name:-0.049607038497925
name:-0.037590980529785
name:-0.020232200622559
Qualys, Inc. Patent Filings

Qualys, Inc.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Qualys, Inc..The latest application filed is for "attack path and graph creation based on user and system profiling".

Company Profile
18.55.42
  • Qualys, Inc. - Foster City CA US
  • QUALYS, INC. - Redwood Shores CA US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Trademarks
Patent Activity
PatentDate
Attack Path and Graph Creation Based on User and System Profiling
App 20220311798 - Dani; Mayuresh Vishwas ;   et al.
2022-09-29
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
App 20220294810 - Tyagi; Ankur S. ;   et al.
2022-09-15
Attack Kill Chain Generation and Utilization for Threat Analysis
App 20220277078 - Tyagi; Ankur S. ;   et al.
2022-09-01
Rest API Scanning for Security Testing
App 20220191237 - Nikam; Ganesh ;   et al.
2022-06-16
Attack path and graph creation based on user and system profiling
Grant 11,363,052 - Dani , et al. June 14, 2
2022-06-14
Asset remediation trend map generation and utilization for threat mitigation
Grant 11,343,263 - Tyagi , et al. May 24, 2
2022-05-24
Attack kill chain generation and utilization for threat analysis
Grant 11,334,666 - Tyagi , et al. May 17, 2
2022-05-17
Rest api scanning for security testing
Grant 11,265,342 - Nikam , et al. March 1, 2
2022-03-01
Rest API Scanning for Security Testing
App 20220006829 - Nikam; Ganesh ;   et al.
2022-01-06
System and Method for Performing Remote Security Assessment of Firewalled Computer
App 20210385243 - Ali-Ahmad; Wissam ;   et al.
2021-12-09
Dynamic Hierarchical Tagging System and Method
App 20210273972 - Molloy; Sean M. ;   et al.
2021-09-02
System and method for performing remote security assessment of firewalled computer
Grant 11,102,234 - Ali-Ahmad , et al. August 24, 2
2021-08-24
Domain Specific Language for Defending Against a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
App 20210243230 - Dani; Mayuresh Vishwas ;   et al.
2021-08-05
Domain-Specific Language Simulant for Simulating a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
App 20210218767 - Dani; Mayuresh Vishwas ;   et al.
2021-07-15
Dynamic hierarchical tagging system and method
Grant 11,012,460 - Molloy , et al. May 18, 2
2021-05-18
Advanced asset tracking and correlation
Grant 10,986,135 - Molloy , et al. April 20, 2
2021-04-20
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
Grant 10,965,709 - Dani , et al. March 30, 2
2021-03-30
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
Grant 10,965,712 - Dani , et al. March 30, 2
2021-03-30
Domain specific language for threat-actor deception
Grant 10,958,686 - Dani , et al. March 23, 2
2021-03-23
Attack Path and Graph Creation Based on User and System Profiling
App 20210021629 - Dani; Mayuresh Vishwas ;   et al.
2021-01-21
Attack Kill Chain Generation and Utilization for Threat Analysis
App 20200327224 - Tyagi; Ankur S. ;   et al.
2020-10-15
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
App 20200329055 - Tyagi; Ankur S. ;   et al.
2020-10-15
Domain-Specific Language Simulant for Simulating a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
App 20200329067 - Dani; Mayuresh Vishwas ;   et al.
2020-10-15
Domain Specific Language for Threat-Actor Deception
App 20200329070 - Dani; Mayuresh Vishwas ;   et al.
2020-10-15
Domain Specific Language for Defending Against a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
App 20200329071 - Dani; Mayuresh Vishwas ;   et al.
2020-10-15
System and Method for Performing Remote Security Assessment of Firewalled Computer
App 20200274896 - Ali-Ahmad; Wissam ;   et al.
2020-08-27
System and method for performing remote security assessment of firewalled computer
Grant 10,652,268 - Ali-Ahmad , et al.
2020-05-12
Advanced Asset Tracking and Correlation
App 20200137122 - Molloy; Sean M. ;   et al.
2020-04-30
Advanced asset tracking and correlation
Grant 10,523,713 - Molloy , et al. Dec
2019-12-31
Client device state collection and network-based processing solution
Grant 10,341,509 - Kawach , et al.
2019-07-02
Systems and methods for assessing the compliance of a computer across a network
Grant 10,229,274 - Kandek , et al.
2019-03-12
System And Method For Performing Remote Security Assessment Of Firewalled Computer
App 20180324205 - ALI-AHMAD; Wissam ;   et al.
2018-11-08
Advanced Asset Tracking And Correlation
App 20180324221 - Molloy; Sean M. ;   et al.
2018-11-08
Method and Apparatus for Intelligent Aggregation of Threat Behavior for the Detection of Malware
App 20180316694 - Thakar; Sumedh ;   et al.
2018-11-01
Web application vulnerability scanning
Grant 10,108,801 - Shema , et al. October 23, 2
2018-10-23
Method and apparatus for intelligent aggregation of threat behavior for the detection of malware
Grant 10,104,101 - Thakar , et al. October 16, 2
2018-10-16
Systems and Methods for Assessing the Compliance of a Computer Across a Network
App 20180204010 - Kandek; Wolfgang ;   et al.
2018-07-19
Advanced asset tracking and correlation
Grant 10,021,140 - Molloy , et al. July 10, 2
2018-07-10
System and method for performing remote security assessment of firewalled computer
Grant 10,015,187 - Ali-Ahmad , et al. July 3, 2
2018-07-03
Systems and methods for assessing the compliance of a computer across a network
Grant 9,916,455 - Kandek , et al. March 13, 2
2018-03-13
System and method for detecting vulnerability state deltas
Grant 9,900,333 - Thakar , et al. February 20, 2
2018-02-20
System and method for web-based log analysis
Grant 9,876,813 - Harutyunyan , et al. January 23, 2
2018-01-23
Advanced Asset Tracking and Correlation
App 20170230424 - Molloy; Sean M. ;   et al.
2017-08-10
Systems and Methods for Assessing the Compliance of a Computer Across a Network
App 20170213040 - Kandek; Wolfgang ;   et al.
2017-07-27
Dynamic Hierarchical Tagging System and Method
App 20170208088 - Molloy; Sean M. ;   et al.
2017-07-20
System And Method For Performing Remote Security Assessment Of Firewalled Computer
App 20170180409 - ALI-AHMAD; Wissam ;   et al.
2017-06-22
Systems and methods for assessing the compliance of a computer across a network
Grant 9,621,594 - Kandek , et al. April 11, 2
2017-04-11
Dynamic hierarchical tagging system and method
Grant 9,613,099 - Molloy , et al. April 4, 2
2017-04-04
Advanced asset tracking and correlation
Grant 9,591,027 - Molloy , et al. March 7, 2
2017-03-07
System and method for performing remote security assessment of firewalled computer
Grant 9,432,392 - Ali-Ahmad , et al. August 30, 2
2016-08-30
Advanced asset tracking and correlation
App 20160241595 - Molloy; Sean M. ;   et al.
2016-08-18
System and method for web-based log analysis
App 20160234238 - Harutyunyan; Artem ;   et al.
2016-08-11
System and method for detecting vulnerability state deltas
App 20160234237 - Thakar; Sumedh ;   et al.
2016-08-11
Systems and Methods for Assessing the Compliance of a Computer Across a Network
App 20160173533 - Kandek; Wolfgang ;   et al.
2016-06-16
Systems and methods for assessing the compliance of a computer across a network
Grant 9,258,322 - Kandek , et al. February 9, 2
2016-02-09
System and method for performing remote security assessment of firewalled computer
App 20150281269 - Ali-Ahmad; Wissam ;   et al.
2015-10-01
Client device state collection and network-based processing solution
App 20150222765 - Kawach; Rami ;   et al.
2015-08-06
System and method for performing remote security assessment of firewalled computer
Grant 8,925,093 - Ali-Ahmad , et al. December 30, 2
2014-12-30
System and method for performing remote security assessment of firewalled computer
Grant 08925093 -
2014-12-30
Client device state collection and network-based processing solution
App 20140268245 - Kawach; Rami ;   et al.
2014-09-18
Web application vulnerability scanning
App 20140137228 - Shema; Michael P. ;   et al.
2014-05-15
Systems and methods for assessing the compliance of a computer across a network
App 20140109169 - Kandek; Wolfgang ;   et al.
2014-04-17
Systems and methods for assessing the compliance of a computer across a network
Grant 8,490,188 - Kandek , et al. July 16, 2
2013-07-16
Systems and methods for performing remote configuration compliance assessment of a networked computer device
Grant 8,484,694 - Diebler , et al. July 9, 2
2013-07-09
System and method for performing remote security assessment of firewalled computer
Grant 8,281,396 - Ali-Ahmad , et al. October 2, 2
2012-10-02
System And Method For Performing Remote Security Assessment Of Firewalled Computer
App 20120233700 - Ali-Ahmad; Wissam ;   et al.
2012-09-13
Dynamic hierarchical tagging system and method
App 20120158725 - Molloy; Sean M. ;   et al.
2012-06-21
Systems and Methods for Assessing the Compliance of a Computer Across a Network
App 20100175135 - Kandek; Wolfgang ;   et al.
2010-07-08
System and Method for Performing Remote Security Assessment of Firewalled Computer
App 20100175134 - Ali-Ahmad; Wissam ;   et al.
2010-07-08
Systems and Methods for Performing Remote Configuration Compliance Assessment of a Networked Computer Device
App 20100175106 - Diebler; Sebastien ;   et al.
2010-07-08
Company Registrations

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed