loadpatents
name:-0.16343593597412
name:-0.031681060791016
name:-0.014142990112305
Harris; Mark D. Patent Filings

Harris; Mark D.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Harris; Mark D..The latest application filed is for "intrusion detection with honeypot keys".

Company Profile
9.23.22
  • Harris; Mark D. - Oxon GB
  • Harris; Mark D. - Banbury GB
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Intrusion Detection With Honeypot Keys
App 20210344715 - Schutz; Harald ;   et al.
2021-11-04
Intrusion detection with honeypot keys
Grant 11,089,056 - Schutz , et al. August 10, 2
2021-08-10
Normalized indications of compromise
Grant 10,841,339 - Ray , et al. November 17, 2
2020-11-17
Using indications of compromise for reputation based network security
Grant 10,778,725 - Ray , et al. Sept
2020-09-15
Method for conditionally hooking endpoint processes with a security agent
Grant 10,728,269 - Watkiss , et al.
2020-07-28
Labeling computing objects for improved threat detection
Grant 10,673,902 - Thomas , et al.
2020-06-02
Intrusion Detection With Honeypot Keys
App 20200106808 - Schutz; Harald ;   et al.
2020-04-02
Context-dependent timeout for remote security services
Grant 10,594,717 - Watkiss , et al.
2020-03-17
Labeling objects on an endpoint for encryption management
Grant 10,558,800 - Ray , et al. Feb
2020-02-11
Method For Conditionally Hooking Endpoint Processes With A Security Agent
App 20190342313 - Watkiss; Neil Robert Tyndale ;   et al.
2019-11-07
Context-dependent Timeout For Remote Security Services
App 20190342312 - Watkiss; Neil Robert Tyndale ;   et al.
2019-11-07
Server drift monitoring
Grant 10,447,708 - Thomas , et al. Oc
2019-10-15
Threat detection using a time-based cache of reputation information on an enterprise endpoint
Grant 10,382,459 - Harris , et al. A
2019-08-13
Using Indications Of Compromise For Reputation Based Network Security
App 20190149580 - Ray; Kenneth D. ;   et al.
2019-05-16
Using indications of compromise for reputation based network security
Grant 10,225,286 - Ray , et al.
2019-03-05
Using Indications Of Compromise For Reputation Based Network Security
App 20180324220 - Ray; Kenneth D. ;   et al.
2018-11-08
Server Drift Monitoring
App 20180309771 - Thomas; Andrew J. ;   et al.
2018-10-25
Labeling Objects On An Endpoint For Encryption Management
App 20180276378 - Ray; Kenneth D. ;   et al.
2018-09-27
Normalized Indications Of Compromise
App 20180278650 - Ray; Kenneth D. ;   et al.
2018-09-27
Labeling Computing Objects For Improved Threat Detection
App 20180278649 - Thomas; Andrew J. ;   et al.
2018-09-27
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint
App 20180278631 - Harris; Mark D. ;   et al.
2018-09-27
Server drift monitoring
Grant 10,038,702 - Thomas , et al. July 31, 2
2018-07-31
Using indications of compromise for reputation based network security
Grant 9,992,228 - Ray , et al. June 5, 2
2018-06-05
Normalized indications of compromise
Grant 9,967,283 - Ray , et al. May 8, 2
2018-05-08
Labeling objects on an endpoint for encryption management
Grant 9,965,627 - Ray , et al. May 8, 2
2018-05-08
Labeling computing objects for improved threat detection
Grant 9,967,282 - Thomas , et al. May 8, 2
2018-05-08
Threat detection using a time-based cache of reputation information on an enterprise endpoint
Grant 9,967,264 - Harris , et al. May 8, 2
2018-05-08
Server Drift Monitoring
App 20170346835 - Thomas; Andrew J. ;   et al.
2017-11-30
Server drift monitoring
Grant 9,774,613 - Thomas , et al. September 26, 2
2017-09-26
Threat detection using reputation data
Grant 9,740,859 - Harris , et al. August 22, 2
2017-08-22
Threat detection using endpoint variance
Grant 9,571,512 - Ray , et al. February 14, 2
2017-02-14
Threat Detection Using Reputation Data
App 20160350531 - Harris; Mark D. ;   et al.
2016-12-01
Threat detection using URL cache hits
Grant 9,419,989 - Harris , et al. August 16, 2
2016-08-16
Threat Detection Using Url Cache Hits
App 20160173510 - Harris; Mark D. ;   et al.
2016-06-16
Threat Detection Using Endpoint Variance
App 20160173509 - Ray; Kenneth D. ;   et al.
2016-06-16
Server Drift Monitoring
App 20160173525 - Thomas; Andrew J. ;   et al.
2016-06-16
Normalized Indications Of Compromise
App 20160080418 - Ray; Kenneth D. ;   et al.
2016-03-17
Labeling Objects On An Endpoint For Encryption Management
App 20160078225 - Ray; Kenneth D. ;   et al.
2016-03-17
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint
App 20160080399 - Harris; Mark D. ;   et al.
2016-03-17
Using Indications Of Compromise For Reputation Based Network Security
App 20160080420 - Ray; Kenneth D. ;   et al.
2016-03-17
Labeling Computing Objects For Improved Threat Detection
App 20160080417 - Thomas; Andrew J. ;   et al.
2016-03-17
Network stream scanning facility
Grant 8,607,347 - Harris , et al. December 10, 2
2013-12-10
Network Stream Scanning Facility
App 20100083380 - Harris; Mark D. ;   et al.
2010-04-01
System and method for facilitating IPv6 protocol usage by an application program
Grant 7,440,471 - Hinchliffe , et al. October 21, 2
2008-10-21

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed