loadpatents
name:-0.13599896430969
name:-0.16298484802246
name:-0.068428993225098
Salinas; Govind Patent Filings

Salinas; Govind

Patent Applications and Registrations

Patent applications and USPTO patent grants for Salinas; Govind.The latest application filed is for "modifying incident response time periods based on incident volume".

Company Profile
18.41.45
  • Salinas; Govind - Sunnyvale CA
  • Salinas; Govind - Austin TX US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Identifying automated responses to security threats based on obtained communication interactions
Grant 11,323,472 - Satish , et al. May 3, 2
2022-05-03
Modifying Incident Response Time Periods Based On Incident Volume
App 20220053017 - Satish; Sourabh ;   et al.
2022-02-17
Simulating multiple paths of a course of action executed in an information technology environment
Grant 11,240,120 - Mahadik , et al. February 1, 2
2022-02-01
Aggregation of incident data for correlated incidents
Grant 11,218,357 - Salinas , et al. January 4, 2
2022-01-04
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data
App 20210385123 - Friedrichs; Oliver ;   et al.
2021-12-09
Modifying incident response time periods based on containment action effectiveness
Grant 11,190,539 - Satish , et al. November 30, 2
2021-11-30
Customizable courses of action for responding to incidents in information technology environments
Grant 11,182,163 - Beals , et al. November 23, 2
2021-11-23
Containment of security threats within a computing environment
Grant 11,165,812 - Satish , et al. November 2, 2
2021-11-02
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating
App 20210314347 - Satish; Sourabh ;   et al.
2021-10-07
Anonymizing action implementation data obtained from incident analysis systems
Grant 11,133,977 - Friedrichs , et al. September 28, 2
2021-09-28
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments
App 20210281601 - Satish; Sourabh ;   et al.
2021-09-09
Generating Action Recommendations For Courses Of Action Used For Incident Response
App 20210281602 - Friedrichs; Oliver ;   et al.
2021-09-09
Translating Security Actions Into Computing Asset-specific Action Procedures
App 20210258340 - SATISH; Sourabh ;   et al.
2021-08-19
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat
App 20210250373 - SATISH; Sourabh ;   et al.
2021-08-12
Simulating Multiple Paths Of A Course Of Action Executed In An Information Technology Environment
App 20210226852 - Mahadik; Atif ;   et al.
2021-07-22
Dynamic generation of courses of action for incident response in an information technology environment
Grant 11,038,915 - Friedrichs , et al. June 15, 2
2021-06-15
Identifying security actions for responding to security threats based on threat state information
Grant 11,025,664 - Satish , et al. June 1, 2
2021-06-01
Learning based security threat containment
Grant 11,019,092 - Satish , et al. May 25, 2
2021-05-25
Graphical interface for incident response automation
Grant 11,019,093 - Satish , et al. May 25, 2
2021-05-25
Generating Suggested Courses Of Actions For Incidents Based On Previous Incident Handling
App 20210150026 - Satish; Sourabh ;   et al.
2021-05-20
Identifying Recommended Feature Sets Based On Application Feature Popularity
App 20210144182 - Satish; Sourabh ;   et al.
2021-05-13
Selecting actions responsive to computing environment incidents based on action impact information
Grant 10,986,120 - Satish , et al. April 20, 2
2021-04-20
Simulated incident response using simulated result when actual result is unavailable
Grant 10,985,994 - Mahadik , et al. April 20, 2
2021-04-20
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20210092152 - Satish; Sourabh ;   et al.
2021-03-25
Identifying Automated Response Actions Based On Asset Classification
App 20210084066 - Satish; Sourabh ;   et al.
2021-03-18
Securely Managing Authentication Information For Automated Incident Responses
App 20210081523 - Salinas; Govind ;   et al.
2021-03-18
Incident response in an information technology environment using cached data from external services
Grant 10,936,488 - Earle , et al. March 2, 2
2021-03-02
Incident handling assistance based on previous incident handling
Grant 10,936,716 - Satish , et al. March 2, 2
2021-03-02
Dynamically updating feature set recommendation databases
Grant 10,904,295 - Satish , et al. January 26, 2
2021-01-26
Management of actions in a computing environment based on asset classification
Grant 10,855,718 - Satish , et al. December 1, 2
2020-12-01
Encrypted storage and provision of authentication information for use when responding to an information technology incident
Grant 10,853,478 - Salinas , et al. December 1, 2
2020-12-01
Identifying related communication interactions to a security threat in a computing environment
Grant 10,834,120 - Satish , et al. November 10, 2
2020-11-10
Runtime Credential Requirement Identification For Incident Response
App 20200351259 - Salinas; Govind ;   et al.
2020-11-05
Dynamically updating feature set recommendation databases
App 20200344268 - Satish; Sourabh ;   et al.
2020-10-29
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems
App 20200344113 - Friedrichs; Oliver ;   et al.
2020-10-29
Identifying Security Actions For Responding To Security Threats Based On Threat State Information
App 20200287930 - SATISH; Sourabh ;   et al.
2020-09-10
Identification of runtime credential requirements
Grant 10,757,093 - Salinas , et al. A
2020-08-25
Identifying Security Actions Based On Computing Asset Relationship Data
App 20200259858 - A1
2020-08-13
Generating action suggestions based on anonymized data from multiple information technology environments
Grant 10,742,484 - Friedrichs , et al. A
2020-08-11
Modifying Incident Response Time Periods Based On Containment Action Effectiveness
App 20200213348 - Satish; Sourabh ;   et al.
2020-07-02
Identifying recommended feature sets for software under development
Grant 10,630,727 - Satish , et al.
2020-04-21
Incident response management based on asset configurations in a computing environment
Grant 10,616,264 - Friedrichs , et al.
2020-04-07
Determining security actions for security threats using enrichment information
Grant 10,567,424 - Satish , et al. Feb
2020-02-18
Incident response management based on environmental characteristics
Grant 10,554,687 - Satish , et al. Fe
2020-02-04
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information
App 20200007574 - Satish; Sourabh ;   et al.
2020-01-02
Graphical Interface For Incident Response Automation
App 20190373013 - SATISH; Sourabh ;   et al.
2019-12-05
Security actions for computing assets based on enrichment information
Grant 10,476,905 - Satish , et al. Nov
2019-11-12
Implementing security actions in an advisement system based on obtained software characteristics
Grant 10,425,440 - Satish , et al. Sept
2019-09-24
Translating security actions to action procedures in an advisement system
Grant 10,425,441 - Satish , et al. Sept
2019-09-24
Identifying Recommended Feature Sets For Software Under Development
App 20190253459 - Satish; Sourabh ;   et al.
2019-08-15
Recommended security action feature sets
Grant 10,320,845 - Satish , et al.
2019-06-11
Managing security actions in a computing environment based on communication activity of a security threat
Grant 10,193,920 - Satish , et al. Ja
2019-01-29
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat
App 20190020677 - SATISH; Sourabh ;   et al.
2019-01-17
Incident Response Automation Engine
App 20190014144 - SATISH; Sourabh ;   et al.
2019-01-10
Incident Response Automation Engine
App 20190007448 - SATISH; Sourabh ;   et al.
2019-01-03
Incident response using asset configuration data
Grant 10,158,663 - Satish , et al. Dec
2018-12-18
Management Of Actions In A Computing Environment Based On Asset Classification
App 20180332074 - Satish; Sourabh ;   et al.
2018-11-15
Security Actions For Computing Assets Based On Enrichment Information
App 20180316718 - Satish; Sourabh ;   et al.
2018-11-01
Management of administrative incident response based on environmental characteristics associated with a security incident
Grant 10,116,687 - Satish , et al. October 30, 2
2018-10-30
Management of security actions based on computing asset classification
Grant 10,063,587 - Satish , et al. August 28, 2
2018-08-28
Classifying Kill-chains For Security Incidents
App 20180159893 - Satish; Sourabh ;   et al.
2018-06-07
Managing Workflows Upon A Security Incident
App 20180124100 - Satish; Sourabh ;   et al.
2018-05-03
Security actions for computing assets based on enrichment information
Grant 9,954,888 - Satish , et al. April 24, 2
2018-04-24
Classifying kill-chains for security incidents
Grant 9,888,029 - Satish , et al. February 6, 2
2018-02-06
Managing workflows upon a security incident
Grant 9,871,818 - Satish , et al. January 16, 2
2018-01-16
Incident Response Automation Engine
App 20180013785 - Satish; Sourabh ;   et al.
2018-01-11
Incident response automation engine
Grant 9,762,607 - Satish , et al. September 12, 2
2017-09-12
Automated responses to security threats
Grant 9,712,555 - Satish , et al. July 18, 2
2017-07-18
Systems and methods for clustering data
Grant 9,684,705 - Satish , et al. June 20, 2
2017-06-20
Recommended Security Action Feature Sets
App 20170013019 - Satish; Sourabh ;   et al.
2017-01-12
Security Action Verification In A Computing Network
App 20160352773 - Satish; Sourabh ;   et al.
2016-12-01
Incident Response Automation Engine
App 20160164919 - Satish; Sourabh ;   et al.
2016-06-09
Management Of Security Actions Based On Computing Asset Classification
App 20160164895 - Satish; Sourabh ;   et al.
2016-06-09
Containment Of Security Threats Within A Computing Environment
App 20160164908 - Satish; Sourabh ;   et al.
2016-06-09
Automated Responses To Security Threats
App 20160164916 - Satish; Sourabh ;   et al.
2016-06-09
Action Recommendations For Computing Assets Based On Enrichment Information
App 20160164917 - Friedrichs; Oliver ;   et al.
2016-06-09
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20160164892 - Satish; Sourabh ;   et al.
2016-06-09
Managing Workflows Upon A Security Incident
App 20160164918 - Satish; Sourabh ;   et al.
2016-06-09
Classifying Kill-chains For Security Incidents
App 20160164891 - Satish; Sourabh ;   et al.
2016-06-09
Security Actions For Computing Assets Based On Enrichment Information
App 20160164907 - Satish; Sourabh ;   et al.
2016-06-09
Learning Based Security Threat Containment
App 20160164909 - Satish; Sourabh ;   et al.
2016-06-09
Classifying Samples Using Clustering
App 20140201208 - Satish; Sourabh ;   et al.
2014-07-17
Method and apparatus to secure user confidential data from untrusted browser extensions
Grant 7,975,308 - Satish , et al. July 5, 2
2011-07-05
Method to identify buffer overflows and RLIBC attacks
Grant 7,945,953 - Salinas , et al. May 17, 2
2011-05-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed