loadpatents
name:-0.034080982208252
name:-0.030566215515137
name:-0.0031599998474121
Neystadt; John Patent Filings

Neystadt; John

Patent Applications and Registrations

Patent applications and USPTO patent grants for Neystadt; John.The latest application filed is for "method and system for a mobile communication device to access through a second mobile telecommunication network to services offered by a first mobile telecommunication network".

Company Profile
2.33.28
  • Neystadt; John - Madrid ES
  • Neystadt; John - Kfar-Saba IL
  • Neystadt; John - Haifa N/A IL
  • Neystadt; John - Redmond WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method and system for a mobile communication device to access services
Grant 10,362,617 - Serna , et al.
2019-07-23
Simplified login for a computing system
Grant 10,349,274 - Mendelovich , et al. July 9, 2
2019-07-09
Method And System For A Mobile Communication Device To Access Through A Second Mobile Telecommunication Network To Services Offered By A First Mobile Telecommunication Network
App 20180110081 - SERNA; JORGE ;   et al.
2018-04-19
Simplified Login For A Computing System
App 20180084422 - Mendelovich; Meir ;   et al.
2018-03-22
Simplified login for mobile devices
Grant 9,832,642 - Mendelovich , et al. November 28, 2
2017-11-28
Simplified Login For Mobile Devices
App 20160037343 - Mendelovich; Meir ;   et al.
2016-02-04
Simplified login for mobile devices
Grant 9,154,505 - Mendelovich , et al. October 6, 2
2015-10-06
User-profiling Method For Providing Advertisement Data And/or Online Content To A User And A Computer Program
App 20150269627 - Urdiales Delgado; Diego ;   et al.
2015-09-24
Method And Farm Load Balancing Device For Establishing A Bi-directional Server To Server Communication And Computer Program Thereof
App 20150189004 - MASSOVER; Alex ;   et al.
2015-07-02
Authentication delegation based on re-verification of cryptographic evidence
Grant 9,055,107 - Medvinsky , et al. June 9, 2
2015-06-09
Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol
Grant 9,049,262 - Massover , et al. June 2, 2
2015-06-02
Security virtual machine for advanced auditing
Grant 8,955,108 - Neystadt , et al. February 10, 2
2015-02-10
Protecting a virtual guest machine from attacks by an infected host
Grant 8,954,897 - Neystadt , et al. February 10, 2
2015-02-10
Federated mobile authentication using a network operator infrastructure
Grant 8,881,247 - Mendelovich , et al. November 4, 2
2014-11-04
Method And System For Combined Peer-two-peer (p2p) And Central Relay Server-based Telecommunication Conferencing Using A Telephony And Conferencing Protocol
App 20140241215 - MASSOVER; Alex ;   et al.
2014-08-28
Automated security classification and propagation of virtualized and physical virtual machines
Grant 8,799,985 - Vinberg , et al. August 5, 2
2014-08-05
Model based systems management in virtualized and non-virtualized environments
Grant 8,726,334 - Neystadt , et al. May 13, 2
2014-05-13
Simplified Login for Mobile Devices
App 20140129826 - Mendelovich; Meir ;   et al.
2014-05-08
Access control using identifiers in links
Grant 8,719,582 - Neystadt , et al. May 6, 2
2014-05-06
Detection of adversaries through collection and correlation of assessments
Grant 8,677,479 - Neystadt , et al. March 18, 2
2014-03-18
Simplified login for mobile devices
Grant 8,631,237 - Mendelovich , et al. January 14, 2
2014-01-14
Collecting anonymous and traceable telemetry
Grant 8,607,305 - Neystadt , et al. December 10, 2
2013-12-10
Automated collection of forensic evidence associated with a network security incident
Grant 8,424,094 - Neystadt , et al. April 16, 2
2013-04-16
Information protection applied by an intermediary device
Grant 8,341,720 - Ben-Yochanan , et al. December 25, 2
2012-12-25
Fuzzing encoded data
Grant 8,286,133 - Natanov , et al. October 9, 2
2012-10-09
Social Marketing Manager
App 20120158476 - NEYSTADT; John ;   et al.
2012-06-21
Federated Mobile Authentication Using A Network Operator Infrastructure
App 20120079569 - Mendelovich; Meir ;   et al.
2012-03-29
Relations in fuzzing data
Grant 8,136,095 - Natanov , et al. March 13, 2
2012-03-13
Automated Security Classification And Propagation Of Virtualized And Physical Virtual Machines
App 20110138442 - Vinberg; Anders B. ;   et al.
2011-06-09
Model Based Systems Management In Virtualized And Non-virtualized Environments
App 20110138441 - Neystadt; John ;   et al.
2011-06-09
Reduction of false positive reputations through collection of overrides from customer deployments
Grant 7,953,969 - Neystadt , et al. May 31, 2
2011-05-31
Testing software applications with schema-based fuzzing
Grant 7,926,114 - Neystadt , et al. April 12, 2
2011-04-12
Detecting compromised computers by correlating reputation data with web access logs
Grant 7,882,542 - Neystadt , et al. February 1, 2
2011-02-01
Security Virtual Machine For Advanced Auditing
App 20100325727 - Neystadt; John ;   et al.
2010-12-23
Access Control Using Identifiers In Links
App 20100228989 - Neystadt; John ;   et al.
2010-09-09
Information Protection Applied By An Intermediary Device
App 20100180332 - Ben-Yochanan; Noam ;   et al.
2010-07-15
Protecting A Virtual Guest Machine From Attacks By An Infected Host
App 20100058432 - Neystadt; John ;   et al.
2010-03-04
Collecting Anonymous And Traceable Telemetry
App 20100058454 - Neystadt; John ;   et al.
2010-03-04
Chain Of Events Tracking With Data Tainting For Automated Security Feedback
App 20090328210 - Khachaturov; Vassilii ;   et al.
2009-12-31
Simplified Login For Mobile Devices
App 20090271621 - Mendelovich; Meir ;   et al.
2009-10-29
Relations In Fuzzing Data
App 20090164478 - Natanov; Nissim ;   et al.
2009-06-25
Fuzzing Encoded Data
App 20090164975 - Natanov; Nissim ;   et al.
2009-06-25
Testing Software Applications with Schema-based Fuzzing
App 20080301813 - Neystadt; John ;   et al.
2008-12-04
Reduction of false positive reputations through collection of overrides from customer deployments
App 20080256622 - Neystadt; John ;   et al.
2008-10-16
Detection of adversaries through collection and correlation of assessments
App 20080256619 - Neystadt; John ;   et al.
2008-10-16
Detecting compromised computers by correlating reputation data with web access logs
App 20080244748 - Neystadt; John ;   et al.
2008-10-02
Automated collection of forensic evidence associated with a network security incident
App 20080244694 - Neystadt; John ;   et al.
2008-10-02
Detecting adversaries by correlating detected malware with web access logs
App 20080244742 - Neystadt; John ;   et al.
2008-10-02
Automated identification of firewall malware scanner deficiencies
App 20080229419 - Holostov; Vladimir ;   et al.
2008-09-18
Authentication delegation based on re-verification of cryptographic evidence
App 20080134311 - Medvinsky; Gennady ;   et al.
2008-06-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed