loadpatents
name:-0.017302989959717
name:-0.014715909957886
name:-0.0028109550476074
Danahy; John J. Patent Filings

Danahy; John J.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Danahy; John J..The latest application filed is for "continuous malicious software identification through responsive machine learning".

Company Profile
2.12.13
  • Danahy; John J. - Bow NH
  • Danahy; John J. - Canton MA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Continuous malicious software identification through responsive machine learning
Grant 10,460,104 - Berg , et al. Oc
2019-10-29
Method and apparatus for hypervisor based monitoring of system interactions
Grant 10,198,280 - Swidowski , et al. Fe
2019-02-05
Continuous Malicious Software Identification Through Responsive Machine Learning
App 20190026462 - Berg; Ryan J. ;   et al.
2019-01-24
Continuous malicious software identification through responsive machine learning
Grant 10,078,752 - Berg , et al. September 18, 2
2018-09-18
Continuous Malicious Software Identification Through Responsive Machine Learning
App 20180189484 - Danahy; John J. ;   et al.
2018-07-05
Malicious software identification integrating behavioral analytics and hardware events
Grant 9,977,895 - Danahy , et al. May 22, 2
2018-05-22
Method and apparatus for SYSRET monitoring of system interactions
Grant 9,733,976 - Swidowski , et al. August 15, 2
2017-08-15
Method and Apparatus for Hypervisor Based Monitoring of System Interactions
App 20170168865 - Swidowski; Kirk R. ;   et al.
2017-06-15
Method and Apparatus for Sysret Monitoring of System Interactions
App 20170109189 - Swidowski; Kirk R. ;   et al.
2017-04-20
Method and apparatus for hypervisor based monitoring of system interactions
Grant 9,589,132 - Swidowski , et al. March 7, 2
2017-03-07
Method and Apparatus for Hypervisor Based Monitoring of System Interactions
App 20160224786 - Swidowski; Kirk R. ;   et al.
2016-08-04
Malicious Software Identification Integrating Behavioral Analytics and Hardware Events
App 20150281267 - Danahy; John J. ;   et al.
2015-10-01
Behavioral Analytics Driven Host-based Malicious Behavior And Data Exfiltration Disruption
App 20150205962 - Swidowski; Kirk R. ;   et al.
2015-07-23
Method and system for detecting vulnerabilities in source code
Grant 8,156,483 - Berg , et al. April 10, 2
2012-04-10
Method And System For Detecting Vulnerabilities In Source Code
App 20080263525 - BERG; Ryan James ;   et al.
2008-10-23
Method and system for detecting privilege escalation vulnerabilities in source code
Grant 7,418,734 - Berg , et al. August 26, 2
2008-08-26
Method and system for detecting race condition vulnerabilities in source code
Grant 7,398,516 - Berg , et al. July 8, 2
2008-07-08
Method and system for detecting vulnerabilities in source code
Grant 7,398,517 - Berg , et al. July 8, 2
2008-07-08
Method And System For Detecting Vulnerabilities In Source Code
App 20070234304 - BERG; Ryan JAMES ;   et al.
2007-10-04
Method and system for detecting vulnerabilities in source code
Grant 7,240,332 - Berg , et al. July 3, 2
2007-07-03
Method and system for detecting privilege escalation vulnerabilities in source code
App 20050010806 - Berg, Ryan James ;   et al.
2005-01-13
Method and system for detecting vulnerabilities in source code
App 20040260940 - Berg, Ryan James ;   et al.
2004-12-23
Method and system for detecting race condition vulnerabilities in source code
App 20040255277 - Berg, Ryan James ;   et al.
2004-12-16
Secure remote kernel communication
App 20010044904 - Berg, Ryan J. ;   et al.
2001-11-22
Service-centric monitoring system and method for monitoring of distributed services in a computing network
Grant 5,758,077 - Danahy , et al. May 26, 1
1998-05-26

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed