name:-0.11020398139954
name:-0.095096111297607
name:-0.053334951400757
Imperva, Inc. Patent Filings

Imperva, Inc.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Imperva, Inc..The latest application filed is for "delegating multi-factor authentication in legacy databases".

Company Profile
58.141.144
  • Imperva, Inc. - Redwood City CA US
  • Imperva, Inc. - San Mateo CA
  • Imperva, Inc. - Redwood Shores CA US
  • Imperva, Inc. - Ramat-Gan IL
  • IMPERVA, INC. - Forest City CA
  • IMPERVA, INC. - Foster City CA
  • IMPERVA, INC. -
  • IMPERVA, INC - 950 Tower Lane Suite 1550 Foster City CA
  • IMPERVA, Inc - Ramat-Gan IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Trademarks
Patent Activity
PatentDate
Chunk-scanning of web application layer requests to reduce delays
Grant 11,457,023 - Zingerman , et al. September 27, 2
2022-09-27
Data based web application firewall
Grant 11,436,358 - Margel , et al. September 6, 2
2022-09-06
System And Method For Policy Control In Databases
App 20220269806 - Ben-Natan; Ron ;   et al.
2022-08-25
Delegating Multi-factor Authentication In Legacy Databases
App 20220269769 - Ben-Natan; Ron ;   et al.
2022-08-25
Method for generating a human likeness score
Grant 11,423,130 - Paxton , et al. August 23, 2
2022-08-23
Inline anomaly detection for multi-request operations
Grant 11,405,412 - Azaria , et al. August 2, 2
2022-08-02
Monitoring and preventing use of weak cryptographic logic
Grant 11,405,212 - Anand August 2, 2
2022-08-02
Mechanism for providing obfuscated code to web application clients
Grant 11,397,795 - Mantin July 26, 2
2022-07-26
Forced Identification With Automated Post Resubmission
App 20220232062 - SP NG; Daniel
2022-07-21
Dynamic Emotion Detection Based On User Inputs
App 20220206918 - LERNER; Aiah ;   et al.
2022-06-30
Dynamic Invocation Of Partner Product Exit Routine In An Active Information Management System
App 20220206775 - HERONIMUS; Scott
2022-06-30
Data Classification Technology
App 20220207085 - MANTIN; Itsik
2022-06-30
Streaming-friendly Technology For Detection Of Data
App 20220207183 - MANTIN; Itsik
2022-06-30
Robust Learning Of Web Traffic
App 20220210166 - Mantin; Itsik
2022-06-30
Batch Clustering Of Online Attack Narratives For Botnet Detection
App 20220210184 - Nakar; Ori ;   et al.
2022-06-30
Using Access Logs For Network Entities Type Classification
App 20220197929 - MARGEL; Shiri ;   et al.
2022-06-23
Infrastructure Distributed Denial Of Service Protection
App 20220201033 - Shapira; Dvir ;   et al.
2022-06-23
Infrastructure Distributed Denial Of Service Protection
App 20220191243 - Shapira; Dvir ;   et al.
2022-06-16
Accelerating Dynamic Content Delivery In A Content Delivery Network
App 20220150321 - LEVY NAHUM; David
2022-05-12
Generating collection rules based on security rules
Grant 11,330,016 - Arbel , et al. May 10, 2
2022-05-10
Dynamic aggregation of information based on web application layer requests
Grant 11,329,996 - Levy Nahum May 10, 2
2022-05-10
Community-based data security
Grant 11,328,076 - Tzur , et al. May 10, 2
2022-05-10
Using access logs for network entities type classification
Grant 11,301,496 - Margel , et al. April 12, 2
2022-04-12
Forced identification with automated POST resubmission
Grant 11,303,695 - Spang April 12, 2
2022-04-12
Aggregating Alerts Of Malicious Events For Computer Security
App 20220086125 - Yehudai; Gilad ;   et al.
2022-03-17
Infrastructure distributed denial of service protection
Grant 11,277,440 - Shapira , et al. March 15, 2
2022-03-15
Infrastructure distributed denial of service protection
Grant 11,277,441 - Shapira , et al. March 15, 2
2022-03-15
Streaming-friendly technology for detection of data
Grant 11,265,106 - Mantin March 1, 2
2022-03-01
Accelerating dynamic content delivery in a content delivery network
Grant 11,240,336 - Levy Nahum February 1, 2
2022-02-01
Aggregating alerts of malicious events for computer security
Grant 11,218,448 - Yehudai , et al. January 4, 2
2022-01-04
Insider Threat Detection Utilizing User Group To Data Object And/or Resource Group Access Analysis
App 20210400062 - SHTAR; Guy ;   et al.
2021-12-23
Selective Database Logging With Smart Sampling
App 20210344698 - ESHET; Ehud ;   et al.
2021-11-04
Procedural Code Generation For Challenge Code
App 20210334342 - HERNVALL; Emil ;   et al.
2021-10-28
Forced Identification With Automated Post Resubmission
App 20210337009 - SP NG; Daniel
2021-10-28
Columnar storage and processing of unstructured data
Grant 11,144,580 - Ben-Natan , et al. October 12, 2
2021-10-12
Insider threat detection utilizing user group to data object and/or resource group access analysis
Grant 11,146,573 - Shtar , et al. October 12, 2
2021-10-12
Detecting Behavioral Anomalies In User-data Access Logs
App 20210312068 - MANTIN; Itsik ;   et al.
2021-10-07
Enrichment Of Database Logs
App 20210312067 - BEYO; Gabriel ;   et al.
2021-10-07
Data Leakage Prevention Over Application Programming Interface
App 20210306319 - MANTIN; Itsik ;   et al.
2021-09-30
Continuous Database Security And Compliance
App 20210248237 - REICH; Avidan ;   et al.
2021-08-12
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 11,063,960 - Be'ery , et al. July 13, 2
2021-07-13
Capturing Contextual Information For Data Accesses To Improve Data Security
App 20210200884 - ANAND; Kunal ;   et al.
2021-07-01
Passive Classification Of Data In A Database Based On An Event Log Database
App 20210200741 - FRENKEL; Or ;   et al.
2021-07-01
Predictive Activation Of Security Rules To Protect Web Application Servers Against Web Application Layer Attacks
App 20210203641 - MANTIN; Itsik ;   et al.
2021-07-01
Inline Anomaly Detection For Multi-request Operations
App 20210203674 - AZARIA; Jonathan R. ;   et al.
2021-07-01
Privacy-preserving Learning Of Web Traffic
App 20210203642 - MANTIN; Itsik ;   et al.
2021-07-01
Coordinated detection and differentiation of denial of service attacks
Grant 11,050,786 - Be'ery , et al. June 29, 2
2021-06-29
Packet Fingerprinting For Enhanced Distributed Denial Of Service Protection
App 20210185083 - AZARIA; Johnathan ;   et al.
2021-06-17
Query usage based organization for very large databases
Grant 11,030,241 - Ben-Natan June 8, 2
2021-06-08
Selective database logging with smart sampling
Grant 11,025,657 - Eshet , et al. June 1, 2
2021-06-01
Detecting behavioral anomalies in user-data access logs
Grant 11,023,607 - Mantin , et al. June 1, 2
2021-06-01
Continuous database security and compliance
Grant 11,003,779 - Reich , et al. May 11, 2
2021-05-11
Techniques For Targeted Botnet Protection
App 20210092142 - NIV; Nitzan ;   et al.
2021-03-25
High volume message classification and distribution
Grant 10,956,672 - Ben-Natan , et al. March 23, 2
2021-03-23
Dynamic Aggregation Of Information Based On Web Application Layer Requests
App 20210067543 - LEVY NAHUM; David
2021-03-04
Enrichment of database logs
Grant 10,915,648 - Beyo , et al. February 9, 2
2021-02-09
Data leakage prevention over application programming interface
Grant 10,917,401 - Mantin , et al. February 9, 2
2021-02-09
Mechanism For Providing Obfuscated Code To Web Application Clients
App 20210034718 - MANTIN; Itsik
2021-02-04
Techniques for targeted botnet protection
Grant 10,911,472 - Niv , et al. February 2, 2
2021-02-02
Continuous Database Security And Compliance
App 20210012007 - REICH; Avidan ;   et al.
2021-01-14
Detecting Attacks On Databases Based On Transaction Characteristics Determined From Analyzing Database Logs
App 20200410128 - MARGEL; Shiri ;   et al.
2020-12-31
Accelerating Dynamic Content Delivery In A Content Delivery Network
App 20200412826 - LEVY NAHUM; David
2020-12-31
Detection of malicious attempts to access a decoy database object based on connection type
Grant 10,834,130 - Erez , et al. November 10, 2
2020-11-10
Community-based Data Security
App 20200349270 - TZUR; Doron ;   et al.
2020-11-05
Continuous database security and compliance
Grant 10,824,730 - Reich , et al. November 3, 2
2020-11-03
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs
Grant 10,803,192 - Margel , et al. October 13, 2
2020-10-13
Techniques for detecting enterprise intrusions utilizing active tokens
Grant 10,805,325 - Shulman , et al. October 13, 2
2020-10-13
Single page application content injection
Grant 10,783,019 - Kedar , et al. Sept
2020-09-22
Insider threat detection utilizing user group data object access analysis
Grant 10,771,496 - Shtar , et al. Sep
2020-09-08
Method For Generating A Human Likeness Score
App 20200257781 - A1
2020-08-13
Identifying And Classifying Community Attacks
App 20200259861 - A1
2020-08-13
Infrastructure Distributed Denial Of Service Protection
App 20200236135 - Shapira; Dvir ;   et al.
2020-07-23
Infrastructure Distributed Denial Of Service Protection
App 20200236136 - Shapira; Dvir ;   et al.
2020-07-23
Chunk-scanning Of Web Application Layer Requests To Reduce Delays
App 20200236117 - ZINGERMAN; Boris ;   et al.
2020-07-23
Using Access Logs For Network Entities Type Classification
App 20200210455 - MARGEL; Shiri ;   et al.
2020-07-02
Monitoring And Preventing Outbound Network Connections In Runtime Applications
App 20200213322 - Anand; Kunal ;   et al.
2020-07-02
Monitoring And Preventing Use Of Weak Cryptographic Logic
App 20200213120 - Anand; Kunal
2020-07-02
Generating Collection Rules Based On Security Rules
App 20200213359 - ARBEL; Nadav Avital ;   et al.
2020-07-02
Selective Database Logging With Smart Sampling
App 20200195668 - ESHET; Ehud ;   et al.
2020-06-18
Techniques for botnet detection and member identification
Grant 10,673,719 - Niv
2020-06-02
Infrastructure Distributed Denial Of Service Protection
App 20200162508 - Shapira; Dvir ;   et al.
2020-05-21
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20200137026 - SHULMAN; Amichai ;   et al.
2020-04-30
Data Based Web Application Firewall
App 20200097676 - MARGEL; Shiri ;   et al.
2020-03-26
Continuous Database Security And Compliance
App 20200065494 - REICH; Avidan ;   et al.
2020-02-27
Infrastructure distributed denial of service (DDoS) protection
Grant 10,574,691 - Shapira , et al. Feb
2020-02-25
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
Grant 10,567,342 - Shulman , et al. Feb
2020-02-18
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20200036683 - SHULMAN; Amichai ;   et al.
2020-01-30
Aggregating Alerts Of Malicious Events For Computer Security
App 20190372934 - Yehudai; Gilad ;   et al.
2019-12-05
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20190349395 - BE'ERY; Tal Arieh ;   et al.
2019-11-14
Techniques for detecting compromises of enterprise end stations utilizing noisy tokens
Grant 10,469,523 - Shulman , et al. No
2019-11-05
Detecting Attacks On Databases Based On Transaction Characteristics Determined From Analyzing Database Logs
App 20190311149 - MARGEL; Shiri ;   et al.
2019-10-10
Detection Of Malicious Attempts To Access A Decoy Database Object Based On Connection Type
App 20190289034 - EREZ; Elad ;   et al.
2019-09-19
Coordinated detection and differentiation of denial of service attacks
Grant 10,404,742 - Be'ery , et al. Sep
2019-09-03
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Grant 10,404,712 - Margel , et al. Sep
2019-09-03
Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Grant 10,382,400 - Margel , et al. A
2019-08-13
Data access verification for enterprise resources
Grant 10,382,464 - Shulman , et al. A
2019-08-13
Insider Threat Detection Utilizing User Group To Data Object And/or Resource Group Access Analysis
App 20190158513 - SHTAR; Guy ;   et al.
2019-05-23
Insider Threat Detection Utilizing User Group Data Object Access Analysis
App 20190028504 - SHTAR; Guy ;   et al.
2019-01-24
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications
Grant 10,104,095 - Shulman , et al. October 16, 2
2018-10-16
Virtual encryption patching using multiple transport layer security implementations
Grant 10,020,941 - Shulman , et al. July 10, 2
2018-07-10
Techniques For Detecting Enterprise Intrusions Utilizing Active Tokens
App 20180048665 - SHULMAN; Amichai ;   et al.
2018-02-15
Infrastructure Distributed Denial Of Service (ddos) Protection
App 20170366577 - Shapira; Dvir ;   et al.
2017-12-21
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications
App 20170366559 - SHULMAN; Amichai ;   et al.
2017-12-21
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20170339165 - BE'ERY; Tal Arieh ;   et al.
2017-11-23
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications
Grant 9,781,133 - Shulman , et al. October 3, 2
2017-10-03
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 9,762,592 - Be'ery , et al. September 12, 2
2017-09-12
Techniques For Targeted Botnet Protection
App 20170251015 - NIV; Nitzan ;   et al.
2017-08-31
Techniques For Botnet Detection And Member Identification
App 20170251005 - NIV; Nitzan
2017-08-31
Techniques For Targeted Botnet Protection Using Collective Botnet Analysis
App 20170251016 - NIV; Nitzan ;   et al.
2017-08-31
Techniques For Detecting Compromises Of Enterprise End Stations Utilizing Noisy Tokens
App 20170244749 - SHULMAN; Amichai ;   et al.
2017-08-24
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20170244672 - SHULMAN; Amichai ;   et al.
2017-08-24
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets
App 20170237709 - MARGEL; Shiri ;   et al.
2017-08-17
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers
App 20170237711 - MARGEL; Shiri ;   et al.
2017-08-17
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets
App 20170187718 - MARGEL; Shiri ;   et al.
2017-06-29
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers
App 20170187719 - MARGEL; Shiri ;   et al.
2017-06-29
Detection of compromised unmanaged client end stations using synchronized tokens from enterprise-managed client end stations
Grant 9,680,833 - Dulce , et al. June 13, 2
2017-06-13
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Grant 9,674,201 - Margel , et al. June 6, 2
2017-06-06
Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Grant 9,674,202 - Margel , et al. June 6, 2
2017-06-06
Compromised insider honey pots using reverse honey tokens
Grant 9,667,651 - Shulman , et al. May 30, 2
2017-05-30
Data Access Verification For Enterprise Resources
App 20170111380 - SHULMAN; Amichai ;   et al.
2017-04-20
Virtual Encryption Patching Using Multiple Transport Layer Security Implementations
App 20170093824 - SHULMAN; Amichai ;   et al.
2017-03-30
Data access verification for enterprise resources
Grant 9,591,008 - Shulman , et al. March 7, 2
2017-03-07
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20170026407 - BE'ERY; Tal Arieh ;   et al.
2017-01-26
Selective modification of encrypted application layer data in a transparent security gateway
Grant 9,553,892 - Kelson , et al. January 24, 2
2017-01-24
Detection Of Compromised Unmanaged Client End Stations Using Synchronized Tokens From Enterprise-managed Client End Stations
App 20160381023 - DULCE; Sagie ;   et al.
2016-12-29
Coordinated detection and differentiation of denial of service attacks
Grant 9,485,264 - Be'Ery , et al. November 1, 2
2016-11-01
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20160301712 - SHULMAN; Amichai ;   et al.
2016-10-13
System and method for preventing web frauds committed using client-scripting attacks
Grant 9,455,997 - Shulman , et al. September 27, 2
2016-09-27
Selective modification of encrypted application layer data in a transparent security gateway
Grant 9,456,002 - Kelson , et al. September 27, 2
2016-09-27
Data Access Verification For Enterprise Resources
App 20160261616 - SHULMAN; Amichai ;   et al.
2016-09-08
Compromised insider honey pots using reverse honey tokens
Grant 9,401,927 - Shulman , et al. July 26, 2
2016-07-26
Selective Modification Of Encrypted Application Layer Data In A Transparent Security Gateway
App 20150381657 - KELSON; Ido ;   et al.
2015-12-31
Selective Modification Of Encrypted Application Layer Data In A Transparent Security Gateway
App 20150381656 - KELSON; Ido ;   et al.
2015-12-31
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20150365428 - BE'ERY; Tal Arieh ;   et al.
2015-12-17
Coordinated detection and differentiation of denial of service attacks
Grant 9,148,440 - Be'ery , et al. September 29, 2
2015-09-29
Selective modification of encrypted application layer data in a transparent security gateway
Grant 9,148,446 - Kelson , et al. September 29, 2
2015-09-29
On-demand content classification using an out-of-band communications channel for facilitating file activity monitoring and control
Grant 9,128,941 - Shulman , et al. September 8, 2
2015-09-08
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20150207806 - BE'ERY; Tal Arieh ;   et al.
2015-07-23
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20150150123 - Be'ery; Tal Arieh ;   et al.
2015-05-28
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20150135266 - Shulman; Amichai ;   et al.
2015-05-14
Automatic generation of different attribute values for detecting a same type of web application layer attack
Grant 9,027,137 - Be'ery , et al. May 5, 2
2015-05-05
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 9,027,136 - Be'ery , et al. May 5, 2
2015-05-05
Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors
Grant 9,009,832 - Be'ery , et al. April 14, 2
2015-04-14
Iterative automatic generation of attribute values for rules of a web application layer attack detector
Grant 8,997,232 - Be'ery , et al. March 31, 2
2015-03-31
System and method for preventing web frauds committed using client-scripting attacks
Grant 8,984,630 - Shulman , et al. March 17, 2
2015-03-17
Compromised insider honey pots using reverse honey tokens
Grant 8,973,142 - Shulman , et al. March 3, 2
2015-03-03
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20150013006 - Shulman; Amichai ;   et al.
2015-01-08
Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source
Grant 8,904,558 - Shulman , et al. December 2, 2
2014-12-02
Selective Modification Of Encrypted Application Layer Data In A Transparent Security Gateway
App 20140337614 - Kelson; Ido ;   et al.
2014-11-13
Community-based Defense Through Automatic Generation Of Attribute Values For Rules Of Web Application Layer Attack Detectors
App 20140317740 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20140317738 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Iterative Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20140317739 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Automatic Generation Of Different Attribute Values For Detecting A Same Type Of Web Application Layer Attack
App 20140317741 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Detecting web browser based attacks using browser response comparison tests launched from a remote source
Grant 8,869,279 - Shulman , et al. October 21, 2
2014-10-21
Detecting Web Browser Based Attacks Using Browser Digest Compute Tests Using Digest Code Provided By A Remote Source
App 20140289855 - Shulman; Amichai ;   et al.
2014-09-25
On-demand Content Classification Using An Out-of-band Communications Channel For Facilitating File Activity Monitoring And Control
App 20140258294 - Shulman; Amichai ;   et al.
2014-09-11
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications
App 20140230058 - Shulman; Amichai ;   et al.
2014-08-14
Detecting web browser based attacks using browser digest compute tests launched from a remote source
Grant 8,752,208 - Shulman , et al. June 10, 2
2014-06-10
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
Grant 8,713,682 - Shulman , et al. April 29, 2
2014-04-29
Method for monitoring stored procedures
Grant 8,453,255 - Shulman , et al. May 28, 2
2013-05-28
Dealing with web attacks using cryptographically signed HTTP cookies
Grant 8,448,233 - Shulman , et al. May 21, 2
2013-05-21
Techniques for tracking actual users in web application security systems
Grant 8,392,963 - Shulman , et al. March 5, 2
2013-03-05
System and method for preventing web frauds committed using client-scripting attacks
Grant 8,181,246 - Shulman , et al. May 15, 2
2012-05-15
Method and system for transparently encrypting sensitive information
Grant 8,135,948 - Shulman , et al. March 13, 2
2012-03-13
Method For Monitoring Stored Procedures
App 20120023132 - SHULMAN; Amichai ;   et al.
2012-01-26
Correlation Engine For Detecting Network Attacks And Detection Method
App 20110289583 - SHULMAN; Amichai ;   et al.
2011-11-24
Method for monitoring stored procedures
Grant 8,056,141 - Shulman , et al. November 8, 2
2011-11-08
Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
Grant 8,051,484 - Shulman , et al. November 1, 2
2011-11-01
Correlation engine for detecting network attacks and detection method
Grant 8,024,804 - Shulman , et al. September 20, 2
2011-09-20
Dynamic Learning Method And Adaptive Normal Behavior Profile (nbp) Architecture For Providing Fast Protection Of Enterprise Applications
App 20100251377 - SHULMAN; Amichai ;   et al.
2010-09-30
Method and apparatus for high-speed detection and blocking of zero day worm attacks
Grant 7,752,662 - Shulman , et al. July 6, 2
2010-07-06
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
Grant 7,743,420 - Shulman , et al. June 22, 2
2010-06-22
System and method for correlating between HTTP requests and SQL queries
Grant 7,640,235 - Shulman , et al. December 29, 2
2009-12-29
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks
App 20080320567 - SHULMAN; Amichai ;   et al.
2008-12-25
Method For Monitoring Stored Procedures
App 20080065640 - SHULMAN; Amichai ;   et al.
2008-03-13
Method and system for transparently encrypting sensitive information
App 20070294539 - Shulman; Amichai ;   et al.
2007-12-20
Correlation engine for detecting network attacks and detection method
App 20070214503 - Shulman; Amichai ;   et al.
2007-09-13
System And Method For Correlating Between Http Requests And Sql Queries
App 20070136312 - Shulman; Amichai ;   et al.
2007-06-14
Techniques For Tracking Actual Users In Web Application Security Systems
App 20070124806 - Shulman; Amichai ;   et al.
2007-05-31
Method And Security System For Indentifying And Blocking Web Attacks By Enforcing Read-only Parameters
App 20060272008 - Shulman; Amichai ;   et al.
2006-11-30
Method and apparatus for high-speed detection and blocking of zero day worm attacks
App 20050188215 - Shulman, Amichai ;   et al.
2005-08-25
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
App 20050120054 - Shulman, Amichai ;   et al.
2005-06-02
Company Registrations

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed