loadpatents
name:-0.082648992538452
name:-0.2266480922699
name:-0.038827896118164
Friedrichs; Oliver Patent Filings

Friedrichs; Oliver

Patent Applications and Registrations

Patent applications and USPTO patent grants for Friedrichs; Oliver.The latest application filed is for "modifying incident response time periods based on incident volume".

Company Profile
32.50.54
  • Friedrichs; Oliver - Woodside CA
  • Friedrichs; Oliver - Menlo Park CA
  • Friedrichs; Oliver - Monchengladbach DE
  • Friedrichs; Oliver - San Jose CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Identifying automated responses to security threats based on obtained communication interactions
Grant 11,323,472 - Satish , et al. May 3, 2
2022-05-03
Modifying Incident Response Time Periods Based On Incident Volume
App 20220053017 - Satish; Sourabh ;   et al.
2022-02-17
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data
App 20210385123 - Friedrichs; Oliver ;   et al.
2021-12-09
Modifying incident response time periods based on containment action effectiveness
Grant 11,190,539 - Satish , et al. November 30, 2
2021-11-30
Containment of security threats within a computing environment
Grant 11,165,812 - Satish , et al. November 2, 2
2021-11-02
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating
App 20210314347 - Satish; Sourabh ;   et al.
2021-10-07
Anonymizing action implementation data obtained from incident analysis systems
Grant 11,133,977 - Friedrichs , et al. September 28, 2
2021-09-28
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments
App 20210281601 - Satish; Sourabh ;   et al.
2021-09-09
Generating Action Recommendations For Courses Of Action Used For Incident Response
App 20210281602 - Friedrichs; Oliver ;   et al.
2021-09-09
Translating Security Actions Into Computing Asset-specific Action Procedures
App 20210258340 - SATISH; Sourabh ;   et al.
2021-08-19
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat
App 20210250373 - SATISH; Sourabh ;   et al.
2021-08-12
Dynamic generation of courses of action for incident response in an information technology environment
Grant 11,038,915 - Friedrichs , et al. June 15, 2
2021-06-15
Identifying security actions for responding to security threats based on threat state information
Grant 11,025,664 - Satish , et al. June 1, 2
2021-06-01
Graphical interface for incident response automation
Grant 11,019,093 - Satish , et al. May 25, 2
2021-05-25
Learning based security threat containment
Grant 11,019,092 - Satish , et al. May 25, 2
2021-05-25
Identifying Recommended Feature Sets Based On Application Feature Popularity
App 20210144182 - Satish; Sourabh ;   et al.
2021-05-13
Selecting actions responsive to computing environment incidents based on action impact information
Grant 10,986,120 - Satish , et al. April 20, 2
2021-04-20
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20210092152 - Satish; Sourabh ;   et al.
2021-03-25
Identifying Automated Response Actions Based On Asset Classification
App 20210084066 - Satish; Sourabh ;   et al.
2021-03-18
Dynamically updating feature set recommendation databases
Grant 10,904,295 - Satish , et al. January 26, 2
2021-01-26
Management of actions in a computing environment based on asset classification
Grant 10,855,718 - Satish , et al. December 1, 2
2020-12-01
Identifying related communication interactions to a security threat in a computing environment
Grant 10,834,120 - Satish , et al. November 10, 2
2020-11-10
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems
App 20200344113 - Friedrichs; Oliver ;   et al.
2020-10-29
Dynamically updating feature set recommendation databases
App 20200344268 - Satish; Sourabh ;   et al.
2020-10-29
Identifying Security Actions For Responding To Security Threats Based On Threat State Information
App 20200287930 - SATISH; Sourabh ;   et al.
2020-09-10
Identifying Security Actions Based On Computing Asset Relationship Data
App 20200259858 - A1
2020-08-13
Generating action suggestions based on anonymized data from multiple information technology environments
Grant 10,742,484 - Friedrichs , et al. A
2020-08-11
Modifying Incident Response Time Periods Based On Containment Action Effectiveness
App 20200213348 - Satish; Sourabh ;   et al.
2020-07-02
Identifying recommended feature sets for software under development
Grant 10,630,727 - Satish , et al.
2020-04-21
Incident response management based on asset configurations in a computing environment
Grant 10,616,264 - Friedrichs , et al.
2020-04-07
Determining security actions for security threats using enrichment information
Grant 10,567,424 - Satish , et al. Feb
2020-02-18
Incident response management based on environmental characteristics
Grant 10,554,687 - Satish , et al. Fe
2020-02-04
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information
App 20200007574 - Satish; Sourabh ;   et al.
2020-01-02
Graphical Interface For Incident Response Automation
App 20190373013 - SATISH; Sourabh ;   et al.
2019-12-05
Security actions for computing assets based on enrichment information
Grant 10,476,905 - Satish , et al. Nov
2019-11-12
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 10,437,997 - Friedrichs , et al. O
2019-10-08
Translating security actions to action procedures in an advisement system
Grant 10,425,441 - Satish , et al. Sept
2019-09-24
Implementing security actions in an advisement system based on obtained software characteristics
Grant 10,425,440 - Satish , et al. Sept
2019-09-24
Identifying Recommended Feature Sets For Software Under Development
App 20190253459 - Satish; Sourabh ;   et al.
2019-08-15
Recommended security action feature sets
Grant 10,320,845 - Satish , et al.
2019-06-11
Managing security actions in a computing environment based on communication activity of a security threat
Grant 10,193,920 - Satish , et al. Ja
2019-01-29
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat
App 20190020677 - SATISH; Sourabh ;   et al.
2019-01-17
Incident Response Automation Engine
App 20190014144 - SATISH; Sourabh ;   et al.
2019-01-10
Incident Response Automation Engine
App 20190007448 - SATISH; Sourabh ;   et al.
2019-01-03
Incident response using asset configuration data
Grant 10,158,663 - Satish , et al. Dec
2018-12-18
Management Of Actions In A Computing Environment Based On Asset Classification
App 20180332074 - Satish; Sourabh ;   et al.
2018-11-15
Security Actions For Computing Assets Based On Enrichment Information
App 20180316718 - Satish; Sourabh ;   et al.
2018-11-01
Management of administrative incident response based on environmental characteristics associated with a security incident
Grant 10,116,687 - Satish , et al. October 30, 2
2018-10-30
Management of security actions based on computing asset classification
Grant 10,063,587 - Satish , et al. August 28, 2
2018-08-28
Classifying Kill-chains For Security Incidents
App 20180159893 - Satish; Sourabh ;   et al.
2018-06-07
Managing Workflows Upon A Security Incident
App 20180124100 - Satish; Sourabh ;   et al.
2018-05-03
Security actions for computing assets based on enrichment information
Grant 9,954,888 - Satish , et al. April 24, 2
2018-04-24
Classifying kill-chains for security incidents
Grant 9,888,029 - Satish , et al. February 6, 2
2018-02-06
Managing workflows upon a security incident
Grant 9,871,818 - Satish , et al. January 16, 2
2018-01-16
Incident Response Automation Engine
App 20180013785 - Satish; Sourabh ;   et al.
2018-01-11
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20170308700 - Friedrichs; Oliver ;   et al.
2017-10-26
Incident response automation engine
Grant 9,762,607 - Satish , et al. September 12, 2
2017-09-12
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 9,747,445 - Friedrichs , et al. August 29, 2
2017-08-29
Automated responses to security threats
Grant 9,712,555 - Satish , et al. July 18, 2
2017-07-18
Method and apparatus for retroactively detecting malicious or otherwise undesirable software
Grant 9,639,697 - Friedrichs , et al. May 2, 2
2017-05-02
Recommended Security Action Feature Sets
App 20170013019 - Satish; Sourabh ;   et al.
2017-01-12
Security Action Verification In A Computing Network
App 20160352773 - Satish; Sourabh ;   et al.
2016-12-01
Classifying Kill-chains For Security Incidents
App 20160164891 - Satish; Sourabh ;   et al.
2016-06-09
Action Recommendations For Computing Assets Based On Enrichment Information
App 20160164917 - Friedrichs; Oliver ;   et al.
2016-06-09
Management Of Security Actions Based On Computing Asset Classification
App 20160164895 - Satish; Sourabh ;   et al.
2016-06-09
Incident Response Automation Engine
App 20160164919 - Satish; Sourabh ;   et al.
2016-06-09
Containment Of Security Threats Within A Computing Environment
App 20160164908 - Satish; Sourabh ;   et al.
2016-06-09
Learning Based Security Threat Containment
App 20160164909 - Satish; Sourabh ;   et al.
2016-06-09
Automated Responses To Security Threats
App 20160164916 - Satish; Sourabh ;   et al.
2016-06-09
Managing Workflows Upon A Security Incident
App 20160164918 - Satish; Sourabh ;   et al.
2016-06-09
Security Actions For Computing Assets Based On Enrichment Information
App 20160164907 - Satish; Sourabh ;   et al.
2016-06-09
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20160164892 - Satish; Sourabh ;   et al.
2016-06-09
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20160098560 - Friedrichs; Oliver ;   et al.
2016-04-07
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 9,245,120 - Friedrichs , et al. January 26, 2
2016-01-26
Method and apparatus for detecting malicious software through contextual convictions
Grant 9,218,461 - Friedrichs , et al. December 22, 2
2015-12-22
Method and apparatus for detecting malicious software using machine learning techniques
Grant 9,203,854 - Friedrichs , et al. December 1, 2
2015-12-01
Method and apparatus for detecting malicious software using generic signatures
Grant 9,100,425 - Friedrichs , et al. August 4, 2
2015-08-04
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software
App 20150205959 - Friedrichs; Oliver ;   et al.
2015-07-23
Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques
Grant 9,088,601 - Friedrichs , et al. July 21, 2
2015-07-21
Method and apparatus for retroactively detecting malicious or otherwise undesirable software
Grant 8,978,137 - Friedrichs , et al. March 10, 2
2015-03-10
Method and Apparatus for Detecting Malicious Software Using Machine Learning Techniques
App 20150026810 - Friedrichs; Oliver ;   et al.
2015-01-22
Method and apparatus for detecting malicious software using machine learning techniques
Grant 8,875,286 - Friedrichs , et al. October 28, 2
2014-10-28
Method and Apparatus for Identifying Computing Resource Trajectory
App 20140188986 - Levy; Elias ;   et al.
2014-07-03
Method and Apparatus for Retroactively Detecting Malicious or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20140165203 - FRIEDRICHS; Oliver ;   et al.
2014-06-12
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software
App 20130276114 - FRIEDRICHS; Oliver ;   et al.
2013-10-17
Method and apparatus for monitoring communications from a communications device
Grant 8,555,379 - Whitehouse , et al. October 8, 2
2013-10-08
Method And Apparatus For Detecting Malicious Software Through Contextual Convictions
App 20130139261 - FRIEDRICHS; OLIVER ;   et al.
2013-05-30
Detecting fraudulent web sites through an obfuscated reporting mechanism
Grant 8,341,737 - Ramzan , et al. December 25, 2
2012-12-25
Method And Apparatus For Detecting Malicious Software Using Machine Learning Techniques
App 20120227105 - FRIEDRICHS; OLIVER ;   et al.
2012-09-06
Method And Apparatus For Detecting Malicious Software Through Contextual Convictions, Generic Signatures And Machine Learning Techniques
App 20120210423 - FRIEDRICHS; OLIVER ;   et al.
2012-08-16
Method And Apparatus For Detecting Malicious Software Using Generic Signatures
App 20120210422 - FRIEDRICHS; OLIVER ;   et al.
2012-08-16
Detecting email fraud through fingerprinting
Grant 8,103,875 - Ramzan , et al. January 24, 2
2012-01-24
Automated Computer System Security Compromise
App 20070204347 - Caceres; Maximiliano Gerardo ;   et al.
2007-08-30
Textile product with improved abrasion resistance and process for the production thereof
App 20070054578 - Hoersch; Werner ;   et al.
2007-03-08
System and method for building an executable script for performing a network security audit
Grant 6,636,972 - Ptacek , et al. October 21, 2
2003-10-21
Early warning system for network attacks
App 20030084349 - Friedrichs, Oliver ;   et al.
2003-05-01
System and method providing custom attack simulation language for testing networks
Grant 6,343,362 - Ptacek , et al. January 29, 2
2002-01-29

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed