loadpatents
name:-0.048967123031616
name:-0.22106099128723
name:-0.0090610980987549
Quinlan; Daniel J. Patent Filings

Quinlan; Daniel J.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Quinlan; Daniel J..The latest application filed is for "classification of software based on user interface elements".

Company Profile
9.53.46
  • Quinlan; Daniel J. - San Francisco CA
  • Quinlan; Daniel J. - Sunnyvale CA
  • QUINLAN; Daniel J. - San Fransisco CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Classification of software based on user interface elements
Grant 11,250,034 - Langton , et al. February 15, 2
2022-02-15
Multi-file malware analysis
Grant 11,163,879 - Langton , et al. November 2, 2
2021-11-02
Automated software installation using a click area prediction model
Grant 10,996,937 - Langton , et al. May 4, 2
2021-05-04
Identifying a file using metadata and determining a security classification of the file before completing receipt of the file
Grant 10,834,099 - Tenorio , et al. November 10, 2
2020-11-10
Tracking and mitigation of an infected host device
Grant 10,834,103 - Balasundaram , et al. November 10, 2
2020-11-10
Remote remediation of malicious files
Grant 10,645,114 - Adams , et al.
2020-05-05
Classification Of Software Based On User Interface Elements
App 20200026719 - LANGTON; Jacob Asher ;   et al.
2020-01-23
Dynamically optimizing performance of a security appliance
Grant 10,474,817 - Langton , et al. Nov
2019-11-12
Classification of software based on user interface elements
Grant 10,467,260 - Langton , et al. No
2019-11-05
Intermediate responses for non-html downloads
Grant 10,469,510 - Quinlan No
2019-11-05
Detecting a malicious file infection via sandboxing
Grant 10,389,740 - Langton , et al. A
2019-08-20
Malware detection using internal and/or external malware detection operations
Grant 10,382,479 - Adams , et al. A
2019-08-13
Configuring a sandbox environment for malware testing
Grant 10,380,337 - Langton , et al. A
2019-08-13
Identifying an evasive malicious object based on a behavior delta
Grant 10,210,332 - Adams , et al. Feb
2019-02-19
Detecting Data Exfiltration As The Data Exfiltration Occurs Or After The Data Exfiltration Occurs
App 20190036955 - LANGTON; Jacob Asher ;   et al.
2019-01-31
Identifying A File Using Metadata And Determining A Security Classification Of The File Before Completing Receipt Of The File
App 20180343271 - TENORIO; Yuly N. Becerra ;   et al.
2018-11-29
Providing policy information on an existing communication channel
Grant 10,110,496 - Langton , et al. October 23, 2
2018-10-23
Determining internet-based object information using public internet search
Grant 10,104,106 - Langton , et al. October 16, 2
2018-10-16
Tracking And Mitigation Of An Infected Host Device
App 20180288078 - Balasundaram; Karthik Ragunath ;   et al.
2018-10-04
Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
Grant 10,091,222 - Langton , et al. October 2, 2
2018-10-02
Detecting keylogging
Grant 10,089,468 - Adams , et al. October 2, 2
2018-10-02
Protecting sensitive web transactions using a communication channel associated with a user
Grant 10,079,806 - Adams , et al. September 18, 2
2018-09-18
Detecting suspicious files resident on a network
Grant 10,075,453 - Adams , et al. September 11, 2
2018-09-11
Identifying An Evasive Malicious Object Based On A Behavior Delta
App 20180204003 - ADAMS; Kyle ;   et al.
2018-07-19
Limiting the efficacy of a denial of service attack by increasing client resource demands
Grant 10,021,132 - Adams , et al. July 10, 2
2018-07-10
Analyzing a password-protected file for malware
Grant 9,990,496 - Adams , et al. June 5, 2
2018-06-05
Identifying malware based on a relationship between a downloader file and a downloaded file
Grant 9,984,233 - Quinlan , et al. May 29, 2
2018-05-29
Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes
Grant 9,953,164 - Langton , et al. April 24, 2
2018-04-24
Identifying an evasive malicious object based on a behavior delta
Grant 9,922,193 - Adams , et al. March 20, 2
2018-03-20
Malware Detection Using Internal And/or External Malware Detection Operations
App 20180007064 - ADAMS; Kyle ;   et al.
2018-01-04
Identifying malicious devices within a computer network
Grant 9,848,016 - Ibatullin , et al. December 19, 2
2017-12-19
Dynamic service handling using a honeypot
Grant 9,838,427 - Quinlan , et al. December 5, 2
2017-12-05
Configuring A Sandbox Environment For Malware Testing
App 20170344740 - LANGTON; Jacob Asher ;   et al.
2017-11-30
Detecting A Malicious File Infection Via Sandboxing
App 20170346838 - LANGTON; Jacob Asher ;   et al.
2017-11-30
Detecting Keylogging
App 20170344744 - ADAMS; Kyle ;   et al.
2017-11-30
Identifying Malware Based On A Relationship Between A Downloader File And A Downloaded File
App 20170337375 - QUINLAN; Daniel J. ;   et al.
2017-11-23
Dynamically Optimizing Performance Of A Security Appliance
App 20170323101 - LANGTON; Jacob Asher ;   et al.
2017-11-09
Remote Remediation Of Malicious Files
App 20170324756 - ADAMS; Kyle ;   et al.
2017-11-09
Limiting The Efficacy Of A Denial Of Service Attack By Increasing Client Resource Demands
App 20170302699 - ADAMS; KYLE ;   et al.
2017-10-19
Malware detection using internal and/or external malware detection operations
Grant 9,769,198 - Adams , et al. September 19, 2
2017-09-19
Malware detection using external malware detection operations
Grant 9,769,197 - Adams , et al. September 19, 2
2017-09-19
Obtaining Suspect Objects Based On Detecting Suspicious Activity
App 20170250995 - Langton; Jacob Asher ;   et al.
2017-08-31
Identifying malware based on a relationship between a downloader file and a downloaded file
Grant 9,740,862 - Quinlan , et al. August 22, 2
2017-08-22
Configuring a sandbox environment for malware testing
Grant 9,740,853 - Langton , et al. August 22, 2
2017-08-22
Multi-file Malware Analysis
App 20170228542 - Langton; Jacob Asher ;   et al.
2017-08-10
Remote remediation of malicious files
Grant 9,729,572 - Adams , et al. August 8, 2
2017-08-08
Dynamically optimizing performance of a security appliance
Grant 9,721,096 - Langton , et al. August 1, 2
2017-08-01
Limiting the efficacy of a denial of service attack by increasing client resource demands
Grant 9,699,212 - Adams , et al. July 4, 2
2017-07-04
Identifying An Evasive Malicious Object Based On A Behavior Delta
App 20170185779 - ADAMS; Kyle ;   et al.
2017-06-29
Analyzing A Password-protected File For Malware
App 20170177864 - ADAMS; Kyle ;   et al.
2017-06-22
Confirming A Malware Infection On A Client Device Using A Remote Access Connection Tool, To Identify A Malicious File Based On Fuzz Hashes
App 20170177869 - Langton; Jacob Asher ;   et al.
2017-06-22
Detecting keylogging
Grant 9,679,141 - Adams , et al. June 13, 2
2017-06-13
Detecting a malicious file infection via sandboxing
Grant 9,680,845 - Langton , et al. June 13, 2
2017-06-13
Obtaining suspect objects based on detecting suspicious activity
Grant 9,654,496 - Langton , et al. May 16, 2
2017-05-16
Multi-file malware analysis
Grant 9,646,159 - Langton , et al. May 9, 2
2017-05-09
Classification Of Software Based On User Interface Elements
App 20170109432 - LANGTON; Jacob Asher ;   et al.
2017-04-20
Analyzing a password-protected file for malware
Grant 9,594,902 - Adams , et al. March 14, 2
2017-03-14
Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes
Grant 9,594,906 - Langton , et al. March 14, 2
2017-03-14
Identifying an evasive malicious object based on a behavior delta
Grant 9,594,908 - Adams , et al. March 14, 2
2017-03-14
Identifying Malicious Devices Within A Computer Network
App 20170063922 - Ibatullin; Oskar ;   et al.
2017-03-02
Dynamic Service Handling Using A Honeypot
App 20170048274 - Quinlan; Daniel J. ;   et al.
2017-02-16
Classification of software based on user interface elements
Grant 9,569,520 - Langton , et al. February 14, 2
2017-02-14
Configuring A Sandbox Environment For Malware Testing
App 20170039369 - LANGTON; Jacob Asher ;   et al.
2017-02-09
Automated Software Installation Using A Click Area Prediction Model
App 20170039054 - LANGTON; Jacob Asher ;   et al.
2017-02-09
Identifying An Evasive Malicious Object Based On A Behavior Delta
App 20160342794 - ADAMS; Kyle ;   et al.
2016-11-24
Identifying malicious devices within a computer network
Grant 9,497,163 - Ibatullin , et al. November 15, 2
2016-11-15
Dynamic service handling using a honeypot
Grant 9,485,276 - Quinlan , et al. November 1, 2
2016-11-01
Limiting The Efficacy Of A Denial Of Service Attack By Increasing Client Resource Demands
App 20160315962 - ADAMS; Kyle ;   et al.
2016-10-27
Automated software installation using a click area prediction model
Grant 9,477,457 - Langton , et al. October 25, 2
2016-10-25
Configuring a sandbox environment for malware testing
Grant 9,477,837 - Langton , et al. October 25, 2
2016-10-25
Dynamically Optimizing Performance Of A Security Appliance
App 20160300061 - LANGTON; Jacob Asher ;   et al.
2016-10-13
Providing Policy Information On An Existing Communication Channel
App 20160294703 - LANGTON; Jacob Asher ;   et al.
2016-10-06
Determining Internet-based Object Information Using Public Internet Search
App 20160294857 - LANGTON; Jacob Asher ;   et al.
2016-10-06
Detecting Keylogging
App 20160292421 - ADAMS; Kyle ;   et al.
2016-10-06
Analyzing A Password-protected File For Malware
App 20160292415 - ADAMS; Kyle ;   et al.
2016-10-06
Detecting Suspicious Files Resident On A Network
App 20160294849 - Adams; Kyle ;   et al.
2016-10-06
Configuring A Sandbox Environment For Malware Testing
App 20160292420 - LANGTON; Jacob Asher ;   et al.
2016-10-06
Detecting A Malicious File Infection Via Sandboxing
App 20160294851 - LANGTON; Jacob Asher ;   et al.
2016-10-06
Multi-file Malware Analysis
App 20160292419 - LANGTON; Jacob Asher ;   et al.
2016-10-06
Malware detection using internal malware detection operations
Grant 9,413,782 - Adams , et al. August 9, 2
2016-08-09
Limiting the efficacy of a denial of service attack by increasing client resource demands
Grant 9,392,018 - Adams , et al. July 12, 2
2016-07-12
Preventing extraction of secret information over a compromised encrypted connection
Grant 9,386,104 - Adams , et al. July 5, 2
2016-07-05
Dynamically optimizing performance of a security appliance
Grant 9,367,685 - Langton , et al. June 14, 2
2016-06-14
Identifying Malicious Devices Within A Computer Network
App 20160119286 - Ibatullin; Oskar ;   et al.
2016-04-28
Identifying An Evasive Malicious Object Based On A Behavior Delta
App 20160092682 - Adams; Kyle ;   et al.
2016-03-31
Dynamically Optimizing Performance Of A Security Appliance
App 20160092684 - LANGTON; Jacob Asher ;   et al.
2016-03-31
Identifying malicious devices within a computer network
Grant 9,258,328 - Ibatullin , et al. February 9, 2
2016-02-09
Protecting Sensitive Web Transactions Using A Communication Channel Associated With A User
App 20150358306 - ADAMS; Kyle ;   et al.
2015-12-10
Protecting sensitive web transactions using a communication channel associated with a user
Grant 9,112,834 - Adams , et al. August 18, 2
2015-08-18
Attack detection and prevention using global device fingerprinting
Grant 9,106,693 - Quinlan , et al. August 11, 2
2015-08-11
Intermediate Responses For Non-html Downloads
App 20150222650 - QUINLAN; Daniel J.
2015-08-06
Identifying Malicious Devices Within A Computer Network
App 20150222661 - Ibatullin; Oskar ;   et al.
2015-08-06
Dynamic Service Handling Using A Honeypot
App 20150121529 - Quinlan; Daniel J. ;   et al.
2015-04-30
Identifying malicious devices within a computer network
Grant 9,015,839 - Ibatullin , et al. April 21, 2
2015-04-21
Limiting The Efficacy Of A Denial Of Service Attack By Increasing Client Resource Demands
App 20150096020 - ADAMS; Kyle ;   et al.
2015-04-02
Identifying Malicious Devices Within A Computer Network
App 20150067866 - Ibatullin; Oskar ;   et al.
2015-03-05
Preventing Extraction Of Secret Information Over A Compromised Encrypted Connection
App 20150058493 - ADAMS; Kyle ;   et al.
2015-02-26
Attack Detection And Prevention Using Global Device Fingerprinting
App 20140283061 - Quinlan; Daniel J. ;   et al.
2014-09-18
Virtual Honeypot
App 20140096229 - Burns; Bryan ;   et al.
2014-04-03

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed