Patent applications and USPTO patent grants for Acalvio Technologies, Inc..The latest application filed is for "tunneling for network deceptions".
Patent | Date |
---|---|
Tunneling for network deceptions Grant 11,212,315 - Wu , et al. December 28, 2 | 2021-12-28 |
Deception mechanisms in containerized environments Grant 10,972,503 - Mohan , et al. April 6, 2 | 2021-04-06 |
Tunneling For Network Deceptions App 20210021640 - Wu; Johnson ;   et al. | 2021-01-21 |
Tunneling for network deceptions Grant 10,616,276 - Wu , et al. | 2020-04-07 |
Testing environment cyber vaccine Grant 10,419,479 - Gopalakrishna Sept | 2019-09-17 |
Enterprise DNS analysis Grant 10,362,057 - Wu | 2019-07-23 |
Responsive deception mechanisms Grant 10,348,763 - Gopalakrishna , et al. July 9, 2 | 2019-07-09 |
Deception System App 20190199748 - Gopalakrishna; Rajendra A. | 2019-06-27 |
Dynamic security mechanisms for mixed networks Grant 10,326,796 - Varadarajan , et al. | 2019-06-18 |
Multiphase threat analysis and correlation engine Grant 10,270,789 - Singh | 2019-04-23 |
Using high-interaction networks for targeted threat intelligence Grant 10,230,745 - Singh , et al. | 2019-03-12 |
Immunizing network devices using a malware marker Grant 10,218,741 - Gopalakrishna Feb | 2019-02-26 |
Network intrusion diversion using a software defined network Grant 10,193,924 - Wu , et al. Ja | 2019-01-29 |
Tunneling For Network Deceptions App 20180351996 - Wu; Johnson ;   et al. | 2018-12-06 |
Command and control cyber vaccine Grant 10,104,120 - Gopalakrishna October 16, 2 | 2018-10-16 |
Threat engagement and deception escalation Grant 10,033,762 - Wu , et al. July 24, 2 | 2018-07-24 |
Cyber Vaccines And Antibodies App 20180198801 - Gopalakrishna; Rajendra A. | 2018-07-12 |
Cyber Vaccines And Antibodies App 20180198806 - Gopalakrishna; Rajendra A. | 2018-07-12 |
Immunizing Network Devices Using A Malware Marker App 20180198821 - Gopalakrishna; Rajendra A. | 2018-07-12 |
Deception to detect network scans Grant 9,985,988 - Gukal , et al. May 29, 2 | 2018-05-29 |
Tunneling for network deceptions Grant 9,979,750 - Wu , et al. May 22, 2 | 2018-05-22 |
Systems and methods for detecting and tracking adversary trajectory Grant 9,961,099 - Singh , et al. May 1, 2 | 2018-05-01 |
Context-aware knowledge system and methods for deploying deception mechanisms Grant 9,853,999 - Singh , et al. December 26, 2 | 2017-12-26 |
Deception to Detect Network Scans App 20170353491 - Gukal; Sreenivas ;   et al. | 2017-12-07 |
Systems and methods for identifying similar hosts Grant 9,836,512 - Singh , et al. December 5, 2 | 2017-12-05 |
Systems And Methods For Identifying Similar Hosts App 20170329783 - Singh; Satnam ;   et al. | 2017-11-16 |
Context-Aware Knowledge System and Methods for Deploying Deception Mechanisms App 20170318053 - Singh; Satnam ;   et al. | 2017-11-02 |
Tunneling For Network Deceptions App 20170310706 - Wu; Johnson ;   et al. | 2017-10-26 |
Responsive Deception Mechanisms App 20170310705 - Gopalakrishna; Rajendra A. ;   et al. | 2017-10-26 |
Threat Engagement And Deception Escalation App 20170310704 - Wu; Johnson ;   et al. | 2017-10-26 |
Systems and Methods for Detecting and Tracking Adversary Trajectory App 20170302691 - Singh; Satnam ;   et al. | 2017-10-19 |
Infiltration Detection and Network Rerouting App 20170289191 - Thioux; Emmanuel ;   et al. | 2017-10-05 |
Alternate files returned for suspicious processes in a compromised computer network Grant 9,773,109 - Zhang , et al. September 26, 2 | 2017-09-26 |
Active Deception System App 20170264639 - Sama; Venkata Babji ;   et al. | 2017-09-14 |
Dynamic hiding of deception mechanism Grant 9,756,075 - Gopalakrishna , et al. September 5, 2 | 2017-09-05 |
Network infrastructure obfuscation Grant 9,729,567 - Silva , et al. August 8, 2 | 2017-08-08 |
Classifying An Email As Malicious App 20170223034 - Singh; Abhishek ;   et al. | 2017-08-03 |
Multiphase Threat Analysis And Correlation Engine App 20170223046 - Singh; Abhishek | 2017-08-03 |
Using High-interaction Networks For Targeted Threat Intelligence App 20170223037 - Singh; Abhishek ;   et al. | 2017-08-03 |
Detecting Security Threats By Combining Deception Mechanisms And Data Science App 20170214708 - Gukal; Sreenivas ;   et al. | 2017-07-27 |
Alternate Files Returned For Suspicious Processes In A Compromised Computer Network App 20170206349 - Zhang; Yadong ;   et al. | 2017-07-20 |
Network stimulation engine Grant 9,680,867 - Hughes , et al. June 13, 2 | 2017-06-13 |
Modification of a Server to Mimic a Deception Mechanism App 20170149825 - Gukal; Sreenivas ;   et al. | 2017-05-25 |
Dynamic Security Mechanisms App 20170093910 - Gukal; Sreenivas ;   et al. | 2017-03-30 |
Alternate files returned for suspicious processes in a compromised computer network Grant 9,576,145 - Zhang , et al. February 21, 2 | 2017-02-21 |
Network Infrastructure Obfuscation App 20160234236 - Silva; Steven M. ;   et al. | 2016-08-11 |
Network infrastructure obfuscation Grant 9,350,751 - Silva , et al. May 24, 2 | 2016-05-24 |
NCAGE Code | 83AG8 | ACALVIO TECHNOLOGIES, INC. |
CAGE Code | 83AG8 | ACALVIO TECHNOLOGIES, INC. |
S.A.M. Registration | 83AG8 [80239972] | ACALVIO TECHNOLOGIES, INC. |
DUNS | 080239972 | Acalvio Technologies, Inc. |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.