Issued Patents

  1. Atomic detection and repair of kernel memory

  2. System and method for below-operating system trapping and securing loading of code into memory

  3. Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation

  4. System and method for below-operating system regulation and control of self-modifying code

  5. System and method for firmware based anti-malware security

  6. System and method for securing memory and storage of an electronic device with a below-operating system security agent

  7. Method and system for discrete stateful behavioral analysis

  8. System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system

  9. System and method for providing a secured operating system execution environment

  10. System and method for below-operating system trapping and securing loading of code into memory

  11. System and method for below-operating system trapping of driver filter attachment

  12. System and method for below-operating system trapping of driver loading and unloading

  13. System and method for securing an input/output path of an application against malware with a below-operating system security agent

  14. System and method for below-operating system trapping and securing of interdriver communication

  15. Method and system for proactive detection of malicious shared libraries via a remote reputation system

  16. System and method for below-operating system modification of malicious code on an electronic device

  17. System and method for securing access to system calls

  18. System, method and computer program product for inserting an emulation layer in association with a COM server DLL

  19. Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation

  20. System and method for below-operating system regulation and control of self-modifying code

  21. System and method for below-operating system protection of an operating system kernel

  22. System and method for protecting and securing storage devices using below-operating system trapping

  23. System, method, and computer program product for terminating a hidden kernel process

  24. Systems and methods for identifying hidden processes

  25. Systems and method for regulating software access to security-sensitive processor resources

  26. System, method, and computer program product for populating a list of known wanted data

  27. System and method for proactive detection and repair of malware memory infection via a remote memory reputation system

  28. System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity

  29. System, method and computer program product for sending unwanted activity information to a central system

  30. Method and system for discrete stateful behavioral analysis

  31. System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object

  32. System, method, and computer program product for copying a modified page table entry to a translation look aside buffer

  33. Method and system for detecting windows rootkit that modifies the kernel mode system service dispatch table

  34. Robustly regulating access to executable class registry entries

  35. System, method, and computer program product for terminating a hidden kernel process

  36. Using mobility tokens to observe malicious mobile code

  37. Behavioral analysis apparatus and associated method that utilizes a system selected based on a level of data

  38. Monitoring and controlling services

  39. Regulating remote registry access over a computer network

  40. Using behavior blocking mobility tokens to facilitate distributed worm detection

  41. Method and system for the detection of file system filter driver based rootkits

  42. Lightweight hooking mechanism for kernel level operations

  43. Detecting computer worms as they arrive at local computers through open network shares

  44. System and method for correlating network traffic and corresponding file input/output traffic

  45. Using mobility tokens to observe malicious mobile code

  46. Duplicating handles of target processes without having debug privileges

  • linkedin
  • twitter

Cupertino, CA, USA

  • linkedin
  • twitter

©2016-2017 All Rights Reserved, DeepSAFE Technology