loadpatents
name:-0.013442993164062
name:-0.065371990203857
name:-0.001190185546875
Nachenberg; Carey Patent Filings

Nachenberg; Carey

Patent Applications and Registrations

Patent applications and USPTO patent grants for Nachenberg; Carey.The latest application filed is for "systems and methods for handling fraudulent uses of brands".

Company Profile
0.57.10
  • Nachenberg; Carey - Manhattan Beach CA
  • Nachenberg; Carey - Northridge CA
  • Nachenberg; Carey - Beach CA
  • Nachenberg; Carey - Santa Monica CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Systems and methods for providing supply-chain trust networks
Grant 10,033,764 - Nachenberg July 24, 2
2018-07-24
Systems and methods for detecting malware
Grant 10,007,786 - Bhatkar , et al. June 26, 2
2018-06-26
Systems and methods for improving the classification accuracy of trustworthiness classifiers
Grant 9,992,211 - Viljoen , et al. June 5, 2
2018-06-05
Systems and methods for handling fraudulent uses of brands
Grant 9,971,878 - Nachenberg May 15, 2
2018-05-15
Methods and systems for creating and updating approved-file and trusted-domain databases
Grant 9,959,404 - Nachenberg , et al. May 1, 2
2018-05-01
Systems and methods for assessing internet addresses
Grant 9,569,619 - Wilhelm , et al. February 14, 2
2017-02-14
Systems And Methods For Handling Fraudulent Uses Of Brands
App 20160063218 - Nachenberg; Carey
2016-03-03
Systems and methods for assessing internet addresses
Grant 9,268,940 - Wilhelm , et al. February 23, 2
2016-02-23
Systems and methods for determining a reputation of at least one telephone number associated with an unclassified source
Grant 9,253,010 - Nachenberg February 2, 2
2016-02-02
Systems and methods for detecting malicious files
Grant 9,202,050 - Nachenberg December 1, 2
2015-12-01
Using Confidence About User Intent In A Reputation System
App 20150269379 - Ramzan; Zulfikar ;   et al.
2015-09-24
Using confidence about user intent in a reputation system
Grant 9,081,958 - Ramzan , et al. July 14, 2
2015-07-14
Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications
Grant 9,009,459 - Nachenberg , et al. April 14, 2
2015-04-14
Using metadata in security tokens to prevent coordinated gaming in a reputation system
Grant 8,997,190 - Nachenberg , et al. March 31, 2
2015-03-31
Identifying trojanized applications for mobile environments
Grant 8,806,643 - Nachenberg August 12, 2
2014-08-12
Universal data-driven computer proxy
Grant 8,713,544 - Sulton , et al. April 29, 2
2014-04-29
Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System
App 20140026199 - Nachenberg; Carey ;   et al.
2014-01-23
Using metadata in security tokens to prevent coordinated gaming in a reputation system
Grant 8,621,654 - Nachenberg , et al. December 31, 2
2013-12-31
Identifying Trojanized Applications for Mobile Environments
App 20130191918 - Nachenberg; Carey
2013-07-25
Circumstantial blocking of incoming network traffic containing code
Grant 8,271,774 - Nachenberg , et al. September 18, 2
2012-09-18
Detection of e-mail threat acceleration
Grant 8,201,254 - Wilhelm , et al. June 12, 2
2012-06-12
Hygiene-based discovery of exploited portals
Grant 8,201,255 - Nachenberg June 12, 2
2012-06-12
Piggybacking malicious code blocker
Grant 8,196,200 - Yeo , et al. June 5, 2
2012-06-05
Extrusion detection of obfuscated content
Grant 8,181,036 - Nachenberg May 15, 2
2012-05-15
Method and apparatus for content based encryption
Grant 8,127,149 - Nachenberg February 28, 2
2012-02-28
Method and apparatus for detecting leakage of sensitive information
Grant 8,127,360 - Wilhelm , et al. February 28, 2
2012-02-28
Automatic software categorization and recommendations
Grant 8,112,412 - Nachenberg February 7, 2
2012-02-07
Scaled scanning parameterization
Grant 7,930,739 - Nachenberg April 19, 2
2011-04-19
Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System
App 20110067086 - Nachenberg; Carey ;   et al.
2011-03-17
Using Confidence About User Intent In A Reputation System
App 20110040825 - Ramzan; Zulfikar ;   et al.
2011-02-17
Customized alerting of users to probable data theft
Grant 7,873,999 - Nachenberg , et al. January 18, 2
2011-01-18
Pattern matching using embedded functions
Grant 7,861,304 - Nachenberg , et al. December 28, 2
2010-12-28
Effective aggregation and presentation of database intrusion incidents
Grant 7,774,361 - Nachenberg , et al. August 10, 2
2010-08-10
Policy enforcement in continuous data protection backup systems
Grant 7,774,313 - Nachenberg August 10, 2
2010-08-10
Detecting polymorphic threats
Grant 7,739,740 - Nachenberg , et al. June 15, 2
2010-06-15
Privacy preservation for voice over internet protocol calling
Grant 7,729,342 - Satish , et al. June 1, 2
2010-06-01
Using inserted e-mail headers to enforce a security policy
Grant 7,685,639 - McCorkendale , et al. March 23, 2
2010-03-23
Protection of sensitive data from malicious e-mail
Grant 7,617,532 - Alexander , et al. November 10, 2
2009-11-10
Real-time training for a computer code intrusion detection system
Grant 7,568,229 - Nachenberg , et al. July 28, 2
2009-07-28
Bulk electronic message detection by header similarity analysis
Grant 7,555,524 - Hartman , et al. June 30, 2
2009-06-30
Methods And Systems For Creating And Updating Approved-file And Trusted-domain Databases
App 20090089290 - Nachenberg; Carey ;   et al.
2009-04-02
Using run length encoding to detect target images
Grant 7,492,957 - Bonhaus , et al. February 17, 2
2009-02-17
Blocking e-mail propagation of suspected malicious computer code
Grant 7,490,244 - Kennedy , et al. February 10, 2
2009-02-10
Heuristic detection of computer viruses
Grant 7,478,431 - Nachenberg January 13, 2
2009-01-13
Selective detection of malicious computer code
Grant 7,458,099 - Nachenberg , et al. November 25, 2
2008-11-25
Computer code intrusion detection system based on acceptable retrievals
Grant 7,406,714 - Nachenberg July 29, 2
2008-07-29
Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
Grant 7,373,519 - Nachenberg , et al. May 13, 2
2008-05-13
Countering malicious code infections to computer files that have been infected more than once
Grant 7,367,056 - Szor , et al. April 29, 2
2008-04-29
Selective detection of malicious computer code
Grant 7,337,471 - Nachenberg , et al. February 26, 2
2008-02-26
Multi-tiered incremental software updating
Grant 7,185,332 - Waldin , et al. February 27, 2
2007-02-27
Signature driven cache extension for stream based scanning
Grant 7,130,981 - Nachenberg October 31, 2
2006-10-31
Selective detection of malicious computer code
App 20040068664 - Nachenberg, Carey ;   et al.
2004-04-08
Multi-tiered incremental software updating
Grant 6,651,249 - Waldin , et al. November 18, 2
2003-11-18
Multi-tiered Incremental Software Updating
App 20030177485 - WALDIN, RAY SOON JR. ;   et al.
2003-09-18
Antivirus accelerator for computer networks
Grant 6,094,731 - Waldin , et al. July 25, 2
2000-07-25
Emulation repair system
Grant 6,067,410 - Nachenberg May 23, 2
2000-05-23
Multi-tiered incremental software updating
Grant 6,052,531 - Waldin, Jr. , et al. April 18, 2
2000-04-18
Antivirus accelerator
Grant 6,021,510 - Nachenberg February 1, 2
2000-02-01
Polymorphic virus detection module
Grant 5,696,822 - Nachenberg December 9, 1
1997-12-09

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed