loadpatents
name:-0.026204824447632
name:-0.029109001159668
name:-0.0083019733428955
Pevny; Tomas Patent Filings

Pevny; Tomas

Patent Applications and Registrations

Patent applications and USPTO patent grants for Pevny; Tomas.The latest application filed is for "automated malware classification with human-readable explanations".

Company Profile
8.21.23
  • Pevny; Tomas - Prague CZ
  • Pevny; Tomas - Prague 4 CZ
  • PEVNY; TOMAS - Modrany CZ
  • Pevny; Tomas - Praha 4 - Modrany CZ
  • Pevny; Tomas - Praha-Modrany CZ
  • Pevny; Tomas - Prague-Modrany CZ
  • Pevny; Tomas - Prague 4-Modrany CZ
  • Pevny; Tomas - Praha 4 CZ
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Analyzing encrypted traffic behavior using contextual traffic data
Grant 11,451,578 - Kohout , et al. September 20, 2
2022-09-20
Automated Malware Classification With Human-readable Explanations
App 20220237289 - Pevny; Tomas ;   et al.
2022-07-28
Detection Of Malware And Malicious Applications
App 20210360004 - McGrew; David ;   et al.
2021-11-18
Detection of malicious executable files using hierarchical models
Grant 11,113,397 - Pevny , et al. September 7, 2
2021-09-07
Detection of malware and malicious applications
Grant 11,057,420 - McGrew , et al. July 6, 2
2021-07-06
Active prioritization of investigation targets in network security
Grant 10,904,271 - Jusko , et al. January 26, 2
2021-01-26
Analyzing Encrypted Traffic Behavior Using Contextual Traffic Data
App 20210006589 - Kohout; Jan ;   et al.
2021-01-07
Leveraging endpoint and network environment inferences for malware traffic classification
Grant 10,855,698 - Anderson , et al. December 1, 2
2020-12-01
Detection Of Malicious Executable Files Using Hierarchical Models
App 20200364334 - Pevny; Tomas ;   et al.
2020-11-19
Analyzing encrypted traffic behavior using contextual traffic data
Grant 10,805,338 - Kohout , et al. October 13, 2
2020-10-13
Service usage model for traffic analysis
Grant 10,785,247 - Nikolaev , et al. Sept
2020-09-22
Private-learned IDS
Grant 10,708,284 - Kopp , et al.
2020-07-07
Illegitimate typosquatting detection with internet protocol information
Grant 10,491,614 - Grill , et al. Nov
2019-11-26
Learning indicators of compromise with hierarchical models
Grant 10,375,143 - Pevny , et al.
2019-08-06
Detection Of Malware And Malicious Applications
App 20190230095 - MCGREW; DAVID ;   et al.
2019-07-25
Leveraging Endpoint And Network Environment Inferences For Malware Traffic Classification
App 20190199739 - Anderson; Blake Harrell ;   et al.
2019-06-27
Detection of malware and malicious applications
Grant 10,305,928 - McGrew , et al.
2019-05-28
Active Prioritization Of Investigation Targets In Network Security
App 20190124094 - Jusko; Jan ;   et al.
2019-04-25
Explaining network anomalies using decision trees
Grant 10,230,747 - Kopp , et al.
2019-03-12
Rapid, targeted network threat detection
Grant 10,218,718 - Kopp , et al. Feb
2019-02-26
Private-learned Ids
App 20190014134 - Kopp; Martin ;   et al.
2019-01-10
Framework for joint learning of network traffic representations and traffic classifiers
Grant 10,079,768 - Kohout , et al. September 18, 2
2018-09-18
Service Usage Model For Traffic Analysis
App 20180212992 - Nikolaev; Ivan ;   et al.
2018-07-26
Identifying malicious executables by analyzing proxy logs
Grant 9,992,216 - Pevny , et al. June 5, 2
2018-06-05
Explaining causes of network anomalies
Grant 9,973,520 - Pevny May 15, 2
2018-05-15
Analyzing Encrypted Traffic Behavior Using Contextual Traffic Data
App 20180103056 - Kohout; Jan ;   et al.
2018-04-12
Learning Indicators Of Compromise With Hierarchical Models
App 20180063163 - Pevny; Tomas ;   et al.
2018-03-01
Rapid, Targeted Network Threat Detection
App 20180063161 - Kopp; Martin ;   et al.
2018-03-01
Framework For Joint Learning Of Network Traffic Representations And Traffic Classifiers
App 20180013681 - Kohout; Jan ;   et al.
2018-01-11
Server grouping system
Grant 9,813,442 - Jusko , et al. November 7, 2
2017-11-07
Identifying Malicious Executables By Analyzing Proxy Logs
App 20170230388 - Pevny; Tomas ;   et al.
2017-08-10
Detecting Network Address Translation Devices In A Network Based On Network Traffic Logs
App 20170230395 - Komarek; Tomas ;   et al.
2017-08-10
Server Grouping System
App 20170142151 - JUSKO; Jan ;   et al.
2017-05-18
Server grouping system
Grant 9,596,321 - Jusko , et al. March 14, 2
2017-03-14
Server Grouping System
App 20160381183 - JUSKO; Jan ;   et al.
2016-12-29
Detection of malicious network connections
Grant 9,531,742 - Kohout , et al. December 27, 2
2016-12-27
Detection Of Malware And Malicious Applications
App 20160352761 - MCGREW; DAVID ;   et al.
2016-12-01
Detection Of Malicious Network Connections
App 20160226902 - KOHOUT; Jan ;   et al.
2016-08-04
Events from network flows
Grant 9,374,383 - Sourek , et al. June 21, 2
2016-06-21
Detection of malicious network connections
Grant 9,344,441 - Kohout , et al. May 17, 2
2016-05-17
Events From Network Flows
App 20160112442 - SOUREK; Gustav ;   et al.
2016-04-21
Detection Of Malicious Network Connections
App 20160080404 - KOHOUT; Jan ;   et al.
2016-03-17
Explaining Network Anomalies Using Decision Trees
App 20160036844 - KOPP; MARTIN ;   et al.
2016-02-04
Explaining Causes Of Network Anomalies
App 20160021122 - PEVNY; TOMAS
2016-01-21

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed