loadpatents
Patent applications and USPTO patent grants for Merry; Anthony John.The latest application filed is for "key throttling to mitigate unauthorized file access".
Patent | Date |
---|---|
Key throttling to mitigate unauthorized file access Grant 10,979,449 - Humphries , et al. April 13, 2 | 2021-04-13 |
Perimeter enforcement of encryption rules Grant 10,834,061 - Humphries , et al. November 10, 2 | 2020-11-10 |
Behavioral-based control of access to encrypted content by a process Grant 10,691,824 - Ray , et al. | 2020-06-23 |
Intermediate encryption for exposed content Grant 10,686,827 - Schutz , et al. | 2020-06-16 |
Key throttling to mitigate unauthorized file access Grant 10,681,078 - Humphries , et al. | 2020-06-09 |
Behavioral-based control of access to encrypted content by a process Grant 10,657,277 - Ray , et al. | 2020-05-19 |
Process-level control of encrypted content Grant 10,650,154 - Ray , et al. | 2020-05-12 |
Just-in-time encryption Grant 10,628,597 - Berger , et al. | 2020-04-21 |
Labeling objects on an endpoint for encryption management Grant 10,558,800 - Ray , et al. Feb | 2020-02-11 |
Key Throttling To Mitigate Unauthorized File Access App 20200036747 - Humphries; Russell ;   et al. | 2020-01-30 |
Key throttling to mitigate unauthorized file access Grant 10469522 - | 2019-11-05 |
Perimeter Enforcement Of Encryption Rules App 20190253399 - Humphries; Russell ;   et al. | 2019-08-15 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20190228172 - Ray; Kenneth D. ;   et al. | 2019-07-25 |
Perimeter enforcement of encryption rules Grant 10,263,966 - Humphries , et al. | 2019-04-16 |
Labeling Objects On An Endpoint For Encryption Management App 20180276378 - Ray; Kenneth D. ;   et al. | 2018-09-27 |
Behavioral-based control of access to encrypted content by a process Grant 9,984,248 - Ray , et al. May 29, 2 | 2018-05-29 |
Labeling objects on an endpoint for encryption management Grant 9,965,627 - Ray , et al. May 8, 2 | 2018-05-08 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20180075249 - Ray; Kenneth D. ;   et al. | 2018-03-15 |
Key Throttling To Mitigate Unauthorized File Access App 20170359370 - Humphries; Russell ;   et al. | 2017-12-14 |
Perimeter Enforcement Of Encryption Rules App 20170302635 - Humphries; Russell ;   et al. | 2017-10-19 |
Just-in-time Encryption App 20170302458 - Berger; Andreas ;   et al. | 2017-10-19 |
Intermediate Encryption For Exposed Content App 20170302696 - Schutz; Harald ;   et al. | 2017-10-19 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20170235967 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Process-level Control Of Encrypted Content App 20170235966 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Labeling Objects On An Endpoint For Encryption Management App 20160078225 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.