loadpatents
name:-0.03120493888855
name:-0.032006978988647
name:-0.0035550594329834
Herwono; Ian Patent Filings

Herwono; Ian

Patent Applications and Registrations

Patent applications and USPTO patent grants for Herwono; Ian.The latest application filed is for "pre-emptive computer security".

Company Profile
1.25.25
  • Herwono; Ian - London GB
  • Herwono; Ian - Stowmarket N/A GB
  • Herwono; Ian - Ipswich N/A GB
  • Herwono; Ian - Suffolk GB
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Computer security
Grant 11,449,604 - Herwono , et al. September 20, 2
2022-09-20
Adaptive computer security
Grant 11,436,320 - Herwono , et al. September 6, 2
2022-09-06
Mitigating security attacks in virtualized computing environments
Grant 11,423,144 - El-Moussa , et al. August 23, 2
2022-08-23
Pre-emptive Computer Security
App 20220150268 - Herwono; Ian ;   et al.
2022-05-12
Computer Security
App 20220092178 - HERWONO; Ian ;   et al.
2022-03-24
Adaptive Computer Security
App 20220092177 - HERWONO; Ian ;   et al.
2022-03-24
Detecting computer security threats using communication characteristics of communication protocols
Grant 11,194,901 - El-Moussa , et al. December 7, 2
2021-12-07
Network traffic threat identification
Grant 11,159,549 - El-Moussa , et al. October 26, 2
2021-10-26
Mitigating Security Attacks In Virtualized Computing Environments
App 20210286873 - EL-MOUSSA; Fadi ;   et al.
2021-09-16
Malware Infection Prediction
App 20210014240 - WANG; Xiao-Si ;   et al.
2021-01-14
Malware Barrier
App 20210014241 - WANG; Xiao-Si ;   et al.
2021-01-14
Detecting Computer Security Threats
App 20200302052 - EL-MOUSSA; Fadi ;   et al.
2020-09-24
Network Traffic Threat Identification
App 20200296121 - EL-MOUSSA; Fadi ;   et al.
2020-09-17
Attack assessment in a virtualized computing environment
Grant 10,747,886 - El-Moussa , et al. A
2020-08-18
Configuration parameters for virtual machines
Grant 10,623,419 - El-Moussa , et al.
2020-04-14
Security in virtualized computing environments
Grant 10,484,402 - El-Moussa , et al. Nov
2019-11-19
Secure configuration in a virtualized computing environment
Grant 10,482,245 - El-Moussa , et al. Nov
2019-11-19
Reconfigured Virtual Machine To Mitigate Attack
App 20190188392 - EL-MOUSSA; Fadi ;   et al.
2019-06-20
Configuration Parameters For Virtual Machines
App 20180091531 - EL-MOUSSA; Fadi ;   et al.
2018-03-29
Efficient Attack Mitigation In A Virtual Machine
App 20180060575 - EL-MOUSSA; Fadi ;   et al.
2018-03-01
Machine Learning For Attack Mitigation In Virtual Machines
App 20180060581 - EL-MOUSSA; Fadi ;   et al.
2018-03-01
Secure Configuration In A Virtualized Computing Environment
App 20180060582 - EL-MOUSSA; Fadi ;   et al.
2018-03-01
Attack Assessment In A Virtualized Computing Environment
App 20180053002 - EL-MOUSSA; Fadi ;   et al.
2018-02-22
Security In Virtualized Computing Environments
App 20180054451 - EL-MOUSSA; Fadi ;   et al.
2018-02-22
Method and apparatus for detecting a multi-stage event
Grant 9,870,470 - Herwono , et al. January 16, 2
2018-01-16
Method and apparatus for detecting a multi-stage event
Grant 9,836,600 - Herwono , et al. December 5, 2
2017-12-05
Means and method for controlling network access in integrated communications networks
Grant 9,521,149 - Sachs , et al. December 13, 2
2016-12-13
Method And Apparatus For Detecting A Multi-stage Event
App 20160055335 - HERWONO; Ian ;   et al.
2016-02-25
Method And Apparatus For Detecting A Multi-stage Event
App 20160055334 - HERWONO; Ian ;   et al.
2016-02-25
Internetworking of cellular radio networks and wireless data networks
Grant 8,948,137 - Sachs , et al. February 3, 2
2015-02-03
Devolved authentication
Grant 8,800,013 - Jones , et al. August 5, 2
2014-08-05
Provision of secure communications connection using third party authentication
Grant 8,738,898 - Herwono , et al. May 27, 2
2014-05-27
Method and devices for duplicated packets identification during handover
Grant 8,538,437 - Wiemann , et al. September 17, 2
2013-09-17
Internetworking Of Cellular Radio Networks And Wireless Data Networks
App 20110292914 - Sachs; Joachim ;   et al.
2011-12-01
Handover optimisation in a WLAN radio access network
Grant 8,050,232 - Sachs , et al. November 1, 2
2011-11-01
Internetworking of cellular radio networks and wireless data networks
Grant 8,023,469 - Sachs , et al. September 20, 2
2011-09-20
Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
Grant 8,019,346 - Sachs , et al. September 13, 2
2011-09-13
Means and method for ciphering and transmitting data in integrated networks
Grant 7,961,875 - Sachs , et al. June 14, 2
2011-06-14
Devolved Authentication
App 20110030043 - Jones; James E. ;   et al.
2011-02-03
Provision Of Secure Communications Connection Using Third Party Authentication
App 20090287922 - Herwono; Ian ;   et al.
2009-11-19
Internetworking of Cellular Radio Networks and Wireless Data Networks
App 20090131053 - Sachs; Joachim ;   et al.
2009-05-21
Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
App 20080205345 - Sachs; Joachim ;   et al.
2008-08-28
Means and Method for Ciphering and Transmitting Data in Integrated Networks
App 20080192925 - Sachs; Joachim ;   et al.
2008-08-14
Handover Optimisation in a Wlan Radio Access Network
App 20080192696 - Sachs; Joachim ;   et al.
2008-08-14
Method and Devices for Duplicated Packets Identification During Handover
App 20080095112 - Wiemann; Henning ;   et al.
2008-04-24

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed