loadpatents
name:-0.031274080276489
name:-0.026221036911011
name:-0.014660835266113
Rodeck; Marco Patent Filings

Rodeck; Marco

Patent Applications and Registrations

Patent applications and USPTO patent grants for Rodeck; Marco.The latest application filed is for "system and user context in enterprise threat detection".

Company Profile
14.25.34
  • Rodeck; Marco - Maikammer DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and user context in enterprise threat detection
Grant 11,252,168 - Mehta , et al. February 15, 2
2022-02-15
System And User Context In Enterprise Threat Detection
App 20220006828 - Mehta; Harish ;   et al.
2022-01-06
Pattern creation in enterprise threat detection
Grant 11,128,651 - Pritzkau , et al. September 21, 2
2021-09-21
Realtime triggering framework
Grant 11,012,465 - Pritzkau , et al. May 18, 2
2021-05-18
Displaying a series of events along a time axis in enterprise threat detection
Grant 10,986,111 - Peng , et al. April 20, 2
2021-04-20
Realtime Triggering Framework
App 20200195680 - Pritzkau; Eugen ;   et al.
2020-06-18
Analysis of complex relationships among information technology security-relevant entities using a network graph
Grant 10,681,064 - Peng , et al.
2020-06-09
Snapshot of a forensic investigation for enterprise threat detection
Grant 10,673,879 - Chrosziel , et al.
2020-06-02
Pattern Creation In Enterprise Threat Detection
App 20200145444 - Pritzkau; Eugen ;   et al.
2020-05-07
Real-time push API for log events in enterprise threat detection
Grant 10,630,705 - Chrosziel , et al.
2020-04-21
Location enrichment in enterprise threat detection
Grant 10,542,016 - Rodeck , et al. Ja
2020-01-21
Realtime triggering framework
Grant 10,536,476 - Pritzkau , et al. Ja
2020-01-14
Pattern creation in enterprise threat detection
Grant 10,530,794 - Pritzkau , et al. J
2020-01-07
Visualization of data distributed in multiple dimensions
Grant 10,482,241 - Peng , et al. Nov
2019-11-19
Displaying A Series Of Events Along A Time Axis In Enterprise Threat Detection
App 20190190935 - PENG; Wei-Guo ;   et al.
2019-06-20
Analysis Of Complex Relationships Among Information Technology Security-relevant Entities Using A Network Graph
App 20190190927 - Peng; Wei-Guo ;   et al.
2019-06-20
Calculation And Visualization Of Security Risks In Enterprise Threat Detection
App 20190005423 - Pritzkau; Eugen ;   et al.
2019-01-03
System And User Context In Enterprise Threat Detection
App 20190007442 - Mehta; Harish ;   et al.
2019-01-03
Pattern Creation In Enterprise Threat Detection
App 20190007435 - Pritzkau; Eugen ;   et al.
2019-01-03
Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes
Grant 10,102,379 - Seifert , et al. October 16, 2
2018-10-16
System and user context in enterprise threat detection
Grant 10,075,462 - Mehta , et al. September 11, 2
2018-09-11
Bi-directional Content Replication Logic For Enterprise Threat Detection
App 20180176234 - Kunz; Thomas ;   et al.
2018-06-21
Snapshot Of A Forensic Investigation For Enterprise Threat Detection
App 20180091535 - Chrosziel; Florian ;   et al.
2018-03-29
Real-time Push Api For Log Events In Enterprise Threat Detection
App 20180091536 - Chrosziel; Florian ;   et al.
2018-03-29
Visualization Of Data Distributed In Multiple Dimensions
App 20180059876 - Peng; Wei-Guo ;   et al.
2018-03-01
Location Enrichment In Enterprise Threat Detection
App 20180063167 - Rodeck; Marco ;   et al.
2018-03-01
Outlier Detection In Enterprise Threat Detection
App 20180027002 - Rodeck; Marco ;   et al.
2018-01-25
Realtime Triggering Framework
App 20180027010 - Pritzkau; Eugen ;   et al.
2018-01-25
System And User Context In Enterprise Threat Detection
App 20170180403 - Mehta; Harish ;   et al.
2017-06-22
Knowledge Base In Enterprise Threat Detection
App 20170178025 - Thomas; Susan Marie ;   et al.
2017-06-22
Log Normalization In Enterprise Threat Detection
App 20170178026 - Thomas; Susan Marie ;   et al.
2017-06-22
Data access logging
Grant 9,396,085 - Hoffmeister , et al. July 19, 2
2016-07-19
Distribution of messages in system landscapes
Grant 9,037,678 - Mehta , et al. May 19, 2
2015-05-19
Managing information exchange between business entities
Grant 8,775,671 - Rodeck , et al. July 8, 2
2014-07-08
Data Access Logging
App 20140143221 - Hoffmeister; Fritz ;   et al.
2014-05-22
Distribution Of Messages In System Landscapes
App 20130304849 - Mehta; Harish ;   et al.
2013-11-14
Managing Information Exchange Between Business Entities
App 20130304665 - Rodeck; Marco ;   et al.
2013-11-14
Managing Information Exchange Between Business Entities
App 20130304666 - Rodeck; Marco ;   et al.
2013-11-14
Managing Information Exchange Between Business Entities
App 20130304936 - Rodeck; Marco ;   et al.
2013-11-14
Apparatus and product of manufacture for adaptive business transaction rule structures
Grant 7,761,396 - Weigt , et al. July 20, 2
2010-07-20
Apparatus and product of manufacture for using condition data structures separately from rule data structures in business transactions
Grant 7,756,808 - Weigt , et al. July 13, 2
2010-07-13
Apparatus and product of manufacture using execution points to select conditions and rules for business transaction processing
Grant 7,756,809 - Weigt , et al. July 13, 2
2010-07-13
Customizing transaction processing in a computer application by using pre-defined functions
Grant 7,457,792 - Weigt , et al. November 25, 2
2008-11-25
Searching for customized processing rules for a computer application
Grant 7,457,794 - Weigt , et al. November 25, 2
2008-11-25
Investigating execution of a customized transaction process in a computer application
Grant 7,457,793 - Weigt , et al. November 25, 2
2008-11-25
Investigating execution of a customized transaction process in a computer application
App 20060112059 - Weigt; Matthias ;   et al.
2006-05-25
Customizing transaction processing in a computer application by using pre-defined functions
App 20060112058 - Weigt; Matthias ;   et al.
2006-05-25
Searching for customized processing rules for a computer application
App 20060112060 - Weigt; Matthias ;   et al.
2006-05-25
Using customized data to control transaction processing in a computer application
App 20060085214 - Weigt; Matthias ;   et al.
2006-04-20
Customizing transaction processing in a computer application
App 20060085213 - Weigt; Matthias ;   et al.
2006-04-20
Using execution points to customize transaction processing in a computer application
App 20060085215 - Weigt; Matthias ;   et al.
2006-04-20

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed