loadpatents
name:-0.060791969299316
name:-0.044782876968384
name:-0.0059010982513428
Hudis; Efim Patent Filings

Hudis; Efim

Patent Applications and Registrations

Patent applications and USPTO patent grants for Hudis; Efim.The latest application filed is for "automated code analysis tool".

Company Profile
4.62.61
  • Hudis; Efim - Bellevue WA
  • Hudis; Efim - Belevuw WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Automated Code Analysis Tool
App 20220067170 - Bargury; Michael Zeev ;   et al.
2022-03-03
Detecting attacks on web applications using server logs
Grant 11,223,637 - Neuvirth , et al. January 11, 2
2022-01-11
Enterprise graph method of threat detection
Grant 10,771,492 - Hudis , et al. Sep
2020-09-08
Access control manager
Grant 10,764,299 - Kliger , et al. Sep
2020-09-01
Altering application security to support just-in-time access
Grant 10,516,675 - Elyashar , et al. Dec
2019-12-24
Detecting Attacks On Web Applications Using Server Logs
App 20190215330 - NEUVIRTH; Hani Hana ;   et al.
2019-07-11
Access Control Manager
App 20190007415 - Kliger; Ben ;   et al.
2019-01-03
Finding data in connected corpuses using examples
Grant 10,140,366 - Platt , et al. Nov
2018-11-27
Altering Application Security To Support Just-in-time Access
App 20180205736 - ELYASHAR; Gilad Michael ;   et al.
2018-07-19
Enterprise Graph Method Of Threat Detection
App 20180084001 - Hudis; Efim ;   et al.
2018-03-22
Malicious code infection cause-and-effect analysis
Grant 9,910,981 - Hartrell , et al. March 6, 2
2018-03-06
Malicious code infection cause-and-effect analysis
Grant 9,886,578 - Hartrell , et al. February 6, 2
2018-02-06
Automatic Recommendations For Deployments In A Data Center
App 20170207980 - Hudis; Efim ;   et al.
2017-07-20
Network intrusion detection with distributed correlation
Grant 9,560,068 - Figlin , et al. January 31, 2
2017-01-31
Selecting candidate rows for deduplication
Grant 9,547,664 - Zinar , et al. January 17, 2
2017-01-17
Controlling malicious activity detection using behavioral models
Grant 9,536,087 - Rubin , et al. January 3, 2
2017-01-03
Domains for knowledge-based data quality solution
Grant 9,519,862 - Malka , et al. December 13, 2
2016-12-13
Matrix factorization for automated malware detection
Grant 9,398,034 - Ronen , et al. July 19, 2
2016-07-19
Lifestyle Recommendation System
App 20160012512 - Haiby; Neta ;   et al.
2016-01-14
Controlling Malicious Activity Detection Using Behavioral Models
App 20150350230 - Rubin; Shai A. ;   et al.
2015-12-03
Controlling malicious activity detection using behavioral models
Grant 9,098,702 - Rubin , et al. August 4, 2
2015-08-04
Finding Data in Connected Corpuses Using Examples
App 20150193533 - Platt; John C. ;   et al.
2015-07-09
Matrix Factorization For Automated Malware Detection
App 20150180890 - Ronen; Royi ;   et al.
2015-06-25
Aggregating the knowledge base of computer systems to proactively protect a computer from malware
Grant 9,043,869 - Thomas , et al. May 26, 2
2015-05-26
Malicious Code Infection Cause-and-effect Analysis
App 20150101010 - Hartrell; Gregory D. ;   et al.
2015-04-09
Comparing and selecting data cleansing service providers
Grant 8,996,479 - Haiby , et al. March 31, 2
2015-03-31
Analytics engine
Grant 8,990,947 - Hudis , et al. March 24, 2
2015-03-24
Finding data in connected corpuses using examples
Grant 8,983,954 - Platt , et al. March 17, 2
2015-03-17
Enterprise security assessment sharing
Grant 8,959,568 - Hudis , et al. February 17, 2
2015-02-17
Malicious code infection cause-and-effect analysis
Grant 8,955,135 - Hartrell , et al. February 10, 2
2015-02-10
Malicious code infection cause-and-effect analysis
Grant 8,955,134 - Hartrell , et al. February 10, 2
2015-02-10
Endpoint enabled for enterprise security assessment sharing
Grant 8,955,105 - Hudis , et al. February 10, 2
2015-02-10
Malicious Code Infection Cause-and-effect Analysis
App 20150013007 - Hartrell; Gregory D. ;   et al.
2015-01-08
Domains For Knowledge-based Data Quality Solution
App 20140379627 - Malka; Joseph ;   et al.
2014-12-25
Enterprise security assessment sharing for consumers using globally distributed infrastructure
Grant 8,910,268 - Hudis , et al. December 9, 2
2014-12-09
Enterprise security assessment sharing for off-premise users using globally distributed infrastructure
Grant 8,881,223 - Hudis , et al. November 4, 2
2014-11-04
Distributive security investigation
Grant 8,839,419 - Hudis , et al. September 16, 2
2014-09-16
Domains for knowledge-based data quality solution
Grant 8,812,411 - Malka , et al. August 19, 2
2014-08-19
Selecting candidate rows for deduplication
Grant 8,719,236 - Zinar , et al. May 6, 2
2014-05-06
Mapping between users and machines in an enterprise security assessment sharing system
Grant 8,689,335 - Helman , et al. April 1, 2
2014-04-01
Detection of adversaries through collection and correlation of assessments
Grant 8,677,479 - Neystadt , et al. March 18, 2
2014-03-18
Selecting Candidate Rows For Deduplication
App 20140059015 - Zinar; Yaron ;   et al.
2014-02-27
Aggregating The Knowledge Base Of Computer Systems To Proactively Protect A Computer From Malware
App 20130332988 - Thomas; Anil Francis ;   et al.
2013-12-12
Comparing And Selecting Data Cleansing Service Providers
App 20130332427 - Haiby; Neta ;   et al.
2013-12-12
Network Intrusion Detection With Distributed Correlation
App 20130305371 - Figlin; Igal ;   et al.
2013-11-14
Controlling Malicious Activity Detection Using Behavioral Models
App 20130305374 - Rubin; Shai A. ;   et al.
2013-11-14
Finding Data in Connected Corpuses Using Examples
App 20130268531 - Platt; John C. ;   et al.
2013-10-10
Brokered Exchange of Private Data
App 20130268552 - Platt; John C. ;   et al.
2013-10-10
Contextual gravitation of datasets and data services
Grant 8,538,934 - Hudis , et al. September 17, 2
2013-09-17
Network intrusion detection with distributed correlation
Grant 8,516,576 - Figlin , et al. August 20, 2
2013-08-20
Aggregating the knowledge base of computer systems to proactively protect a computer from malware
Grant 8,516,583 - Thomas , et al. August 20, 2
2013-08-20
Comparing and selecting data cleansing service providers
Grant 8,510,276 - Haiby , et al. August 13, 2
2013-08-13
Controlling malicious activity detection using behavioral models
Grant 8,490,187 - Rubin , et al. July 16, 2
2013-07-16
Knowledge Based Parsing
App 20130117012 - Orlin; Yifat ;   et al.
2013-05-09
Domains For Knowledge-based Data Quality Solution
App 20130117203 - Malka; Joseph ;   et al.
2013-05-09
Architecture For Knowledge-based Data Quality Solution
App 20130117219 - Malka; Joseph ;   et al.
2013-05-09
Knowledge-based Data Quality Solution
App 20130117202 - Malka; Joseph ;   et al.
2013-05-09
Contextual Gravitation of Datasets and Data Services
App 20130110792 - Hudis; Efim ;   et al.
2013-05-02
Automated collection of forensic evidence associated with a network security incident
Grant 8,424,094 - Neystadt , et al. April 16, 2
2013-04-16
Adaptive data collection for root-cause analysis and intrusion detection
Grant 8,413,247 - Hudis , et al. April 2, 2
2013-04-02
Services using globally distributed infrastructure for secure content management
Grant 8,296,178 - Hudis , et al. October 23, 2
2012-10-23
Malicious Code Infection Cause-and-effect Analysis
App 20120144490 - Hartrell; Gregory D. ;   et al.
2012-06-07
Malicious Code Infection Cause-and-effect Analysis
App 20120137342 - Hartrell; Gregory D. ;   et al.
2012-05-31
Personalized honeypot for detecting information leaks and security breaches
Grant 8,181,250 - Rafalovich , et al. May 15, 2
2012-05-15
Comparing And Selecting Data Cleansing Service Providers
App 20120078857 - Haiby; Neta ;   et al.
2012-03-29
Manual operations in an enterprise security assessment sharing system
Grant 8,136,164 - Helman , et al. March 13, 2
2012-03-13
Malicious code infection cause-and-effect analysis
Grant 8,117,659 - Hartrell , et al. February 14, 2
2012-02-14
Analysis of event information to perform contextual audit
Grant 8,095,979 - McDermott , et al. January 10, 2
2012-01-10
Network Intrusion Detection With Distributed Correlation
App 20110173699 - Figlin; Igal ;   et al.
2011-07-14
Reduction of false positive reputations through collection of overrides from customer deployments
Grant 7,953,969 - Neystadt , et al. May 31, 2
2011-05-31
Detecting compromised computers by correlating reputation data with web access logs
Grant 7,882,542 - Neystadt , et al. February 1, 2
2011-02-01
Controlling Malicious Activity Detection Using Behavioral Models
App 20100241974 - Rubin; Shai A. ;   et al.
2010-09-23
Providing Simplified Internet Access
App 20100077450 - Hudis; Efim ;   et al.
2010-03-25
Distributive Security Investigation
App 20100031354 - Hudis; Efim ;   et al.
2010-02-04
Mapping Between Users And Machines In An Enterprise Security Assessment Sharing System
App 20090328222 - Helman; Yair ;   et al.
2009-12-31
Semantic Networks For Intrusion Detection
App 20090328215 - Arzi; Lior ;   et al.
2009-12-31
Personalized Honeypot For Detecting Information Leaks And Security Breaches
App 20090328216 - Rafalovich; Ziv ;   et al.
2009-12-31
Manual Operations In An Enterprise Security Assessment Sharing System
App 20090217381 - Helman; Yair ;   et al.
2009-08-27
Analytics Engine
App 20090199265 - Hudis; Efim ;   et al.
2009-08-06
Services Using Globally Distributed Infrastructure For Secure Content Management
App 20090177514 - Hudis; Efim ;   et al.
2009-07-09
Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure
App 20090178132 - Hudis; Efim ;   et al.
2009-07-09
Enterprise Security Assessment Sharing For Off-premise Users Using Globally Distributed Infrastructure
App 20090178108 - Hudis; Efim ;   et al.
2009-07-09
Globally Distributed Infrastructure For Secure Content Management
App 20090178131 - Hudis; Efim ;   et al.
2009-07-09
Reduction of false positive reputations through collection of overrides from customer deployments
App 20080256622 - Neystadt; John ;   et al.
2008-10-16
Detection of adversaries through collection and correlation of assessments
App 20080256619 - Neystadt; John ;   et al.
2008-10-16
Detecting adversaries by correlating detected malware with web access logs
App 20080244742 - Neystadt; John ;   et al.
2008-10-02
Automated collection of forensic evidence associated with a network security incident
App 20080244694 - Neystadt; John ;   et al.
2008-10-02
Detecting compromised computers by correlating reputation data with web access logs
App 20080244748 - Neystadt; John ;   et al.
2008-10-02
Endpoint enabled for enterprise security assessment sharing
App 20080229414 - Hudis; Efim ;   et al.
2008-09-18
Enterprise security assessment sharing
App 20080229422 - Hudis; Efim ;   et al.
2008-09-18
Adaptive data collection for root-cause analysis and intrusion detection
App 20080229421 - Hudis; Efim ;   et al.
2008-09-18
Analysis Of Event Information To Perform Contextual Audit
App 20080184058 - McDermott; Ellen ;   et al.
2008-07-31
Malicious code infection cause-and-effect analysis
App 20070150957 - Hartrell; Gregory D. ;   et al.
2007-06-28
Network access protection
App 20060250968 - Hudis; Efim ;   et al.
2006-11-09
Aggregating the knowledge base of computer systems to proactively protect a computer from malware
App 20060236392 - Thomas; Anil Francis ;   et al.
2006-10-19

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed