loadpatents
name:-0.047691106796265
name:-0.014223098754883
name:-0.013633012771606
Merry; Anthony John Patent Filings

Merry; Anthony John

Patent Applications and Registrations

Patent applications and USPTO patent grants for Merry; Anthony John.The latest application filed is for "key throttling to mitigate unauthorized file access".

Company Profile
13.12.12
  • Merry; Anthony John - Kessel-lo BE
  • - Kessel-lo BE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Key throttling to mitigate unauthorized file access
Grant 10,979,449 - Humphries , et al. April 13, 2
2021-04-13
Perimeter enforcement of encryption rules
Grant 10,834,061 - Humphries , et al. November 10, 2
2020-11-10
Behavioral-based control of access to encrypted content by a process
Grant 10,691,824 - Ray , et al.
2020-06-23
Intermediate encryption for exposed content
Grant 10,686,827 - Schutz , et al.
2020-06-16
Key throttling to mitigate unauthorized file access
Grant 10,681,078 - Humphries , et al.
2020-06-09
Behavioral-based control of access to encrypted content by a process
Grant 10,657,277 - Ray , et al.
2020-05-19
Process-level control of encrypted content
Grant 10,650,154 - Ray , et al.
2020-05-12
Just-in-time encryption
Grant 10,628,597 - Berger , et al.
2020-04-21
Labeling objects on an endpoint for encryption management
Grant 10,558,800 - Ray , et al. Feb
2020-02-11
Key Throttling To Mitigate Unauthorized File Access
App 20200036747 - Humphries; Russell ;   et al.
2020-01-30
Key throttling to mitigate unauthorized file access
Grant 10469522 -
2019-11-05
Perimeter Enforcement Of Encryption Rules
App 20190253399 - Humphries; Russell ;   et al.
2019-08-15
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20190228172 - Ray; Kenneth D. ;   et al.
2019-07-25
Perimeter enforcement of encryption rules
Grant 10,263,966 - Humphries , et al.
2019-04-16
Labeling Objects On An Endpoint For Encryption Management
App 20180276378 - Ray; Kenneth D. ;   et al.
2018-09-27
Behavioral-based control of access to encrypted content by a process
Grant 9,984,248 - Ray , et al. May 29, 2
2018-05-29
Labeling objects on an endpoint for encryption management
Grant 9,965,627 - Ray , et al. May 8, 2
2018-05-08
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20180075249 - Ray; Kenneth D. ;   et al.
2018-03-15
Key Throttling To Mitigate Unauthorized File Access
App 20170359370 - Humphries; Russell ;   et al.
2017-12-14
Perimeter Enforcement Of Encryption Rules
App 20170302635 - Humphries; Russell ;   et al.
2017-10-19
Just-in-time Encryption
App 20170302458 - Berger; Andreas ;   et al.
2017-10-19
Intermediate Encryption For Exposed Content
App 20170302696 - Schutz; Harald ;   et al.
2017-10-19
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20170235967 - Ray; Kenneth D. ;   et al.
2017-08-17
Process-level Control Of Encrypted Content
App 20170235966 - Ray; Kenneth D. ;   et al.
2017-08-17
Labeling Objects On An Endpoint For Encryption Management
App 20160078225 - Ray; Kenneth D. ;   et al.
2016-03-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed