
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information App 20200007574 - Satish; Sourabh ;   et al. | 2020-01-02 |
Graphical Interface For Incident Response Automation App 20190373013 - SATISH; Sourabh ;   et al. | 2019-12-05 |
Security actions for computing assets based on enrichment information Grant 10,476,905 - Satish , et al. Nov | 2019-11-12 |
Implementing security actions in an advisement system based on obtained software characteristics Grant 10,425,440 - Satish , et al. Sept | 2019-09-24 |
Translating security actions to action procedures in an advisement system Grant 10,425,441 - Satish , et al. Sept | 2019-09-24 |
Identifying Recommended Feature Sets For Software Under Development App 20190253459 - Satish; Sourabh ;   et al. | 2019-08-15 |
Recommended security action feature sets Grant 10,320,845 - Satish , et al. | 2019-06-11 |
Managing security actions in a computing environment based on communication activity of a security threat Grant 10,193,920 - Satish , et al. Ja | 2019-01-29 |
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat App 20190020677 - SATISH; Sourabh ;   et al. | 2019-01-17 |
Incident Response Automation Engine App 20190014144 - SATISH; Sourabh ;   et al. | 2019-01-10 |
Incident Response Automation Engine App 20190007448 - SATISH; Sourabh ;   et al. | 2019-01-03 |
Incident response using asset configuration data Grant 10,158,663 - Satish , et al. Dec | 2018-12-18 |
Management Of Actions In A Computing Environment Based On Asset Classification App 20180332074 - Satish; Sourabh ;   et al. | 2018-11-15 |
Security Actions For Computing Assets Based On Enrichment Information App 20180316718 - Satish; Sourabh ;   et al. | 2018-11-01 |
Management of administrative incident response based on environmental characteristics associated with a security incident Grant 10,116,687 - Satish , et al. October 30, 2 | 2018-10-30 |
Management of security actions based on computing asset classification Grant 10,063,587 - Satish , et al. August 28, 2 | 2018-08-28 |
Method and apparatus for remotely managing a resource at a computer Grant 10,049,190 - Newstadt , et al. August 14, 2 | 2018-08-14 |
Classifying Kill-chains For Security Incidents App 20180159893 - Satish; Sourabh ;   et al. | 2018-06-07 |
Method and apparatus for extending functionality of an operating system Grant 9,971,776 - Satish , et al. May 15, 2 | 2018-05-15 |
Managing Workflows Upon A Security Incident App 20180124100 - Satish; Sourabh ;   et al. | 2018-05-03 |
Methods and systems for creating and updating approved-file and trusted-domain databases Grant 9,959,404 - Nachenberg , et al. May 1, 2 | 2018-05-01 |
Security actions for computing assets based on enrichment information Grant 9,954,888 - Satish , et al. April 24, 2 | 2018-04-24 |
Classifying kill-chains for security incidents Grant 9,888,029 - Satish , et al. February 6, 2 | 2018-02-06 |
Managing workflows upon a security incident Grant 9,871,818 - Satish , et al. January 16, 2 | 2018-01-16 |
Incident Response Automation Engine App 20180013785 - Satish; Sourabh ;   et al. | 2018-01-11 |
Systems and methods for detecting misplaced applications using functional categories Grant 9,846,772 - Satish December 19, 2 | 2017-12-19 |
Systems and methods for updating generic file-classification definitions Grant 9,805,115 - Satish October 31, 2 | 2017-10-31 |
Techniques for identifying malicious downloadable applications Grant 9,781,151 - McCorkendale , et al. October 3, 2 | 2017-10-03 |
Method, apparatus and system for protecting identity information Grant 9,781,159 - Hernacki , et al. October 3, 2 | 2017-10-03 |
Incident response automation engine Grant 9,762,607 - Satish , et al. September 12, 2 | 2017-09-12 |
Automated responses to security threats Grant 9,712,555 - Satish , et al. July 18, 2 | 2017-07-18 |
Systems and methods for clustering data Grant 9,684,705 - Satish , et al. June 20, 2 | 2017-06-20 |
Systems and methods for evaluating reputations of wireless networks Grant 9,622,081 - Satish April 11, 2 | 2017-04-11 |
Applying functional classification to tune security policies and posture according to role and likely activity Grant 9,621,585 - Satish , et al. April 11, 2 | 2017-04-11 |
Systems and methods for identifying variants of samples based on similarity analysis Grant 9,571,509 - Satish , et al. February 14, 2 | 2017-02-14 |
Recommended Security Action Feature Sets App 20170013019 - Satish; Sourabh ;   et al. | 2017-01-12 |
Security Action Verification In A Computing Network App 20160352773 - Satish; Sourabh ;   et al. | 2016-12-01 |
Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions Grant 9,385,869 - Satish , et al. July 5, 2 | 2016-07-05 |
Using historical accuracy of user decision making to improve accuracy of predictive modeling based automatic classification Grant 9,373,080 - Satish June 21, 2 | 2016-06-21 |
Learning Based Security Threat Containment App 20160164909 - Satish; Sourabh ;   et al. | 2016-06-09 |
Managing Workflows Upon A Security Incident App 20160164918 - Satish; Sourabh ;   et al. | 2016-06-09 |
Action Recommendations For Computing Assets Based On Enrichment Information App 20160164917 - Friedrichs; Oliver ;   et al. | 2016-06-09 |
Classifying Kill-chains For Security Incidents App 20160164891 - Satish; Sourabh ;   et al. | 2016-06-09 |
Containment Of Security Threats Within A Computing Environment App 20160164908 - Satish; Sourabh ;   et al. | 2016-06-09 |
Management Of Security Actions Based On Computing Asset Classification App 20160164895 - Satish; Sourabh ;   et al. | 2016-06-09 |
Incident Response Automation Engine App 20160164919 - Satish; Sourabh ;   et al. | 2016-06-09 |
Automated Responses To Security Threats App 20160164916 - Satish; Sourabh ;   et al. | 2016-06-09 |
Identifying Related Communication Interactions To A Security Threat In A Computing Environment App 20160164892 - Satish; Sourabh ;   et al. | 2016-06-09 |
Security Actions For Computing Assets Based On Enrichment Information App 20160164907 - Satish; Sourabh ;   et al. | 2016-06-09 |
Detecting malware through package behavior Grant 9,361,460 - Satish June 7, 2 | 2016-06-07 |
Methods and systems for enabling community-tested security features for legacy applications Grant 9,332,033 - Sobel , et al. May 3, 2 | 2016-05-03 |
Systems and methods for identifying uniform resource locators that link to potentially malicious resources Grant 9,330,258 - Satish , et al. May 3, 2 | 2016-05-03 |
Systems and methods for reporting security vulnerabilities Grant 9,323,930 - Satish April 26, 2 | 2016-04-26 |
Systems and methods for establishing reputations of files Grant 9,323,924 - Roundy , et al. April 26, 2 | 2016-04-26 |
Identifying misuse of legitimate objects Grant 9,276,947 - Satish March 1, 2 | 2016-03-01 |
Communication-based reputation system Grant 9,246,931 - Nachenberg , et al. January 26, 2 | 2016-01-26 |
Systems and methods for identifying malicious files Grant 9,245,123 - Satish January 26, 2 | 2016-01-26 |
Method and apparatus for securing confidential data for a user in a computer Grant 9,246,887 - Satish , et al. January 26, 2 | 2016-01-26 |
Application optimization for use based on feature popularity Grant 9,235,390 - Satish , et al. January 12, 2 | 2016-01-12 |
Determining file risk based on security reputation of associated objects Grant 9,231,969 - Satish January 5, 2 | 2016-01-05 |
Educating computer users concerning security threats Grant 9,230,115 - Satish January 5, 2 | 2016-01-05 |
Detecting malicious tampering of web forms Grant 9,230,105 - Satish , et al. January 5, 2 | 2016-01-05 |
Systems and methods for replicating computing system environments Grant 9,223,966 - Satish , et al. December 29, 2 | 2015-12-29 |
Identifying predictive models resistant to concept drift Grant 9,171,253 - Wright , et al. October 27, 2 | 2015-10-27 |
Systems and methods for clustering data samples Grant 9,152,703 - Satish October 6, 2 | 2015-10-06 |
Identifying Misuse Of Legitimate Objects App 20150281268 - Satish; Sourabh | 2015-10-01 |
Techniques for detecting malicious activity Grant 9,141,795 - Satish September 22, 2 | 2015-09-22 |
Calculating domain registrar reputation by analysis of hosted domains Grant 9,130,962 - Hernacki , et al. September 8, 2 | 2015-09-08 |
Systems and methods for determining that uniform resource locators are malicious Grant 9,083,729 - Doshi , et al. July 14, 2 | 2015-07-14 |
Identifying misuse of legitimate objects Grant 9,075,989 - Satish July 7, 2 | 2015-07-07 |
Social trust based security model Grant 9,077,715 - Satish , et al. July 7, 2 | 2015-07-07 |
Systems and methods for directing application updates Grant 9,064,120 - Satish , et al. June 23, 2 | 2015-06-23 |
Techniques for reducing executable code vulnerability Grant 9,058,492 - Satish June 16, 2 | 2015-06-16 |
Techniques for detecting infected websites Grant 8,997,228 - Satish , et al. March 31, 2 | 2015-03-31 |
Detecting malware signed with multiple credentials Grant 8,996,875 - Sobel , et al. March 31, 2 | 2015-03-31 |
Profiling application usage from application streaming Grant 8,977,764 - Ramzan , et al. March 10, 2 | 2015-03-10 |
Method and apparatus for providing connectivity control Grant 8,958,399 - Hernacki , et al. February 17, 2 | 2015-02-17 |
Educating computer users concerning social engineering security threats Grant 8,955,109 - Satish February 10, 2 | 2015-02-10 |
Systems and methods for creating and managing backups based on health information Grant 8,949,187 - Satish , et al. February 3, 2 | 2015-02-03 |
Identifying Misuse Of Legitimate Objects App 20150020197 - Satish; Sourabh | 2015-01-15 |
Systems and methods for determining authorship of an unclassified notification message Grant 8,935,154 - Satish , et al. January 13, 2 | 2015-01-13 |
Systems And Methods For Directing Application Updates App 20150007332 - Satish; Sourabh ;   et al. | 2015-01-01 |
Systems and methods for exonerating untrusted software components Grant 8,918,873 - Satish , et al. December 23, 2 | 2014-12-23 |
Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process Grant 8,914,888 - Satish , et al. December 16, 2 | 2014-12-16 |
Communication-based reputation system Grant 8,904,520 - Nachenberg , et al. December 2, 2 | 2014-12-02 |
Secure network cache content Grant 8,887,277 - Sobel , et al. November 11, 2 | 2014-11-11 |
Evaluating relying parties Grant 8,887,273 - Satish , et al. November 11, 2 | 2014-11-11 |
Techniques For Detecting Malicious Activity App 20140331320 - SATISH; Sourabh | 2014-11-06 |
Method and apparatus for accepting a digital identity of a user based on transitive trust among parties Grant 8,881,253 - Satish , et al. November 4, 2 | 2014-11-04 |
Method and apparatus for identifying an optimal configuration of a resource Grant 8,874,705 - Satish October 28, 2 | 2014-10-28 |
Identity and reputation monitoring Grant 8,868,719 - Satish , et al. October 21, 2 | 2014-10-21 |
Enabling NAC reassessment based on fingerprint change Grant 8,862,730 - Hernacki , et al. October 14, 2 | 2014-10-14 |
Systems and methods for identifying security risks in downloads Grant 8,839,374 - Mehta , et al. September 16, 2 | 2014-09-16 |
Method and apparatus for collaborative claim verification Grant 8,819,413 - Hernacki , et al. August 26, 2 | 2014-08-26 |
Method and apparatus for automating controlled computing environment protection Grant 8,806,651 - Satish , et al. August 12, 2 | 2014-08-12 |
Application streaming and network file system optimization via integration with identity management solutions Grant 8,806,046 - Satish , et al. August 12, 2 | 2014-08-12 |
Application streaming proactive failover Grant 8,799,494 - Ramzan , et al. August 5, 2 | 2014-08-05 |
Method and apparatus for providing identity claim validation Grant 8,788,836 - Hernacki , et al. July 22, 2 | 2014-07-22 |
Data access security Grant 8,788,845 - Satish July 22, 2 | 2014-07-22 |
Classifying Samples Using Clustering App 20140201208 - Satish; Sourabh ;   et al. | 2014-07-17 |
Method and apparatus for securing confidential data for a user in a computer Grant 8,782,403 - Satish , et al. July 15, 2 | 2014-07-15 |
Methods and systems for defragmenting virtual machine prefetch data on physical storage Grant 8,775,716 - Cook , et al. July 8, 2 | 2014-07-08 |
Endpoint management using trust rating data Grant 8,763,076 - Satish , et al. June 24, 2 | 2014-06-24 |
Systems and methods for determining and quantifying the impact of an application on the health of a system Grant 8,762,987 - Satish June 24, 2 | 2014-06-24 |
Methods and systems for processing web content encoded with malicious code Grant 8,745,742 - Satish , et al. June 3, 2 | 2014-06-03 |
Methods And Systems For Enabling Community-tested Security Features For Legacy Applications App 20140143828 - Sobel; William E. ;   et al. | 2014-05-22 |
Methods and systems for enabling community-tested security features for legacy applications Grant 8,713,687 - Sobel , et al. April 29, 2 | 2014-04-29 |
Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing system Grant 8,694,983 - Sobel , et al. April 8, 2 | 2014-04-08 |
Method and system for protecting user identification information Grant 8,689,001 - Satish , et al. April 1, 2 | 2014-04-01 |
Providing installer package information to a user Grant 8,677,346 - Griffin , et al. March 18, 2 | 2014-03-18 |
Systems and methods for looking up anti-malware metadata Grant 8,667,592 - Sobel , et al. March 4, 2 | 2014-03-04 |
Enforcing expected control flow in program execution Grant 8,645,923 - Satish , et al. February 4, 2 | 2014-02-04 |
Altering application behavior based on content provider reputation Grant 8,627,476 - Satish , et al. January 7, 2 | 2014-01-07 |
Systems and methods for user-specific tuning of classification heuristics Grant 8,626,675 - Satish January 7, 2 | 2014-01-07 |
Systems and methods for preventing unauthorized modification of network resources Grant 8,627,407 - Satish , et al. January 7, 2 | 2014-01-07 |
Process boundary isolation using constrained processes Grant 8,607,348 - Satish , et al. December 10, 2 | 2013-12-10 |
User role determination based on content and application classification Grant 8,600,995 - Satish , et al. December 3, 2 | 2013-12-03 |
Techniques for managing search engine results Grant 8,595,211 - Satish November 26, 2 | 2013-11-26 |
Secure network cache content Grant 8,584,234 - Sobel , et al. November 12, 2 | 2013-11-12 |
Optimized application streaming for just in time compiled components Grant 8,578,056 - Satish , et al. November 5, 2 | 2013-11-05 |
Malware detection efficacy by identifying installation and uninstallation scenarios Grant 8,578,345 - Kennedy , et al. November 5, 2 | 2013-11-05 |
Systems and methods for revoking digital signatures Grant 8,572,730 - Sobel , et al. October 29, 2 | 2013-10-29 |
Method and apparatus for identifying a web server Grant 8,566,589 - Satish October 22, 2 | 2013-10-22 |
Method and apparatus for enabling e-mail routing and filtering based on dynamic identities Grant 8,566,401 - Hernacki , et al. October 22, 2 | 2013-10-22 |
Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing Grant 8,533,831 - Satish September 10, 2 | 2013-09-10 |
Method and apparatus for evaluating internet resources using a computer health metric Grant 8,533,842 - Satish September 10, 2 | 2013-09-10 |
Preventing malware from abusing application data Grant 8,499,354 - Satish , et al. July 30, 2 | 2013-07-30 |
Uninstall and system performance based software application reputation Grant 8,499,063 - Satish , et al. July 30, 2 | 2013-07-30 |
Detecting malware through package behavior Grant 8,499,350 - Satish July 30, 2 | 2013-07-30 |
Decision tree induction that is sensitive to attribute computational complexity Grant 8,495,096 - Pereira , et al. July 23, 2 | 2013-07-23 |
Use of interactive messaging channels to verify endpoints Grant 8,490,190 - Hernacki , et al. July 16, 2 | 2013-07-16 |
Enabling efficient use of an endpoint Grant 8,473,924 - Satish , et al. June 25, 2 | 2013-06-25 |
Enforcing digital rights management in a heterogeneous environment Grant 8,468,608 - Hernacki , et al. June 18, 2 | 2013-06-18 |
Method And System For Automatic Application Recommendation App 20130085886 - Satish; Sourabh ;   et al. | 2013-04-04 |
Systems And Methods For Looking Up Anti-malware Metadata App 20120240229 - Sobel; William E. ;   et al. | 2012-09-20 |
Safely Updating Latent Applications to Reduce Attack Surface App 20120054729 - Sobel; William E. ;   et al. | 2012-03-01 |
Systems and Methods for Alternating Malware Classifiers in an Attempt to Frustrate Brute-Force Malware Testing App 20120005750 - Satish; Sourabh | 2012-01-05 |
Behavioral Signature Generation Using Clustering App 20110271341 - Satish; Sourabh ;   et al. | 2011-11-03 |
Methods and Systems for Detecting Man-in-the-Browser Attacks App 20100162393 - Sobel; William E. ;   et al. | 2010-06-24 |
Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications App 20100154027 - Sobel; William E. ;   et al. | 2010-06-17 |
Calculating Domain Registrar Reputation by Analysis of Hosted Domains App 20090328224 - Hernacki; Brian ;   et al. | 2009-12-31 |
System and Method for Prioritizing the Compilation of Bytecode Modules During Installation of a Software Application App 20090249313 - Sobel; William E. ;   et al. | 2009-10-01 |
Providing Image-Based Guidance for Remote Assistance App 20090164899 - HERNACKI; Brian ;   et al. | 2009-06-25 |
Methods And Systems For Creating And Updating Approved-file And Trusted-domain Databases App 20090089290 - Nachenberg; Carey ;   et al. | 2009-04-02 |
Method and apparatus for managing digital identities through a single interface App 20080256594 - Satish; Sourabh ;   et al. | 2008-10-16 |
Method and apparatus for accepting a digital identity of a user based on transitive trust among parties App 20080244722 - Satish; Sourabh ;   et al. | 2008-10-02 |
Detecting suspicious embedded malicious content in benign file formats App 20080010538 - Satish; Sourabh ;   et al. | 2008-01-10 |
Trend analysis based on network admission control fingerprints App 20070233862 - Satish; Sourabh ;   et al. | 2007-10-04 |