loadpatents
name:-0.010986089706421
name:-0.008674144744873
name:-0.010496854782104
Koren; Tomer Patent Filings

Koren; Tomer

Patent Applications and Registrations

Patent applications and USPTO patent grants for Koren; Tomer.The latest application filed is for "linear time algorithms for privacy preserving convex optimization".

Company Profile
11.9.10
  • Koren; Tomer - Tel-Aviv IL
  • Koren; Tomer - Herzliya IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Attack detection through exposure of command abuse
Grant 11,416,613 - Weizman , et al. August 16, 2
2022-08-16
Detecting attacks on web applications using server logs
Grant 11,223,637 - Neuvirth , et al. January 11, 2
2022-01-11
Whitelisting of trusted accessors to restricted web pages
Grant 11,196,746 - Karin , et al. December 7, 2
2021-12-07
Cloud view detection of virtual machine brute force attacks
Grant 11,159,542 - Weinberger , et al. October 26, 2
2021-10-26
System and method for restricting access to web resources
Grant 11,089,024 - Patrich , et al. August 10, 2
2021-08-10
Linear Time Algorithms For Privacy Preserving Convex Optimization
App 20210158211 - Talwar; Kunal ;   et al.
2021-05-27
Attack Detection Through Exposure Of Command Abuse
App 20210064749 - WEIZMAN; Josef ;   et al.
2021-03-04
Distributed system for adaptive protection against web-service- targeted vulnerability scanners
Grant 10,887,326 - Weizman , et al. January 5, 2
2021-01-05
Cloud View Detection Of Virtual Machine Brute Force Attacks
App 20200304524 - WEINBERGER; Tomer ;   et al.
2020-09-24
Network attack detection
Grant 10,581,915 - Scherman , et al.
2020-03-03
Whitelisting Of Trusted Accessors To Restricted Web Pages
App 20200014697 - KARIN; Omer ;   et al.
2020-01-09
Non-protocol specific system and method for classifying suspect IP addresses as sources of non-targeted attacks on cloud based machines
Grant 10,511,615 - Ronen , et al. Dec
2019-12-17
Validating correlation between chains of alerts using cloud view
Grant 10,447,525 - Patrich , et al. Oc
2019-10-15
Distributed System for Adaptive Protection Against Web-Service-Targeted Vulnerability Scanners
App 20190306178 - WEIZMAN; Josef ;   et al.
2019-10-03
System And Method For Restricting Access To Web Resources
App 20190281064 - Patrich; Dotan ;   et al.
2019-09-12
Detecting Attacks On Web Applications Using Server Logs
App 20190215330 - NEUVIRTH; Hani Hana ;   et al.
2019-07-11
Validating Correlation Between Chains Of Alerts Using Cloud View
App 20180351783 - Patrich; Dotan ;   et al.
2018-12-06
Non-protocol Specific System And Method For Classifying Suspect Ip Addresses As Sources Of Non-targeted Attacks On Cloud Based Machines
App 20180324193 - RONEN; Royi ;   et al.
2018-11-08
Network Attack Detection
App 20180124073 - Scherman; Mathias ;   et al.
2018-05-03

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed