loadpatents
Patent applications and USPTO patent grants for Rothstein; Jesse Abraham.The latest application filed is for "inline secret sharing".
Patent | Date |
---|---|
Correlating network traffic that crosses opaque endpoints Grant 11,388,072 - Wu , et al. July 12, 2 | 2022-07-12 |
Identifying network entities based on beaconing activity Grant 11,349,861 - Costlow , et al. May 31, 2 | 2022-05-31 |
Combining passive network analysis and active probing Grant 11,296,967 - Rothstein , et al. April 5, 2 | 2022-04-05 |
Inline Secret Sharing App 20220060518 - Higgins; Benjamin Thomas ;   et al. | 2022-02-24 |
Detecting Injection Attacks Using Passive Network Monitoring App 20220021694 - Higgins; Benjamin Thomas ;   et al. | 2022-01-20 |
Inline secret sharing Grant 11,165,831 - Higgins , et al. November 2, 2 | 2021-11-02 |
Correlating Network Traffic That Crosses Opaque Endpoints App 20210288895 - Wu; Xue Jun ;   et al. | 2021-09-16 |
Detecting injection attacks using passive network monitoring Grant 10,965,702 - Higgins , et al. March 30, 2 | 2021-03-30 |
Detecting Injection Attacks Using Passive Network Monitoring App 20200382529 - Higgins; Benjamin Thomas ;   et al. | 2020-12-03 |
Network packet de-duplication Grant 10,616,084 - Hammerle , et al. | 2020-04-07 |
Managing Session Secrets For Continuous Packet Capture Systems App 20200076597 - Higgins; Benjamin Thomas ;   et al. | 2020-03-05 |
Managing session secrets for continuous packet capture systems Grant 10,476,673 - Higgins , et al. Nov | 2019-11-12 |
Network Packet De-duplication App 20190327156 - Hammerle; Eric Joseph ;   et al. | 2019-10-24 |
Automated risk assessment based on machine generated investigation Grant 10,411,982 - Driggs , et al. Sept | 2019-09-10 |
Network packet de-duplication Grant 10,341,206 - Hammerle , et al. | 2019-07-02 |
Network Packet De-duplication App 20190199609 - Hammerle; Eric Joseph ;   et al. | 2019-06-27 |
Automated risk assessment based on machine generated investigation Grant 10,326,676 - Driggs , et al. | 2019-06-18 |
Secure communication secret sharing Grant 10,326,741 - Rothstein , et al. | 2019-06-18 |
Inline Secret Sharing App 20190124123 - Higgins; Benjamin Thomas ;   et al. | 2019-04-25 |
Dynamic trunk distribution on egress Grant 10,135,736 - Rothstein , et al. November 20, 2 | 2018-11-20 |
Managing Session Secrets For Continuous Packet Capture Systems App 20180278419 - Higgins; Benjamin Thomas ;   et al. | 2018-09-27 |
Inline secret sharing Grant 9,967,292 - Higgins , et al. May 8, 2 | 2018-05-08 |
Secure Communication Secret Sharing App 20180034783 - Rothstein; Jesse Abraham ;   et al. | 2018-02-01 |
Flow deduplication across a cluster of network monitoring devices Grant 9,660,879 - Rothstein , et al. May 23, 2 | 2017-05-23 |
Secure communication secret sharing Grant 9,621,523 - Rothstein , et al. April 11, 2 | 2017-04-11 |
Secure Communication Secret Sharing App 20160315916 - Rothstein; Jesse Abraham ;   et al. | 2016-10-27 |
Secure communication secret sharing Grant 9,338,147 - Rothstein , et al. May 10, 2 | 2016-05-10 |
Resynchronization of passive monitoring of a flow based on hole detection Grant 9,210,135 - Rothstein , et al. December 8, 2 | 2015-12-08 |
Trigger based recording of flows with play back Grant 9,191,288 - Rothstein , et al. November 17, 2 | 2015-11-17 |
Automated passive discovery of applications Grant 9,054,952 - Rothstein , et al. June 9, 2 | 2015-06-09 |
De-duplicating of packets in flows at layer 3 Grant 9,003,065 - Rothstein , et al. April 7, 2 | 2015-04-07 |
Trigger Based Recording Of Flows With Play Back App 20150036501 - Rothstein; Jesse Abraham ;   et al. | 2015-02-05 |
Resynchronization Of Passive Monitoring Of A Flow Based On Hole Detection App 20150019867 - Rothstein; Jesse Abraham ;   et al. | 2015-01-15 |
Trigger based recording of flows with play back Grant 8,867,343 - Rothstein , et al. October 21, 2 | 2014-10-21 |
Resynchronization of passive monitoring of a flow based on hole detection Grant 8,848,744 - Rothstein , et al. September 30, 2 | 2014-09-30 |
Trigger Based Recording Of Flows With Play Back App 20140269276 - Rothstein; Jesse Abraham ;   et al. | 2014-09-18 |
Automated Passive Discovery Of Applications App 20140280907 - Rothstein; Jesse Abraham ;   et al. | 2014-09-18 |
De-duplicating Of Packets In Flows At Layer 3 App 20140280908 - Rothstein; Jesse Abraham ;   et al. | 2014-09-18 |
Resynchronization Of Passive Monitoring Of A Flow Based On Hole Detection App 20140269777 - Rothstein; Jesse Abraham ;   et al. | 2014-09-18 |
Accessing SSL connection data by a third-party Grant 8,782,393 - Rothstein , et al. July 15, 2 | 2014-07-15 |
Dynamic trunk distribution on egress Grant 8,711,689 - Rothstein , et al. April 29, 2 | 2014-04-29 |
Automated passive discovery of applications Grant 8,626,912 - Rothstein , et al. January 7, 2 | 2014-01-07 |
Certificate selection for virtual host servers Grant 8,621,078 - Mukerji , et al. December 31, 2 | 2013-12-31 |
De-duplicating of packets in flows at layer 3 Grant 08619579 - | 2013-12-31 |
De-duplicating of packets in flows at layer 3 Grant 8,619,579 - Rothstein , et al. December 31, 2 | 2013-12-31 |
Selectively enabling packet concatenation based on a transaction boundary Grant 8,611,222 - Mukerji , et al. December 17, 2 | 2013-12-17 |
Selectively enabling packet concatenation based on a transaction boundary Grant 8,565,088 - Mukerji , et al. October 22, 2 | 2013-10-22 |
Selectively enabling packet concatenation based on a transaction boundary Grant 8,559,313 - Mukerji , et al. October 15, 2 | 2013-10-15 |
Network traffic management through protocol-configurable transaction processing Grant 8,533,308 - Rothstein September 10, 2 | 2013-09-10 |
Adaptive compression Grant 8,499,100 - Rothstein July 30, 2 | 2013-07-30 |
Selectively enabling network packet concatenation based on metrics Grant 8,477,798 - Mukerji , et al. July 2, 2 | 2013-07-02 |
Adaptive compression Grant 8,275,909 - Rothstein September 25, 2 | 2012-09-25 |
Using SYN-ACK cookies within a TCP/IP protocol Grant 8,200,957 - Mukerji , et al. June 12, 2 | 2012-06-12 |
Dynamic trunk distribution on egress Grant 8,189,476 - Rothstein , et al. May 29, 2 | 2012-05-29 |
Detecting anomalous network application behavior Grant 8,185,953 - Rothstein , et al. May 22, 2 | 2012-05-22 |
Adaptive network traffic classification using historical context Grant 8,125,908 - Rothstein , et al. February 28, 2 | 2012-02-28 |
Selective compression for network connections Grant 8,024,483 - Rothstein , et al. September 20, 2 | 2011-09-20 |
Capture and resumption of network application sessions Grant 7,979,555 - Rothstein , et al. July 12, 2 | 2011-07-12 |
Using SYN-ACK cookies within a TCP/IP protocol Grant 7,921,282 - Mukerji , et al. April 5, 2 | 2011-04-05 |
Selectively enabling network packet concatenation based on metrics Grant 7,873,065 - Mukerji , et al. January 18, 2 | 2011-01-18 |
Coalescing acknowledgement responses to improve network communications Grant 7,826,487 - Mukerji , et al. November 2, 2 | 2010-11-02 |
Adaptive compression Grant 7,783,781 - Rothstein , et al. August 24, 2 | 2010-08-24 |
Management of multiple client requests Grant 7,657,618 - Rothstein , et al. February 2, 2 | 2010-02-02 |
Adaptive Network Traffic Classification Using Historical Context App 20090141634 - Rothstein; Jesse Abraham ;   et al. | 2009-06-04 |
Detecting Anomalous Network Application Behavior App 20080222717 - Rothstein; Jesse Abraham ;   et al. | 2008-09-11 |
Capture and Resumption of Network Application Sessions App 20080209045 - Rothstein; Jesse Abraham ;   et al. | 2008-08-28 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.