loadpatents
name:-0.01471209526062
name:-0.049665927886963
name:-0.0088779926300049
Ismael; Osman Abdoul Patent Filings

Ismael; Osman Abdoul

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ismael; Osman Abdoul.The latest application filed is for "formally verified trusted computing base with active security and policy enforcement".

Company Profile
8.52.14
  • Ismael; Osman Abdoul - Annapolis MD
  • Ismael; Osman Abdoul - Palo Alto CA
  • Ismael; Osman Abdoul - Milpitas CA
  • Ismael; Osman Abdoul - Grenoble FR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Formally verified trusted computing base with active security and policy enforcement
Grant 11,442,770 - Ismael , et al. September 13, 2
2022-09-13
Formally Verified Trusted Computing Base with Active Security and Policy Enforcement
App 20220114009 - Ismael; Osman Abdoul ;   et al.
2022-04-14
Verification of trusted threat-aware visualization layer
Grant 11,244,056 - Ismael , et al. February 8, 2
2022-02-08
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
Grant 11,240,262 - Aziz , et al. February 1, 2
2022-02-01
System and method for detecting malicious network content using virtual environment components
Grant 11,153,341 - Ismael , et al. October 19, 2
2021-10-19
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
Grant 11,089,057 - Aziz , et al. August 10, 2
2021-08-10
System, apparatus and method for reconfiguring virtual machines
Grant 11,075,945 - Ismael July 27, 2
2021-07-27
Real-time visual playback with synchronous textual analysis log display and event/time indexing
Grant 10,929,266 - Goradia , et al. February 23, 2
2021-02-23
Verification and enhancement using detection systems located at the network periphery and endpoint devices
Grant 10,893,059 - Aziz , et al. January 12, 2
2021-01-12
Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
Grant 10,826,933 - Ismael , et al. November 3, 2
2020-11-03
Threat-aware architecture
Grant 10,740,456 - Ismael , et al. A
2020-08-11
Secure communications between peers using a verified virtual trusted platform module
Grant 10,592,678 - Ismael , et al.
2020-03-17
Microvisor-based malware detection appliance architecture
Grant 10,528,726 - Ismael J
2020-01-07
Code injection technique for remediation at an endpoint of a network
Grant 10,474,813 - Ismael Nov
2019-11-12
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
Grant 10,476,909 - Aziz , et al. Nov
2019-11-12
Optimized resource allocation for virtual machines within a malware content detection system
Grant 10,469,512 - Ismael No
2019-11-05
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
Grant 10,462,173 - Aziz , et al. Oc
2019-10-29
Framework for efficient security coverage of mobile software applications
Grant 10,296,437 - Ismael , et al.
2019-05-21
System and method for analysis of a memory dump associated with a potentially malicious content suspect
Grant 10,198,574 - Thioux , et al. Fe
2019-02-05
Technique for implementing memory views using a layered virtualization architecture
Grant 10,191,861 - Steinberg , et al. Ja
2019-01-29
Security cloud service framework for hardening in the field code of mobile software applications
Grant 10,181,029 - Ismael , et al. Ja
2019-01-15
Page replacement code injection
Grant 10,089,461 - Ha , et al. October 2, 2
2018-10-02
Verification of complex software code using a modularized architecture
Grant 10,025,691 - Ismael , et al. July 17, 2
2018-07-17
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
Grant 10,019,338 - Goradia , et al. July 10, 2
2018-07-10
Verification of trusted threat-aware microvisor
Grant 10,002,252 - Ismael , et al. June 19, 2
2018-06-19
Framework For Efficient Security Coverage Of Mobile Software Applications
App 20180121316 - Ismael; Osman Abdoul ;   et al.
2018-05-03
Micro-virtualization architecture for threat-aware module deployment in a node of a network environment
Grant 9,946,568 - Ismael , et al. April 17, 2
2018-04-17
Malware detection appliance architecture
Grant 9,934,376 - Ismael April 3, 2
2018-04-03
System and method for enhanced security of storage devices
Grant 9,921,978 - Chan , et al. March 20, 2
2018-03-20
Injection of content processing delay in an endpoint
Grant 9,912,681 - Ismael , et al. March 6, 2
2018-03-06
System, Apparatus And Method For Using Malware Analysis Results To Drive Adaptive Instrumentation Of Virtual Machines To Improve Exploit Detection
App 20180013770 - Ismael; Osman Abdoul
2018-01-11
Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
Grant 9,824,209 - Ismael , et al. November 21, 2
2017-11-21
Framework for efficient security coverage of mobile software applications
Grant 9,792,196 - Ismael , et al. October 17, 2
2017-10-17
System and method for IPS and VM-based detection of suspicious objects
Grant 9,756,074 - Aziz , et al. September 5, 2
2017-09-05
Threat-aware microvisor
Grant 9,740,857 - Ismael , et al. August 22, 2
2017-08-22
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
Grant 9,736,179 - Ismael August 15, 2
2017-08-15
Trusted threat-aware microvisor
Grant 9,680,862 - Ismael , et al. June 13, 2
2017-06-13
Framework for efficient security coverage of mobile software applications using machine learning
Grant 9,594,905 - Ismael , et al. March 14, 2
2017-03-14
Exploit detection system with threat-aware microvisor
Grant 9,507,935 - Ismael , et al. November 29, 2
2016-11-29
Optimized resource allocation for virtual machines within a malware content detection system
Grant 9,495,180 - Ismael November 15, 2
2016-11-15
Microvisor-based Malware Detection Endpoint Architecture
App 20160191550 - Ismael; Osman Abdoul ;   et al.
2016-06-30
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
Grant 9,367,681 - Ismael , et al. June 14, 2
2016-06-14
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
Grant 9,306,974 - Aziz , et al. April 5, 2
2016-04-05
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
Grant 9,292,686 - Ismael , et al. March 22, 2
2016-03-22
Trusted Threat-aware Microvisor
App 20160006756 - Ismael; Osman Abdoul ;   et al.
2016-01-07
Verification Of Trusted Threat-aware Microvisor
App 20160004869 - Ismael; Osman Abdoul ;   et al.
2016-01-07
Framework for iterative analysis of mobile software applications
Grant 9,225,740 - Ismael , et al. December 29, 2
2015-12-29
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
Grant 9,195,829 - Goradia , et al. November 24, 2
2015-11-24
Framework for efficient security coverage of mobile software applications
Grant 9,176,843 - Ismael , et al. November 3, 2
2015-11-03
Framework for computer application analysis of sensitive information tracking
Grant 9,159,035 - Ismael , et al. October 13, 2
2015-10-13
Threat-aware Microvisor
App 20150199513 - Ismael; Osman Abdoul ;   et al.
2015-07-16
Micro-virtualization Architecture For Threat-aware Microvisor Deployment In A Node Of A Network Environment
App 20150199532 - Ismael; Osman Abdoul ;   et al.
2015-07-16
Exploit Detection System With Threat-aware Microvisor
App 20150199531 - Ismael; Osman Abdoul ;   et al.
2015-07-16
System, Apparatus And Method For Automatically Verifying Exploits Within Suspect Objects And Highlighting The Display Information Associated With The Verified Exploits
App 20150186645 - Aziz; Ashar ;   et al.
2015-07-02
Framework for efficient security coverage of mobile software applications installed on mobile devices
Grant 9,009,823 - Ismael , et al. April 14, 2
2015-04-14
Framework for multi-phase analysis of mobile applications
Grant 9,009,822 - Ismael , et al. April 14, 2
2015-04-14
System, Apparatus and Method for Using Malware Analysis Results to Drive Adaptive Instrumentation of Virtual Machines to Improve Exploit Detection
App 20150096025 - Ismael; Osman Abdoul
2015-04-02
Optimized Resource Allocation For Virtual Machines Within A Malware Content Detection System
App 20140337836 - Ismael; Osman Abdoul
2014-11-13
Detecting malicious network content using virtual environment components
Grant 8,793,787 - Ismael , et al. July 29, 2
2014-07-29
Detecting Malicious Network Content Using Virtual Environment Components
App 20100192223 - Ismael; Osman Abdoul ;   et al.
2010-07-29
Remote object access
Grant 6,851,118 - Ismael , et al. February 1, 2
2005-02-01
Method and system for remotely browsing objects
Grant 6,356,931 - Ismael , et al. March 12, 2
2002-03-12
Method And System For Remotely Browsing Objects
App 20010054062 - ISMAEL, OSMAN ABDOUL ;   et al.
2001-12-20
Method and system for remotely browsing objects
Grant 6,134,581 - Ismael , et al. October 17, 2
2000-10-17
Bean-based management system
Grant 6,061,721 - Ismael , et al. May 9, 2
2000-05-09

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed