loadpatents
name:-0.016236066818237
name:-0.0070600509643555
name:-0.0022690296173096
Julisch; Klaus Patent Filings

Julisch; Klaus

Patent Applications and Registrations

Patent applications and USPTO patent grants for Julisch; Klaus.The latest application filed is for "automated network deployment of cloud services into a network".

Company Profile
0.10.13
  • Julisch; Klaus - Rueschlikon CH
  • Julisch; Klaus - Bonstetten N/A CH
  • Julisch; Klaus - Kilchberg N/A CH
  • Julisch; Klaus - White Plains NY
  • Julisch; Klaus - Horgen CH
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Automated network deployment of cloud services into a network
Grant 9,094,457 - Julisch , et al. July 28, 2
2015-07-28
Method and apparatus for automated assignment of access permissions to users
Grant 8,826,455 - Julisch , et al. September 2, 2
2014-09-02
Automated Network Deployment Of Cloud Services Into A Network
App 20140033268 - Julisch; Klaus ;   et al.
2014-01-30
Method, computer program element and a system for processing alarms triggered by a monitoring system
Grant 8,615,803 - Dacier , et al. December 24, 2
2013-12-24
Integrity verification using a peripheral device
Grant 8,544,092 - Hermann , et al. September 24, 2
2013-09-24
Resolving An Exchange Of Objects In A Communication Network
App 20130031182 - Gross; Thomas R. ;   et al.
2013-01-31
Locating Documents For Providing Data Leakage Prevention Within An Information Security Management System
App 20120084868 - Julisch; Klaus
2012-04-05
Computer-implemented method, computer program and system for analyzing data records by generalizations on redundant attributes
Grant 7,953,677 - Baum-Waidner , et al. May 31, 2
2011-05-31
Integrity Verification Using a Peripheral Device
App 20100235912 - Hermann; Reto ;   et al.
2010-09-16
Method And Apparatus For Automated Assignment Of Access Permissions To Users
App 20100211989 - Julisch; Klaus ;   et al.
2010-08-19
Method, Computer Program Element And A System For Processing Alarms Triggered By A Monitoring System
App 20080291018 - Dacier; Marc ;   et al.
2008-11-27
Method, computer program element and a system for processing alarms triggered by a monitoring system
Grant 7,437,762 - Dacier , et al. October 14, 2
2008-10-14
Network Attack Signature Generation
App 20080235799 - Julisch; Klaus ;   et al.
2008-09-25
Computer-implemented Method, Computer Program And System For Analyzing Data Records
App 20080222059 - Baum-Waidner; Birgit ;   et al.
2008-09-11
Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
Grant 7,406,606 - Chawla , et al. July 29, 2
2008-07-29
Attack signature generation
App 20070094728 - Julisch; Klaus ;   et al.
2007-04-26
Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
App 20050229253 - Chawla, Anil Jagdish ;   et al.
2005-10-13
Method, computer program element and a system for processing alarms triggered by a monitoring system
App 20030110398 - Dacier, Marc ;   et al.
2003-06-12
Method, computer program element and system for processing alarms triggered by a monitoring system
App 20030101260 - Dacier, Marc ;   et al.
2003-05-29

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed