loadpatents
name:-0.016942977905273
name:-0.041459083557129
name:-0.00085091590881348
Ramzan; Zulfikar Patent Filings

Ramzan; Zulfikar

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ramzan; Zulfikar.The latest application filed is for "method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning".

Company Profile
0.53.14
  • Ramzan; Zulfikar - San Mateo CA
  • Ramzan; Zulfikar - Cupertino CA US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 10,437,997 - Friedrichs , et al. O
2019-10-08
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20170308700 - Friedrichs; Oliver ;   et al.
2017-10-26
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 9,747,445 - Friedrichs , et al. August 29, 2
2017-08-29
Method and apparatus for retroactively detecting malicious or otherwise undesirable software
Grant 9,639,697 - Friedrichs , et al. May 2, 2
2017-05-02
Systems and methods for selectively authenticating queries based on an authentication policy
Grant 9,465,921 - Ramzan , et al. October 11, 2
2016-10-11
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20160098560 - Friedrichs; Oliver ;   et al.
2016-04-07
Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean software through intelligent rescanning
Grant 9,245,120 - Friedrichs , et al. January 26, 2
2016-01-26
Using Confidence About User Intent In A Reputation System
App 20150269379 - Ramzan; Zulfikar ;   et al.
2015-09-24
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software
App 20150205959 - Friedrichs; Oliver ;   et al.
2015-07-23
Using confidence about user intent in a reputation system
Grant 9,081,958 - Ramzan , et al. July 14, 2
2015-07-14
Malware detection using file names
Grant 9,038,186 - Manadhata , et al. May 19, 2
2015-05-19
Using metadata in security tokens to prevent coordinated gaming in a reputation system
Grant 8,997,190 - Nachenberg , et al. March 31, 2
2015-03-31
Method and apparatus for retroactively detecting malicious or otherwise undesirable software
Grant 8,978,137 - Friedrichs , et al. March 10, 2
2015-03-10
Profiling application usage from application streaming
Grant 8,977,764 - Ramzan , et al. March 10, 2
2015-03-10
Method and apparatus for identifying domain name abuse
Grant 8,869,269 - Ramzan , et al. October 21, 2
2014-10-21
Methods and systems for identifying fraudulent websites
Grant 8,856,937 - Wuest , et al. October 7, 2
2014-10-07
Filter-based identification of malicious websites
Grant 8,850,570 - Ramzan September 30, 2
2014-09-30
Provably secure and efficient pseudorandom number generation
Grant 8,824,677 - Ramzan , et al. September 2, 2
2014-09-02
Application streaming and network file system optimization via integration with identity management solutions
Grant 8,806,046 - Satish , et al. August 12, 2
2014-08-12
Individualized time-to-live for reputation scores of computer files
Grant 8,800,030 - Seshadri , et al. August 5, 2
2014-08-05
Application streaming proactive failover
Grant 8,799,494 - Ramzan , et al. August 5, 2
2014-08-05
Method and Apparatus for Identifying Computing Resource Trajectory
App 20140188986 - Levy; Elias ;   et al.
2014-07-03
Method and Apparatus for Retroactively Detecting Malicious or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning
App 20140165203 - FRIEDRICHS; Oliver ;   et al.
2014-06-12
Method and apparatus for resolving a cousin domain name to detect web-based fraud
Grant 8,707,426 - Ramzan , et al. April 22, 2
2014-04-22
Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System
App 20140026199 - Nachenberg; Carey ;   et al.
2014-01-23
Using metadata in security tokens to prevent coordinated gaming in a reputation system
Grant 8,621,654 - Nachenberg , et al. December 31, 2
2013-12-31
Malware detection using file names
Grant 8,621,233 - Manadhata , et al. December 31, 2
2013-12-31
Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold
Grant 8,572,007 - Manadhata , et al. October 29, 2
2013-10-29
Method And Apparatus For Retroactively Detecting Malicious Or Otherwise Undesirable Software
App 20130276114 - FRIEDRICHS; Oliver ;   et al.
2013-10-17
Decision tree induction that is sensitive to attribute computational complexity
Grant 8,495,096 - Pereira , et al. July 23, 2
2013-07-23
Referrer context identification for remote object links
Grant 8,479,284 - Cooley , et al. July 2, 2
2013-07-02
Method and apparatus for identifying web attacks
Grant 8,434,149 - Satish , et al. April 30, 2
2013-04-30
Systems and methods for authenticating requests from a client running trialware through a proof of work protocol
Grant 8,412,952 - Ramzan , et al. April 2, 2
2013-04-02
Using sequencing and timing information of behavior events in machine learning to detect malware
Grant 8,401,982 - Satish , et al. March 19, 2
2013-03-19
Detecting fraudulent web sites through an obfuscated reporting mechanism
Grant 8,341,737 - Ramzan , et al. December 25, 2
2012-12-25
Secure authentication token management
Grant 8,312,272 - Serenyi , et al. November 13, 2
2012-11-13
Using machine infection characteristics for behavior-based detection of malware
Grant 8,266,698 - Seshardi , et al. September 11, 2
2012-09-11
Decision tree induction that is sensitive to attribute computational complexity
Grant 8,190,647 - Pereira , et al. May 29, 2
2012-05-29
Detecting email fraud through fingerprinting
Grant 8,103,875 - Ramzan , et al. January 24, 2
2012-01-24
Predictive transmission of content for application streaming and network file systems
Grant 8,095,679 - Satish , et al. January 10, 2
2012-01-10
Method and apparatus to secure user confidential data from untrusted browser extensions
Grant 7,975,308 - Satish , et al. July 5, 2
2011-07-05
Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System
App 20110067086 - Nachenberg; Carey ;   et al.
2011-03-17
Individualized Time-to-Live for Reputation Scores of Computer Files
App 20110067101 - Seshadri; Vijay ;   et al.
2011-03-17
Using Confidence About User Intent In A Reputation System
App 20110040825 - Ramzan; Zulfikar ;   et al.
2011-02-17
Provisional signature schemes
Grant 7,730,319 - Ramzan , et al. June 1, 2
2010-06-01
Provisional Signature Schemes
App 20090217042 - Ramzan; Zulfikar ;   et al.
2009-08-27
Provisional Signature Schemes
App 20090217041 - Ramzan; Zulfikar ;   et al.
2009-08-27
Provisional signature schemes
App 20060056621 - Ramzan; Zulfikar ;   et al.
2006-03-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed