Patent | Date |
---|
Systems and methods for detecting security incidents Grant 10,530,805 - Tamersoy , et al. J | 2020-01-07 |
Systems and methods for remediating computer reliability issues Grant 10,339,308 - Hart , et al. | 2019-07-02 |
Systems and methods for anonymizing log entries Grant 10,326,772 - Spertus , et al. | 2019-06-18 |
Methods and systems for creating and updating approved-file and trusted-domain databases Grant 9,959,404 - Nachenberg , et al. May 1, 2 | 2018-05-01 |
Method and apparatus for inferring realworld identities Grant 9,934,541 - Spertus April 3, 2 | 2018-04-03 |
Detection of security incidents with low confidence security events Grant 9,888,024 - Roundy , et al. February 6, 2 | 2018-02-06 |
Method, apparatus and system for protecting identity information Grant 9,781,159 - Hernacki , et al. October 3, 2 | 2017-10-03 |
Systems And Methods For Anonymizing Log Entries App 20170149793 - Spertus; Michael ;   et al. | 2017-05-25 |
Detection Of Security Incidents With Low Confidence Security Events App 20170093902 - ROUNDY; Kevin ;   et al. | 2017-03-30 |
Techniques for detecting an intranet spoofing attack Grant 9,578,057 - Spertus February 21, 2 | 2017-02-21 |
Systems and methods for discouraging polymorphic malware Grant 9,189,629 - Nachenburg , et al. November 17, 2 | 2015-11-17 |
Method and apparatus for monitoring an online identity of a user on a network Grant 8,978,116 - Spertus , et al. March 10, 2 | 2015-03-10 |
Systems and methods for using virtualization to implement information rights management Grant 8,938,808 - Spertus , et al. January 20, 2 | 2015-01-20 |
Method and apparatus for preventing accidential disclosure of confidential information via visual representation objects Grant 8,732,821 - Spertus May 20, 2 | 2014-05-20 |
Method and apparatus for monitoring identity misrepresentation by a user on a network Grant 8,510,845 - Spertus August 13, 2 | 2013-08-13 |
Systems and methods for identifying data files based on community data Grant 8,458,232 - Spertus , et al. June 4, 2 | 2013-06-04 |
Method and apparatus for preventing sensitive data leakage due to input focus misappropriation Grant 8,392,992 - Spertus March 5, 2 | 2013-03-05 |
Systems and methods for managing rights of data via dynamic taint analysis Grant 8,260,711 - Wawda , et al. September 4, 2 | 2012-09-04 |
Methods and systems for detecting rootkits Grant 8,230,500 - Spertus , et al. July 24, 2 | 2012-07-24 |
Systems and methods for temporarily adjusting control settings on computing devices Grant 8,201,224 - Spertus June 12, 2 | 2012-06-12 |
Component-level sandboxing Grant 8,180,893 - Spertus May 15, 2 | 2012-05-15 |
Restricting access to network resources through recursive URL classification Grant 8,176,079 - Spertus May 8, 2 | 2012-05-08 |
Malware detection using a white list Grant 8,001,606 - Spertus August 16, 2 | 2011-08-16 |
Utilizing early exclusive volume access and direct volume manipulation to remove protected files Grant 7,926,106 - Kennedy , et al. April 12, 2 | 2011-04-12 |
Leveraging client redundancy on restore Grant 7,827,145 - Spertus , et al. November 2, 2 | 2010-11-02 |
Methods And Systems For Creating And Updating Approved-file And Trusted-domain Databases App 20090089290 - Nachenberg; Carey ;   et al. | 2009-04-02 |
Incremental garbage collector with decommit barrier Grant 6,055,612 - Spertus , et al. April 25, 2 | 2000-04-25 |