loadpatents
name:-0.038614988327026
name:-0.030285835266113
name:-0.025170803070068
Humphries; Russell Patent Filings

Humphries; Russell

Patent Applications and Registrations

Patent applications and USPTO patent grants for Humphries; Russell.The latest application filed is for "endpoint with remotely programmable data recorder".

Company Profile
27.29.40
  • Humphries; Russell - Surrey GB
  • Humphries; Russell - Horley GB
  • - Surrey GB
  • Humphries; Russell - Horley SY GB
  • HUMPHRIES; Russell - Abingdon GB
  • Humphries; Russell - Duvall WA
  • Humphries; Russell - Redmond WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Dynamically Updated User Interface For Threat Investigation
App 20220217167 - Saxe; Joshua Daniel ;   et al.
2022-07-07
Endpoint With Remotely Programmable Data Recorder
App 20220217166 - Ladnai; Beata ;   et al.
2022-07-07
Tracking Malware Root Causes With An Event Graph
App 20220198009 - Ladnai; Beata ;   et al.
2022-06-23
Tracking Malware Root Causes With An Event Graph
App 20220198010 - Ladnai; Beata ;   et al.
2022-06-23
Chain Of Custody For Enterprise Documents
App 20220156399 - Ackerman; Karl ;   et al.
2022-05-19
Forensic query of local event streams in an enterprise network
Grant 11,297,073 - Ladnai , et al. April 5, 2
2022-04-05
Chain of custody for enterprise documents
Grant 11,288,385 - Ackerman , et al. March 29, 2
2022-03-29
Forensic Analysis Of Computing Activity
App 20220070184 - Ladnai; Beata ;   et al.
2022-03-03
Intrusion Detection With Honeypot Keys
App 20210344715 - Schutz; Harald ;   et al.
2021-11-04
Forensic analysis of computing activity
Grant 11,095,669 - Ladnai , et al. August 17, 2
2021-08-17
Enterprise Network Threat Detection
App 20210250366 - Ladnai; Beata ;   et al.
2021-08-12
Intrusion detection with honeypot keys
Grant 11,089,056 - Schutz , et al. August 10, 2
2021-08-10
Computer Augmented Threat Evaluation
App 20210211440 - Saxe; Joshua Daniel ;   et al.
2021-07-08
Threat Detection With Business Impact Scoring
App 20210211441 - Humphries; Russell ;   et al.
2021-07-08
Key throttling to mitigate unauthorized file access
Grant 10,979,449 - Humphries , et al. April 13, 2
2021-04-13
Enterprise network threat detection
Grant 10,972,485 - Ladnai , et al. April 6, 2
2021-04-06
Sandbox Environment For Document Preview And Analysis
App 20210097171 - McKerchar; Ross ;   et al.
2021-04-01
Computer augmented threat evaluation
Grant 10,938,838 - Saxe , et al. March 2, 2
2021-03-02
Threat detection with business impact scoring
Grant 10,938,839 - Humphries , et al. March 2, 2
2021-03-02
Sandbox environment for document preview and analysis
Grant 10,896,254 - McKerchar , et al. January 19, 2
2021-01-19
Tracking Malicious Software Movement With An Event Graph
App 20210012005 - Ladnai; Beata ;   et al.
2021-01-14
Perimeter enforcement of encryption rules
Grant 10,834,061 - Humphries , et al. November 10, 2
2020-11-10
Endpoint malware detection using an event graph
Grant 10,817,602 - Ladnai , et al. October 27, 2
2020-10-27
Enterprise Network Threat Detection
App 20200304528 - Ackerman; Karl ;   et al.
2020-09-24
Key throttling to mitigate unauthorized file access
Grant 10,681,078 - Humphries , et al.
2020-06-09
Intrusion Detection With Honeypot Keys
App 20200106808 - Schutz; Harald ;   et al.
2020-04-02
Computer Augmented Threat Evaluation
App 20200074078 - Saxe; Joshua Daniel ;   et al.
2020-03-05
Enterprise Network Threat Detection
App 20200076835 - Ladnai; Beata ;   et al.
2020-03-05
Forensic Analysis Of Computing Activity
App 20200076837 - Ladnai; Beata ;   et al.
2020-03-05
Forensic Query Of Local Event Streams In An Enterprise Network
App 20200076834 - Ladnai; Beata ;   et al.
2020-03-05
Dynamic Filtering Of Endpoint Event Streams
App 20200076833 - Ladnai; Beata ;   et al.
2020-03-05
Computer Assisted Identification Of Intermediate Level Threats
App 20200074336 - Saxe; Joshua Daniel ;   et al.
2020-03-05
Threat Detection With Business Impact Scoring
App 20200074360 - Humphries; Russell ;   et al.
2020-03-05
Key Throttling To Mitigate Unauthorized File Access
App 20200036747 - Humphries; Russell ;   et al.
2020-01-30
Forensic analysis of computing activity
Grant 10,516,682 - Ladnai , et al. Dec
2019-12-24
Endpoint malware detection using an event graph
Grant 10,489,588 - Ladnai , et al. Nov
2019-11-26
Key throttling to mitigate unauthorized file access
Grant 10469522 -
2019-11-05
Endpoint malware detection using an event graph
Grant 10,460,105 - Ladnai , et al. Oc
2019-10-29
Chain Of Custody For Enterprise Documents
App 20190318128 - Ackerman; Karl ;   et al.
2019-10-17
Endpoint Malware Detection Using An Event Graph
App 20190258800 - Ladnai; Beata ;   et al.
2019-08-22
Perimeter Enforcement Of Encryption Rules
App 20190253399 - Humphries; Russell ;   et al.
2019-08-15
Image or pictographic based computer login systems and methods
Grant RE47,518 - Kowalczyk , et al. July 16, 2
2019-07-16
Sandbox Environment For Document Preview And Analysis
App 20190213325 - McKerchar; Ross ;   et al.
2019-07-11
Perimeter enforcement of encryption rules
Grant 10,263,966 - Humphries , et al.
2019-04-16
Endpoint Malware Detection Using An Event Graph
App 20180276380 - Ladnai; Beata ;   et al.
2018-09-27
Endpoint Malware Detection Using An Event Graph
App 20180276379 - Ladnai; Beata ;   et al.
2018-09-27
Forensic Analysis Of Computing Activity
App 20180227320 - Ladnai; Beata ;   et al.
2018-08-09
Forensic analysis of computing activity
Grant 9,967,267 - Ladnai , et al. May 8, 2
2018-05-08
Endpoint malware detection using an event graph
Grant 9,928,366 - Ladnai , et al. March 27, 2
2018-03-27
Key Throttling To Mitigate Unauthorized File Access
App 20170359370 - Humphries; Russell ;   et al.
2017-12-14
Endpoint Malware Detection Using An Event Graph
App 20170300690 - Ladnai; Beata ;   et al.
2017-10-19
Perimeter Enforcement Of Encryption Rules
App 20170302635 - Humphries; Russell ;   et al.
2017-10-19
Forensic Analysis Of Computing Activity
App 20170302685 - Ladnai; Beata ;   et al.
2017-10-19
Image or pictographic based computer login systems and methods
Grant RE44,725 - Holt , et al. January 21, 2
2014-01-21
Storage volume protection supporting legacy systems
Grant 8,417,969 - Humphries , et al. April 9, 2
2013-04-09
Storage device controlled access
Grant 8,046,593 - Ellison , et al. October 25, 2
2011-10-25
Systems and methods for updating a secure boot process on a computer with a hardware security module
Grant 8,028,172 - Hunter , et al. September 27, 2
2011-09-27
Image or pictographic based computer login systems and methods
Grant 7,953,983 - Holt , et al. May 31, 2
2011-05-31
Storage Volume Protection Supporting Legacy Systems
App 20100211802 - Humphries; Russell ;   et al.
2010-08-19
Systems and methods for securely booting a computer with a trusted processing module
Grant 7,725,703 - Hunter , et al. May 25, 2
2010-05-25
Systems and methods for controlling access to data on a computer with a secure boot process
Grant 7,565,553 - Hunter , et al. July 21, 2
2009-07-21
Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module
Grant 7,506,380 - Hunter , et al. March 17, 2
2009-03-17
Storage device controlled access
App 20080022132 - Ellison; Carl M. ;   et al.
2008-01-24
Image or pictographic based computer login systems and methods
App 20060206717 - Holt; Erik L. ;   et al.
2006-09-14
Systems and methods for controlling access to data on a computer with a secure boot process
App 20060161790 - Hunter; Jamie ;   et al.
2006-07-20
Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module
App 20060161769 - Hunter; Jamie ;   et al.
2006-07-20
Systems and methods for securely booting a computer with a trusted processing module
App 20060155988 - Hunter; Jamie ;   et al.
2006-07-13

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed