loadpatents
Patent applications and USPTO patent grants for Humphries; Russell.The latest application filed is for "endpoint with remotely programmable data recorder".
Patent | Date |
---|---|
Dynamically Updated User Interface For Threat Investigation App 20220217167 - Saxe; Joshua Daniel ;   et al. | 2022-07-07 |
Endpoint With Remotely Programmable Data Recorder App 20220217166 - Ladnai; Beata ;   et al. | 2022-07-07 |
Tracking Malware Root Causes With An Event Graph App 20220198009 - Ladnai; Beata ;   et al. | 2022-06-23 |
Tracking Malware Root Causes With An Event Graph App 20220198010 - Ladnai; Beata ;   et al. | 2022-06-23 |
Chain Of Custody For Enterprise Documents App 20220156399 - Ackerman; Karl ;   et al. | 2022-05-19 |
Forensic query of local event streams in an enterprise network Grant 11,297,073 - Ladnai , et al. April 5, 2 | 2022-04-05 |
Chain of custody for enterprise documents Grant 11,288,385 - Ackerman , et al. March 29, 2 | 2022-03-29 |
Forensic Analysis Of Computing Activity App 20220070184 - Ladnai; Beata ;   et al. | 2022-03-03 |
Intrusion Detection With Honeypot Keys App 20210344715 - Schutz; Harald ;   et al. | 2021-11-04 |
Forensic analysis of computing activity Grant 11,095,669 - Ladnai , et al. August 17, 2 | 2021-08-17 |
Enterprise Network Threat Detection App 20210250366 - Ladnai; Beata ;   et al. | 2021-08-12 |
Intrusion detection with honeypot keys Grant 11,089,056 - Schutz , et al. August 10, 2 | 2021-08-10 |
Computer Augmented Threat Evaluation App 20210211440 - Saxe; Joshua Daniel ;   et al. | 2021-07-08 |
Threat Detection With Business Impact Scoring App 20210211441 - Humphries; Russell ;   et al. | 2021-07-08 |
Key throttling to mitigate unauthorized file access Grant 10,979,449 - Humphries , et al. April 13, 2 | 2021-04-13 |
Enterprise network threat detection Grant 10,972,485 - Ladnai , et al. April 6, 2 | 2021-04-06 |
Sandbox Environment For Document Preview And Analysis App 20210097171 - McKerchar; Ross ;   et al. | 2021-04-01 |
Computer augmented threat evaluation Grant 10,938,838 - Saxe , et al. March 2, 2 | 2021-03-02 |
Threat detection with business impact scoring Grant 10,938,839 - Humphries , et al. March 2, 2 | 2021-03-02 |
Sandbox environment for document preview and analysis Grant 10,896,254 - McKerchar , et al. January 19, 2 | 2021-01-19 |
Tracking Malicious Software Movement With An Event Graph App 20210012005 - Ladnai; Beata ;   et al. | 2021-01-14 |
Perimeter enforcement of encryption rules Grant 10,834,061 - Humphries , et al. November 10, 2 | 2020-11-10 |
Endpoint malware detection using an event graph Grant 10,817,602 - Ladnai , et al. October 27, 2 | 2020-10-27 |
Enterprise Network Threat Detection App 20200304528 - Ackerman; Karl ;   et al. | 2020-09-24 |
Key throttling to mitigate unauthorized file access Grant 10,681,078 - Humphries , et al. | 2020-06-09 |
Intrusion Detection With Honeypot Keys App 20200106808 - Schutz; Harald ;   et al. | 2020-04-02 |
Computer Augmented Threat Evaluation App 20200074078 - Saxe; Joshua Daniel ;   et al. | 2020-03-05 |
Enterprise Network Threat Detection App 20200076835 - Ladnai; Beata ;   et al. | 2020-03-05 |
Forensic Analysis Of Computing Activity App 20200076837 - Ladnai; Beata ;   et al. | 2020-03-05 |
Forensic Query Of Local Event Streams In An Enterprise Network App 20200076834 - Ladnai; Beata ;   et al. | 2020-03-05 |
Dynamic Filtering Of Endpoint Event Streams App 20200076833 - Ladnai; Beata ;   et al. | 2020-03-05 |
Computer Assisted Identification Of Intermediate Level Threats App 20200074336 - Saxe; Joshua Daniel ;   et al. | 2020-03-05 |
Threat Detection With Business Impact Scoring App 20200074360 - Humphries; Russell ;   et al. | 2020-03-05 |
Key Throttling To Mitigate Unauthorized File Access App 20200036747 - Humphries; Russell ;   et al. | 2020-01-30 |
Forensic analysis of computing activity Grant 10,516,682 - Ladnai , et al. Dec | 2019-12-24 |
Endpoint malware detection using an event graph Grant 10,489,588 - Ladnai , et al. Nov | 2019-11-26 |
Key throttling to mitigate unauthorized file access Grant 10469522 - | 2019-11-05 |
Endpoint malware detection using an event graph Grant 10,460,105 - Ladnai , et al. Oc | 2019-10-29 |
Chain Of Custody For Enterprise Documents App 20190318128 - Ackerman; Karl ;   et al. | 2019-10-17 |
Endpoint Malware Detection Using An Event Graph App 20190258800 - Ladnai; Beata ;   et al. | 2019-08-22 |
Perimeter Enforcement Of Encryption Rules App 20190253399 - Humphries; Russell ;   et al. | 2019-08-15 |
Image or pictographic based computer login systems and methods Grant RE47,518 - Kowalczyk , et al. July 16, 2 | 2019-07-16 |
Sandbox Environment For Document Preview And Analysis App 20190213325 - McKerchar; Ross ;   et al. | 2019-07-11 |
Perimeter enforcement of encryption rules Grant 10,263,966 - Humphries , et al. | 2019-04-16 |
Endpoint Malware Detection Using An Event Graph App 20180276380 - Ladnai; Beata ;   et al. | 2018-09-27 |
Endpoint Malware Detection Using An Event Graph App 20180276379 - Ladnai; Beata ;   et al. | 2018-09-27 |
Forensic Analysis Of Computing Activity App 20180227320 - Ladnai; Beata ;   et al. | 2018-08-09 |
Forensic analysis of computing activity Grant 9,967,267 - Ladnai , et al. May 8, 2 | 2018-05-08 |
Endpoint malware detection using an event graph Grant 9,928,366 - Ladnai , et al. March 27, 2 | 2018-03-27 |
Key Throttling To Mitigate Unauthorized File Access App 20170359370 - Humphries; Russell ;   et al. | 2017-12-14 |
Endpoint Malware Detection Using An Event Graph App 20170300690 - Ladnai; Beata ;   et al. | 2017-10-19 |
Perimeter Enforcement Of Encryption Rules App 20170302635 - Humphries; Russell ;   et al. | 2017-10-19 |
Forensic Analysis Of Computing Activity App 20170302685 - Ladnai; Beata ;   et al. | 2017-10-19 |
Image or pictographic based computer login systems and methods Grant RE44,725 - Holt , et al. January 21, 2 | 2014-01-21 |
Storage volume protection supporting legacy systems Grant 8,417,969 - Humphries , et al. April 9, 2 | 2013-04-09 |
Storage device controlled access Grant 8,046,593 - Ellison , et al. October 25, 2 | 2011-10-25 |
Systems and methods for updating a secure boot process on a computer with a hardware security module Grant 8,028,172 - Hunter , et al. September 27, 2 | 2011-09-27 |
Image or pictographic based computer login systems and methods Grant 7,953,983 - Holt , et al. May 31, 2 | 2011-05-31 |
Storage Volume Protection Supporting Legacy Systems App 20100211802 - Humphries; Russell ;   et al. | 2010-08-19 |
Systems and methods for securely booting a computer with a trusted processing module Grant 7,725,703 - Hunter , et al. May 25, 2 | 2010-05-25 |
Systems and methods for controlling access to data on a computer with a secure boot process Grant 7,565,553 - Hunter , et al. July 21, 2 | 2009-07-21 |
Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module Grant 7,506,380 - Hunter , et al. March 17, 2 | 2009-03-17 |
Storage device controlled access App 20080022132 - Ellison; Carl M. ;   et al. | 2008-01-24 |
Image or pictographic based computer login systems and methods App 20060206717 - Holt; Erik L. ;   et al. | 2006-09-14 |
Systems and methods for controlling access to data on a computer with a secure boot process App 20060161790 - Hunter; Jamie ;   et al. | 2006-07-20 |
Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module App 20060161769 - Hunter; Jamie ;   et al. | 2006-07-20 |
Systems and methods for securely booting a computer with a trusted processing module App 20060155988 - Hunter; Jamie ;   et al. | 2006-07-13 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.