loadpatents
name:-0.028548002243042
name:-0.028105974197388
name:-0.0099179744720459
Flowers; John S. Patent Filings

Flowers; John S.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Flowers; John S..The latest application filed is for "configuration management for network activity detectors".

Company Profile
8.25.29
  • Flowers; John S. - San Francisco CA
  • Flowers; John S. - Mission KS
  • Flowers; John S. - Overland Park KS
  • Flowers; John S. - Emeryville CA
  • Flowers; John S. - 8017 Perry Street, #124 Overland Park KS
  • Flowers; John S. - Berkeley CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and method for detecting a compromised computing system
Grant 10,862,923 - Flowers , et al. December 8, 2
2020-12-08
Self-organizing distributed computation grid
Grant 10,701,027 - Flowers , et al.
2020-06-30
Configuration Management For Network Activity Detectors
App 20200014709 - FLOWERS; John S.
2020-01-09
Configuration management for network activity detectors
Grant 10,440,038 - Flowers O
2019-10-08
System And Method For Detecting Network Activity Of Interest
App 20190297099 - FLOWERS; John S.
2019-09-26
System and method for detecting network activity of interest
Grant 10,326,784 - Flowers
2019-06-18
Self-organizing Distributed Computation Grid
App 20190141007 - FLOWERS; John S. ;   et al.
2019-05-09
System And Method For Detecting A Compromised Computing System
App 20190132335 - FLOWERS; John S. ;   et al.
2019-05-02
Configuration Management For Network Activity Detectors
App 20190058716 - FLOWERS; JOHN S.
2019-02-21
System and method for detecting a compromised computing system
Grant 10,182,070 - Flowers , et al. Ja
2019-01-15
Self-organizing distributed computation grid
Grant 10,015,239 - Flowers , et al. July 3, 2
2018-07-03
System And Method For Detecting Network Activity Of Interest
App 20180069877 - FLOWERS; John S.
2018-03-08
Configuration management for network activity detectors
Grant 9,888,018 - Flowers February 6, 2
2018-02-06
System And Method For Detecting A Compromised Computing System
App 20180034830 - FLOWERS; John S. ;   et al.
2018-02-01
System and method for detecting network activity of interest
Grant 9,819,692 - Flowers November 14, 2
2017-11-14
System and method for detecting a compromised computing system
Grant 9,787,713 - Flowers , et al. October 10, 2
2017-10-10
System And Method For Detecting Instruction Sequences Of Interest
App 20170279821 - FLOWERS; John S. ;   et al.
2017-09-28
System And Method For Detecting Network Activity Of Interest
App 20170163667 - FLOWERS; John S.
2017-06-08
System and method for detecting network activity of interest
Grant 9,621,578 - Flowers April 11, 2
2017-04-11
System and method for detecting network activity of interest
Grant 9,548,992 - Flowers January 17, 2
2017-01-17
System And Method For Detecting A Compromised Computing System
App 20160315951 - FLOWERS; John S. ;   et al.
2016-10-27
System and method for detecting a compromised computing system
Grant 9,350,707 - Flowers , et al. May 24, 2
2016-05-24
System And Method For Detecting Network Activity Of Interest
App 20150163230 - Flowers; John S.
2015-06-11
Configuration management for network activity detectors
Grant 9,021,574 - Flowers April 28, 2
2015-04-28
System And Method For Detecting A Compromised Computing System
App 20150020187 - FLOWERS; JOHN S. ;   et al.
2015-01-15
System and method for detecting a compromised computing system
Grant 8,856,324 - Flowers , et al. October 7, 2
2014-10-07
System And Method For Detecting A Compromised Computing System
App 20140215606 - FLOWERS; John S.
2014-07-31
System And Method For Detecting Network Activity Of Interest
App 20130318611 - FLOWERS; John S.
2013-11-28
System and method for detecting network activity of interest
Grant 8,347,391 - Flowers January 1, 2
2013-01-01
Network security system having a device profiler communicatively coupled to a traffic monitor
Grant 8,176,544 - Keanini , et al. May 8, 2
2012-05-08
Network security system having a device profiler communicatively coupled to a traffic monitor
Grant 8,020,211 - Keanini , et al. September 13, 2
2011-09-13
Network Security System Having A Device Profiler Communicatively Coupled To A Traffic Monitor
App 20110131644 - Keanini; Timothy D. ;   et al.
2011-06-02
Novel Systems And Methods For Transmitting Syntactically Accurate Messages Over A Network
App 20100169352 - Flowers; John S. ;   et al.
2010-07-01
Network Security System Having A Device Profiler Communicatively Coupled To A Traffic Monitor
App 20090320138 - Keanini; Timothy D. ;   et al.
2009-12-24
Network security system having a device profiler communicatively coupled to a traffic monitor
Grant 7,594,273 - Keanini , et al. September 22, 2
2009-09-22
Natural language based search engine for handling pronouns and methods of use therefor
Grant 7,555,475 - Quiroga , et al. June 30, 2
2009-06-30
Interoperability of vulnerability and intrusion detection systems
Grant 7,509,681 - Flowers , et al. March 24, 2
2009-03-24
Novel Systems And Methods For Transmitting Syntactically Accurate Messages Over A Network
App 20090077180 - Flowers; John S. ;   et al.
2009-03-19
Natural language based search engine and methods of use therefor
Grant 7,447,683 - Quiroga , et al. November 4, 2
2008-11-04
Telephonic Information Retrieval Systems And Methods
App 20070208732 - Flowers; John S. ;   et al.
2007-09-06
Method and system for identifying sentence boundaries
App 20070192309 - Fischer; Gordon H. ;   et al.
2007-08-16
Novel systems and methods for performing contextual information retrieval
App 20070185859 - Flowers; John S. ;   et al.
2007-08-09
Network Security System Having a Device Profiler Communicatively Coupled to a Traffic Monitor
App 20070143852 - Keanini; Timothy D. ;   et al.
2007-06-21
Interoperability of Vulnerability and Intrusion Detection Systems
App 20070113285 - Flowers; John S. ;   et al.
2007-05-17
Novel information retrieval systems and methods
App 20070078814 - Flowers; John S. ;   et al.
2007-04-05
Network security system having a device profiler communicatively coupled to a traffic monitor
Grant 7,181,769 - Keanini , et al. February 20, 2
2007-02-20
Interoperability of vulnerability and intrusion detection systems
Grant 7,162,742 - Flowers , et al. January 9, 2
2007-01-09
Natural language based search engine and methods of use therefor
App 20060224566 - Flowers; John S. ;   et al.
2006-10-05
Natural language based search engine for handling pronouns and methods of use therefor
App 20060224570 - Quiroga; Martin A. ;   et al.
2006-10-05
Natural language based search engine and methods of use therefor
App 20060224580 - Quiroga; Martin A. ;   et al.
2006-10-05
Natural language based search engine and methods of use therefor
App 20060224569 - DeSanto; John A. ;   et al.
2006-10-05
Method and system for detecting a vulnerability in a network
Grant 7,073,198 - Flowers , et al. July 4, 2
2006-07-04
Interoperability of vulnerability and intrusion detection systems
Grant 6,957,348 - Flowers , et al. October 18, 2
2005-10-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed