loadpatents
name:-0.024339199066162
name:-0.050825119018555
name:-0.0117027759552
Rothstein; Jesse Abraham Patent Filings

Rothstein; Jesse Abraham

Patent Applications and Registrations

Patent applications and USPTO patent grants for Rothstein; Jesse Abraham.The latest application filed is for "inline secret sharing".

Company Profile
11.54.20
  • Rothstein; Jesse Abraham - Seattle WA
  • - Seattle WA US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Correlating network traffic that crosses opaque endpoints
Grant 11,388,072 - Wu , et al. July 12, 2
2022-07-12
Identifying network entities based on beaconing activity
Grant 11,349,861 - Costlow , et al. May 31, 2
2022-05-31
Combining passive network analysis and active probing
Grant 11,296,967 - Rothstein , et al. April 5, 2
2022-04-05
Inline Secret Sharing
App 20220060518 - Higgins; Benjamin Thomas ;   et al.
2022-02-24
Detecting Injection Attacks Using Passive Network Monitoring
App 20220021694 - Higgins; Benjamin Thomas ;   et al.
2022-01-20
Inline secret sharing
Grant 11,165,831 - Higgins , et al. November 2, 2
2021-11-02
Correlating Network Traffic That Crosses Opaque Endpoints
App 20210288895 - Wu; Xue Jun ;   et al.
2021-09-16
Detecting injection attacks using passive network monitoring
Grant 10,965,702 - Higgins , et al. March 30, 2
2021-03-30
Detecting Injection Attacks Using Passive Network Monitoring
App 20200382529 - Higgins; Benjamin Thomas ;   et al.
2020-12-03
Network packet de-duplication
Grant 10,616,084 - Hammerle , et al.
2020-04-07
Managing Session Secrets For Continuous Packet Capture Systems
App 20200076597 - Higgins; Benjamin Thomas ;   et al.
2020-03-05
Managing session secrets for continuous packet capture systems
Grant 10,476,673 - Higgins , et al. Nov
2019-11-12
Network Packet De-duplication
App 20190327156 - Hammerle; Eric Joseph ;   et al.
2019-10-24
Automated risk assessment based on machine generated investigation
Grant 10,411,982 - Driggs , et al. Sept
2019-09-10
Network packet de-duplication
Grant 10,341,206 - Hammerle , et al.
2019-07-02
Network Packet De-duplication
App 20190199609 - Hammerle; Eric Joseph ;   et al.
2019-06-27
Automated risk assessment based on machine generated investigation
Grant 10,326,676 - Driggs , et al.
2019-06-18
Secure communication secret sharing
Grant 10,326,741 - Rothstein , et al.
2019-06-18
Inline Secret Sharing
App 20190124123 - Higgins; Benjamin Thomas ;   et al.
2019-04-25
Dynamic trunk distribution on egress
Grant 10,135,736 - Rothstein , et al. November 20, 2
2018-11-20
Managing Session Secrets For Continuous Packet Capture Systems
App 20180278419 - Higgins; Benjamin Thomas ;   et al.
2018-09-27
Inline secret sharing
Grant 9,967,292 - Higgins , et al. May 8, 2
2018-05-08
Secure Communication Secret Sharing
App 20180034783 - Rothstein; Jesse Abraham ;   et al.
2018-02-01
Flow deduplication across a cluster of network monitoring devices
Grant 9,660,879 - Rothstein , et al. May 23, 2
2017-05-23
Secure communication secret sharing
Grant 9,621,523 - Rothstein , et al. April 11, 2
2017-04-11
Secure Communication Secret Sharing
App 20160315916 - Rothstein; Jesse Abraham ;   et al.
2016-10-27
Secure communication secret sharing
Grant 9,338,147 - Rothstein , et al. May 10, 2
2016-05-10
Resynchronization of passive monitoring of a flow based on hole detection
Grant 9,210,135 - Rothstein , et al. December 8, 2
2015-12-08
Trigger based recording of flows with play back
Grant 9,191,288 - Rothstein , et al. November 17, 2
2015-11-17
Automated passive discovery of applications
Grant 9,054,952 - Rothstein , et al. June 9, 2
2015-06-09
De-duplicating of packets in flows at layer 3
Grant 9,003,065 - Rothstein , et al. April 7, 2
2015-04-07
Trigger Based Recording Of Flows With Play Back
App 20150036501 - Rothstein; Jesse Abraham ;   et al.
2015-02-05
Resynchronization Of Passive Monitoring Of A Flow Based On Hole Detection
App 20150019867 - Rothstein; Jesse Abraham ;   et al.
2015-01-15
Trigger based recording of flows with play back
Grant 8,867,343 - Rothstein , et al. October 21, 2
2014-10-21
Resynchronization of passive monitoring of a flow based on hole detection
Grant 8,848,744 - Rothstein , et al. September 30, 2
2014-09-30
Trigger Based Recording Of Flows With Play Back
App 20140269276 - Rothstein; Jesse Abraham ;   et al.
2014-09-18
Automated Passive Discovery Of Applications
App 20140280907 - Rothstein; Jesse Abraham ;   et al.
2014-09-18
De-duplicating Of Packets In Flows At Layer 3
App 20140280908 - Rothstein; Jesse Abraham ;   et al.
2014-09-18
Resynchronization Of Passive Monitoring Of A Flow Based On Hole Detection
App 20140269777 - Rothstein; Jesse Abraham ;   et al.
2014-09-18
Accessing SSL connection data by a third-party
Grant 8,782,393 - Rothstein , et al. July 15, 2
2014-07-15
Dynamic trunk distribution on egress
Grant 8,711,689 - Rothstein , et al. April 29, 2
2014-04-29
Automated passive discovery of applications
Grant 8,626,912 - Rothstein , et al. January 7, 2
2014-01-07
Certificate selection for virtual host servers
Grant 8,621,078 - Mukerji , et al. December 31, 2
2013-12-31
De-duplicating of packets in flows at layer 3
Grant 08619579 -
2013-12-31
De-duplicating of packets in flows at layer 3
Grant 8,619,579 - Rothstein , et al. December 31, 2
2013-12-31
Selectively enabling packet concatenation based on a transaction boundary
Grant 8,611,222 - Mukerji , et al. December 17, 2
2013-12-17
Selectively enabling packet concatenation based on a transaction boundary
Grant 8,565,088 - Mukerji , et al. October 22, 2
2013-10-22
Selectively enabling packet concatenation based on a transaction boundary
Grant 8,559,313 - Mukerji , et al. October 15, 2
2013-10-15
Network traffic management through protocol-configurable transaction processing
Grant 8,533,308 - Rothstein September 10, 2
2013-09-10
Adaptive compression
Grant 8,499,100 - Rothstein July 30, 2
2013-07-30
Selectively enabling network packet concatenation based on metrics
Grant 8,477,798 - Mukerji , et al. July 2, 2
2013-07-02
Adaptive compression
Grant 8,275,909 - Rothstein September 25, 2
2012-09-25
Using SYN-ACK cookies within a TCP/IP protocol
Grant 8,200,957 - Mukerji , et al. June 12, 2
2012-06-12
Dynamic trunk distribution on egress
Grant 8,189,476 - Rothstein , et al. May 29, 2
2012-05-29
Detecting anomalous network application behavior
Grant 8,185,953 - Rothstein , et al. May 22, 2
2012-05-22
Adaptive network traffic classification using historical context
Grant 8,125,908 - Rothstein , et al. February 28, 2
2012-02-28
Selective compression for network connections
Grant 8,024,483 - Rothstein , et al. September 20, 2
2011-09-20
Capture and resumption of network application sessions
Grant 7,979,555 - Rothstein , et al. July 12, 2
2011-07-12
Using SYN-ACK cookies within a TCP/IP protocol
Grant 7,921,282 - Mukerji , et al. April 5, 2
2011-04-05
Selectively enabling network packet concatenation based on metrics
Grant 7,873,065 - Mukerji , et al. January 18, 2
2011-01-18
Coalescing acknowledgement responses to improve network communications
Grant 7,826,487 - Mukerji , et al. November 2, 2
2010-11-02
Adaptive compression
Grant 7,783,781 - Rothstein , et al. August 24, 2
2010-08-24
Management of multiple client requests
Grant 7,657,618 - Rothstein , et al. February 2, 2
2010-02-02
Adaptive Network Traffic Classification Using Historical Context
App 20090141634 - Rothstein; Jesse Abraham ;   et al.
2009-06-04
Detecting Anomalous Network Application Behavior
App 20080222717 - Rothstein; Jesse Abraham ;   et al.
2008-09-11
Capture and Resumption of Network Application Sessions
App 20080209045 - Rothstein; Jesse Abraham ;   et al.
2008-08-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed