loadpatents
name:-0.068173170089722
name:-0.012605905532837
name:-0.0027718544006348
Margalit; Dany Patent Filings

Margalit; Dany

Patent Applications and Registrations

Patent applications and USPTO patent grants for Margalit; Dany.The latest application filed is for "method to detect viruses hidden inside a password-protected archive of compressed files".

Company Profile
0.9.46
  • Margalit; Dany - Ramat-Gan IL
  • Margalit; Dany - Ramat Chen IL
  • Margalit, Dany - Ramat-Gun IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method and system for detecting blocking and removing spyware
Grant 7,636,943 - Gruper , et al. December 22, 2
2009-12-22
Method and system for indicating an executable as trojan horse
Grant 7,603,614 - Cohen , et al. October 13, 2
2009-10-13
Method to detect viruses hidden inside a password-protected archive of compressed files
App 20090210943 - Alon; Galit ;   et al.
2009-08-20
Load-Balancing Bridge Cluster For Network Nodes
App 20080259797 - Gruper; Shimon ;   et al.
2008-10-23
Method For Detecting Duplicated Instances Of A Software License
App 20080208754 - Zunke; Michael ;   et al.
2008-08-28
Self-defensive protected software with suspended latent license enforcement
App 20080209558 - Zunke; Michael ;   et al.
2008-08-28
Method for detecting that a protected software program is cracked
App 20080209559 - Zunke; Michael ;   et al.
2008-08-28
Method for preventing activation of malicious objects
Grant 7,386,884 - Cohen , et al. June 10, 2
2008-06-10
Communication Interface
App 20080005430 - Kozenitzky; Ron ;   et al.
2008-01-03
Method And System For Preventing Exploitation Of Email Messages
App 20070277238 - Margalit; Yanki ;   et al.
2007-11-29
Method and system for indicating an executable as trojan horse
App 20070226603 - Cohen; Oded ;   et al.
2007-09-27
Method For Assigning An IP Address To A Network Connectable Device, And A Device Configured Thereby
App 20070217413 - Margalit; Dany ;   et al.
2007-09-20
Method and system for increasing sales of digital product modules
App 20070208673 - Maggor; Amos ;   et al.
2007-09-06
Method for serving a plurality of applications by a security token
App 20070204167 - Beker; Vladimir ;   et al.
2007-08-30
User-computer interaction method for use by a population of flexible connectable computer systems
Grant 7,249,266 - Margalit , et al. July 24, 2
2007-07-24
Method for increasing the security level of a user machine browsing web pages
App 20070011739 - Zamir; Shay ;   et al.
2007-01-11
Method and system for detecting a malicious packed executable
App 20070006300 - Zamir; Shay ;   et al.
2007-01-04
Method and system for detecting blocking and removing spyware
App 20060282890 - Gruper; Shimon ;   et al.
2006-12-14
Security card apparatus
App 20060255158 - Margalit; Yanki ;   et al.
2006-11-16
Method and system for protecting of software application from piracy
App 20060242082 - Margalit; Yanki ;   et al.
2006-10-26
Method and system for rendering single sign on
App 20060206930 - Parashi; Golan ;   et al.
2006-09-14
Extended CD
App 20060206910 - Kozenitzky; Ron ;   et al.
2006-09-14
Method and system for controlling access to a service provided through a network
App 20060190990 - Gruper; Shimon ;   et al.
2006-08-24
Security card apparatus
App 20060180674 - Margalit; Yanki ;   et al.
2006-08-17
Method and apparatus for rendering load balancing and failover
App 20060168084 - Kogan; Leonid ;   et al.
2006-07-27
Method for blocking unauthorized use of a software application
App 20060137016 - Margalit; Dany ;   et al.
2006-06-22
Method for indicating the integrity of a collection of digital objects
Grant 7,065,650 - Collins , et al. June 20, 2
2006-06-20
Method and system for identifying and blocking spam email messages at an inspecting point
App 20060075048 - Gruper; Shimon ;   et al.
2006-04-06
Method for emulating an executable code in order to detect maliciousness
Grant 7,013,483 - Cohen , et al. March 14, 2
2006-03-14
Method and apparatus for securing data stored within a non-volatile memory
App 20060050871 - Ranen; Ohad ;   et al.
2006-03-09
Method for inspecting an archive
App 20060053180 - Alon; Galit ;   et al.
2006-03-09
Method for detecting unwanted executables
App 20060015940 - Zamir; Shay ;   et al.
2006-01-19
Method for protecting a computer from suspicious objects
App 20060010495 - Cohen; Oded ;   et al.
2006-01-12
Method and system for securing a device
App 20050283633 - Kozenitzky, Ron ;   et al.
2005-12-22
Method for indicating the integrity of a collection of digital objects
App 20050251682 - Collins, Michael ;   et al.
2005-11-10
Method for preventing activation of malicious objects
App 20050235160 - Cohen, Oded ;   et al.
2005-10-20
Method for speeding up the pass time of an executable through a checkpoint
App 20050149720 - Gruper, Shimon ;   et al.
2005-07-07
Method for indicating the integrity of use-information of a computer program
Grant 6,898,555 - Levi , et al. May 24, 2
2005-05-24
Method for hiding information on a computer
App 20050086528 - Darziv, Ron ;   et al.
2005-04-21
Method and system for preventing exploiting an email message
App 20050081057 - Cohen, Oded ;   et al.
2005-04-14
Security token
App 20050050330 - Agam, Leedor ;   et al.
2005-03-03
Method for indicating the integrity of use-information of a computer program
App 20050015218 - Levi, Asaf ;   et al.
2005-01-20
User-computer interaction method for use by a population of flexible connectable computer systems
App 20040202325 - Margalit, Yanki ;   et al.
2004-10-14
Method for assigning an IP address to a network connectable device
App 20040139226 - Margalit, Dany ;   et al.
2004-07-15
USB key apparatus for interacting with a USB host via a USB port
Grant 6,763,399 - Margalit , et al. July 13, 2
2004-07-13
Method for emulating an executable code in order to detect maliciousness
App 20040133796 - Cohen, Oded ;   et al.
2004-07-08
Method and system for detecting presence of malicious code in the e-mail messages of an organization
App 20040128536 - Elzam, Ofer ;   et al.
2004-07-01
User-computer interaction method for use by a population of flexibly connectable computer systems
Grant 6,748,541 - Margalit , et al. June 8, 2
2004-06-08
Usb Key Apparatus For Interacting With A Usb Host Via A Usb Port
App 20040073726 - Margalit, Yanki ;   et al.
2004-04-15
Method for determining a licensing policy of a digital product
App 20040073517 - Zunke, Michael ;   et al.
2004-04-15
Method and system for detecting malicious activity and virus outbreak in email
App 20040054742 - Gruper, Shimon ;   et al.
2004-03-18
Method and system for functionally connecting a personal device to a host computer
App 20030087601 - Agam, Leedor ;   et al.
2003-05-08
Method and system for rendering secure pin entry
App 20030088794 - Agam, Leedor ;   et al.
2003-05-08
Classifying digital object security category
App 20030079142 - Margalit, Dany ;   et al.
2003-04-24
Authentication employing the bluetooth communication protocol
App 20020141586 - Margalit, Yanki ;   et al.
2002-10-03
Company Registrations
SEC0000937421MARGALIT DANY

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed