loadpatents
name:-0.03937292098999
name:-0.031208038330078
name:-0.013892889022827
Ackerman; Karl Patent Filings

Ackerman; Karl

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ackerman; Karl.The latest application filed is for "application firewall".

Company Profile
9.29.17
  • Ackerman; Karl - Topsfield MA
  • Ackerman; Karl - Boston MA US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Application Firewall
App 20220166794 - Thomas; Andrew J. ;   et al.
2022-05-26
Chain Of Custody For Enterprise Documents
App 20220156399 - Ackerman; Karl ;   et al.
2022-05-19
Dynamic Sandbox Scarecrow For Malware Management
App 20220114257 - McKerchar; Ross ;   et al.
2022-04-14
Chain of custody for enterprise documents
Grant 11,288,385 - Ackerman , et al. March 29, 2
2022-03-29
Application firewall
Grant 11,258,821 - Thomas , et al. February 22, 2
2022-02-22
Data Augmentation For Threat Investigation In An Enterprise Network
App 20210400071 - Ray; Kenneth D. ;   et al.
2021-12-23
Live Discovery Of Enterprise Threats Based On Security Query Activity
App 20210400070 - Ackerman; Karl ;   et al.
2021-12-23
Server-client authentication with integrated status update
Grant 11,184,391 - Thomas , et al. November 23, 2
2021-11-23
Detecting Triggering Events For Distributed Denial Of Service Attacks
App 20210344707 - Ackerman; Karl ;   et al.
2021-11-04
Detecting endpoint compromise based on network usage history
Grant 11,165,797 - Ackerman , et al. November 2, 2
2021-11-02
Detecting triggering events for distributed denial of service attacks
Grant 11,102,238 - Ackerman , et al. August 24, 2
2021-08-24
Local proxy detection
Grant 10,986,109 - Howard , et al. April 20, 2
2021-04-20
Enterprise Network Threat Detection
App 20200304528 - Ackerman; Karl ;   et al.
2020-09-24
Chain Of Custody For Enterprise Documents
App 20190318128 - Ackerman; Karl ;   et al.
2019-10-17
Tracking Usage Of Corporate Credentials
App 20190149574 - Thomas; Andrew J. ;   et al.
2019-05-16
Server-client Authentication With Integrated Status Update
App 20190124098 - Thomas; Andrew J. ;   et al.
2019-04-25
Multi-factor Authentication
App 20190123904 - Ackerman; Karl ;   et al.
2019-04-25
Server-client Authentication With Integrated Status Update
App 20190124047 - Thomas; Andrew J. ;   et al.
2019-04-25
Application Firewall
App 20190124042 - Thomas; Andrew J. ;   et al.
2019-04-25
Local Proxy Detection
App 20170310693 - Howard; Fraser ;   et al.
2017-10-26
Detecting Endpoint Compromise Based On Network Usage History
App 20170310692 - Ackerman; Karl ;   et al.
2017-10-26
Detecting Triggering Events For Distributed Denial Of Service Attacks
App 20170310703 - Ackerman; Karl ;   et al.
2017-10-26
Randomly skewing secret values as a countermeasure to compromise
Grant 9,525,551 - Ackerman , et al. December 20, 2
2016-12-20
User authentication
Grant 9,305,153 - Ackerman , et al. April 5, 2
2016-04-05
Managing security and wireless signal detection
Grant 9,240,986 - Ackerman , et al. January 19, 2
2016-01-19
Localized risk analytics for user authentication
Grant 9,160,742 - Ackerman , et al. October 13, 2
2015-10-13
Near field communication based authentication
Grant 9,119,069 - Vipond , et al. August 25, 2
2015-08-25
Managing predictions in data security systems
Grant 9,038,134 - Ackerman , et al. May 19, 2
2015-05-19
System and method providing disconnected authentication
Grant 8,966,276 - Nanopoulos , et al. February 24, 2
2015-02-24
Knowledge based authentication using recent user internet activity
Grant 8,955,066 - Ackerman , et al. February 10, 2
2015-02-10
Brokering multiple authentications through a single proxy
Grant 8,949,953 - Khitrenovich , et al. February 3, 2
2015-02-03
Device presence validation
Grant 8,918,844 - Friedman , et al. December 23, 2
2014-12-23
Mitigating conformational bias in authentication systems
Grant 8,902,043 - Ackerman , et al. December 2, 2
2014-12-02
Authentication using privacy protected personally identifiable information
Grant 8,800,027 - Ackerman August 5, 2
2014-08-05
Processorless token for producing a one-time password
Grant 8,752,148 - Vipond , et al. June 10, 2
2014-06-10
Defeating real-time trojan login attack with delayed interaction with fraudster
Grant 8,452,980 - Black , et al. May 28, 2
2013-05-28
System and method providing disconnected authentication
App 20050166263 - Nanopoulos, Andrew ;   et al.
2005-07-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed