loadpatents
name:-0.16860890388489
name:-0.63608908653259
name:-0.084306001663208
Satish; Sourabh Patent Filings

Satish; Sourabh

Patent Applications and Registrations

Patent applications and USPTO patent grants for Satish; Sourabh.The latest application filed is for "extension framework for an information technology and security operations application".

Company Profile
33.200.68
  • Satish; Sourabh - Fremont CA
  • Satish; Sourabh - Freemont CA
  • Satish; Sourabh - Foster City CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Identifying evidence within an information technology (IT) operations platform
Grant 11,416,561 - Satish , et al. August 16, 2
2022-08-16
Extension Framework For An Information Technology And Security Operations Application
App 20220247784 - SATISH; Sourabh ;   et al.
2022-08-04
Utilizing predicted resolution times to allocate incident response resources in an information technology environment
Grant 11,403,393 - Satish August 2, 2
2022-08-02
User role-based interface layout profiles in an information technology (IT) and security operations application
Grant 11,372,532 - Catakli , et al. June 28, 2
2022-06-28
Optimizing display of suggested actions in a workbook
Grant 11,327,827 - Satish , et al. May 10, 2
2022-05-10
Identifying automated responses to security threats based on obtained communication interactions
Grant 11,323,472 - Satish , et al. May 3, 2
2022-05-03
Dynamic updates of incident status information
Grant 11,265,206 - Satish March 1, 2
2022-03-01
Modifying Incident Response Time Periods Based On Incident Volume
App 20220053017 - Satish; Sourabh ;   et al.
2022-02-17
Simulating multiple paths of a course of action executed in an information technology environment
Grant 11,240,120 - Mahadik , et al. February 1, 2
2022-02-01
Aggregation of incident data for correlated incidents
Grant 11,218,357 - Salinas , et al. January 4, 2
2022-01-04
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data
App 20210385123 - Friedrichs; Oliver ;   et al.
2021-12-09
Modifying incident response time periods based on containment action effectiveness
Grant 11,190,539 - Satish , et al. November 30, 2
2021-11-30
Customizable courses of action for responding to incidents in information technology environments
Grant 11,182,163 - Beals , et al. November 23, 2
2021-11-23
Containment of security threats within a computing environment
Grant 11,165,812 - Satish , et al. November 2, 2
2021-11-02
User Role-based Interface Layout Profiles In An Information Technology (it) And Security Operations Application
App 20210326032 - CATAKLI; Timur ;   et al.
2021-10-21
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating
App 20210314347 - Satish; Sourabh ;   et al.
2021-10-07
Anonymizing action implementation data obtained from incident analysis systems
Grant 11,133,977 - Friedrichs , et al. September 28, 2
2021-09-28
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments
App 20210281601 - Satish; Sourabh ;   et al.
2021-09-09
Generating Action Recommendations For Courses Of Action Used For Incident Response
App 20210281602 - Friedrichs; Oliver ;   et al.
2021-09-09
Translating Security Actions Into Computing Asset-specific Action Procedures
App 20210258340 - SATISH; Sourabh ;   et al.
2021-08-19
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat
App 20210250373 - SATISH; Sourabh ;   et al.
2021-08-12
Simulating Multiple Paths Of A Course Of Action Executed In An Information Technology Environment
App 20210226852 - Mahadik; Atif ;   et al.
2021-07-22
Context-sensitive user interfaces in an information technology (IT) and security operations application
Grant 11,061,548 - Catakli , et al. July 13, 2
2021-07-13
Dynamic generation of courses of action for incident response in an information technology environment
Grant 11,038,915 - Friedrichs , et al. June 15, 2
2021-06-15
Identifying security actions for responding to security threats based on threat state information
Grant 11,025,664 - Satish , et al. June 1, 2
2021-06-01
Learning based security threat containment
Grant 11,019,092 - Satish , et al. May 25, 2
2021-05-25
Graphical interface for incident response automation
Grant 11,019,093 - Satish , et al. May 25, 2
2021-05-25
Generating Suggested Courses Of Actions For Incidents Based On Previous Incident Handling
App 20210150026 - Satish; Sourabh ;   et al.
2021-05-20
Identifying Recommended Feature Sets Based On Application Feature Popularity
App 20210144182 - Satish; Sourabh ;   et al.
2021-05-13
Selecting actions responsive to computing environment incidents based on action impact information
Grant 10,986,120 - Satish , et al. April 20, 2
2021-04-20
Simulated incident response using simulated result when actual result is unavailable
Grant 10,985,994 - Mahadik , et al. April 20, 2
2021-04-20
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20210092152 - Satish; Sourabh ;   et al.
2021-03-25
Securely Managing Authentication Information For Automated Incident Responses
App 20210081523 - Salinas; Govind ;   et al.
2021-03-18
Identifying Automated Response Actions Based On Asset Classification
App 20210084066 - Satish; Sourabh ;   et al.
2021-03-18
Incident handling assistance based on previous incident handling
Grant 10,936,716 - Satish , et al. March 2, 2
2021-03-02
Incident response in an information technology environment using cached data from external services
Grant 10,936,488 - Earle , et al. March 2, 2
2021-03-02
Dynamically updating feature set recommendation databases
Grant 10,904,295 - Satish , et al. January 26, 2
2021-01-26
Management of actions in a computing environment based on asset classification
Grant 10,855,718 - Satish , et al. December 1, 2
2020-12-01
Encrypted storage and provision of authentication information for use when responding to an information technology incident
Grant 10,853,478 - Salinas , et al. December 1, 2
2020-12-01
Identifying related communication interactions to a security threat in a computing environment
Grant 10,834,120 - Satish , et al. November 10, 2
2020-11-10
Runtime Credential Requirement Identification For Incident Response
App 20200351259 - Salinas; Govind ;   et al.
2020-11-05
Dynamically updating feature set recommendation databases
App 20200344268 - Satish; Sourabh ;   et al.
2020-10-29
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems
App 20200344113 - Friedrichs; Oliver ;   et al.
2020-10-29
Identifying Security Actions For Responding To Security Threats Based On Threat State Information
App 20200287930 - SATISH; Sourabh ;   et al.
2020-09-10
Identification of runtime credential requirements
Grant 10,757,093 - Salinas , et al. A
2020-08-25
Identifying Security Actions Based On Computing Asset Relationship Data
App 20200259858 - A1
2020-08-13
Generating action suggestions based on anonymized data from multiple information technology environments
Grant 10,742,484 - Friedrichs , et al. A
2020-08-11
Modifying Incident Response Time Periods Based On Containment Action Effectiveness
App 20200213348 - Satish; Sourabh ;   et al.
2020-07-02
Identifying recommended feature sets for software under development
Grant 10,630,727 - Satish , et al.
2020-04-21
Incident response management based on asset configurations in a computing environment
Grant 10,616,264 - Friedrichs , et al.
2020-04-07
Determining security actions for security threats using enrichment information
Grant 10,567,424 - Satish , et al. Feb
2020-02-18
Incident response management based on environmental characteristics
Grant 10,554,687 - Satish , et al. Fe
2020-02-04
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information
App 20200007574 - Satish; Sourabh ;   et al.
2020-01-02
Graphical Interface For Incident Response Automation
App 20190373013 - SATISH; Sourabh ;   et al.
2019-12-05
Security actions for computing assets based on enrichment information
Grant 10,476,905 - Satish , et al. Nov
2019-11-12
Implementing security actions in an advisement system based on obtained software characteristics
Grant 10,425,440 - Satish , et al. Sept
2019-09-24
Translating security actions to action procedures in an advisement system
Grant 10,425,441 - Satish , et al. Sept
2019-09-24
Identifying Recommended Feature Sets For Software Under Development
App 20190253459 - Satish; Sourabh ;   et al.
2019-08-15
Recommended security action feature sets
Grant 10,320,845 - Satish , et al.
2019-06-11
Managing security actions in a computing environment based on communication activity of a security threat
Grant 10,193,920 - Satish , et al. Ja
2019-01-29
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat
App 20190020677 - SATISH; Sourabh ;   et al.
2019-01-17
Incident Response Automation Engine
App 20190014144 - SATISH; Sourabh ;   et al.
2019-01-10
Incident Response Automation Engine
App 20190007448 - SATISH; Sourabh ;   et al.
2019-01-03
Incident response using asset configuration data
Grant 10,158,663 - Satish , et al. Dec
2018-12-18
Management Of Actions In A Computing Environment Based On Asset Classification
App 20180332074 - Satish; Sourabh ;   et al.
2018-11-15
Security Actions For Computing Assets Based On Enrichment Information
App 20180316718 - Satish; Sourabh ;   et al.
2018-11-01
Management of administrative incident response based on environmental characteristics associated with a security incident
Grant 10,116,687 - Satish , et al. October 30, 2
2018-10-30
Management of security actions based on computing asset classification
Grant 10,063,587 - Satish , et al. August 28, 2
2018-08-28
Method and apparatus for remotely managing a resource at a computer
Grant 10,049,190 - Newstadt , et al. August 14, 2
2018-08-14
Classifying Kill-chains For Security Incidents
App 20180159893 - Satish; Sourabh ;   et al.
2018-06-07
Method and apparatus for extending functionality of an operating system
Grant 9,971,776 - Satish , et al. May 15, 2
2018-05-15
Managing Workflows Upon A Security Incident
App 20180124100 - Satish; Sourabh ;   et al.
2018-05-03
Methods and systems for creating and updating approved-file and trusted-domain databases
Grant 9,959,404 - Nachenberg , et al. May 1, 2
2018-05-01
Security actions for computing assets based on enrichment information
Grant 9,954,888 - Satish , et al. April 24, 2
2018-04-24
Classifying kill-chains for security incidents
Grant 9,888,029 - Satish , et al. February 6, 2
2018-02-06
Managing workflows upon a security incident
Grant 9,871,818 - Satish , et al. January 16, 2
2018-01-16
Incident Response Automation Engine
App 20180013785 - Satish; Sourabh ;   et al.
2018-01-11
Systems and methods for detecting misplaced applications using functional categories
Grant 9,846,772 - Satish December 19, 2
2017-12-19
Systems and methods for updating generic file-classification definitions
Grant 9,805,115 - Satish October 31, 2
2017-10-31
Techniques for identifying malicious downloadable applications
Grant 9,781,151 - McCorkendale , et al. October 3, 2
2017-10-03
Method, apparatus and system for protecting identity information
Grant 9,781,159 - Hernacki , et al. October 3, 2
2017-10-03
Incident response automation engine
Grant 9,762,607 - Satish , et al. September 12, 2
2017-09-12
Automated responses to security threats
Grant 9,712,555 - Satish , et al. July 18, 2
2017-07-18
Systems and methods for clustering data
Grant 9,684,705 - Satish , et al. June 20, 2
2017-06-20
Systems and methods for evaluating reputations of wireless networks
Grant 9,622,081 - Satish April 11, 2
2017-04-11
Applying functional classification to tune security policies and posture according to role and likely activity
Grant 9,621,585 - Satish , et al. April 11, 2
2017-04-11
Systems and methods for identifying variants of samples based on similarity analysis
Grant 9,571,509 - Satish , et al. February 14, 2
2017-02-14
Recommended Security Action Feature Sets
App 20170013019 - Satish; Sourabh ;   et al.
2017-01-12
Security Action Verification In A Computing Network
App 20160352773 - Satish; Sourabh ;   et al.
2016-12-01
Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions
Grant 9,385,869 - Satish , et al. July 5, 2
2016-07-05
Using historical accuracy of user decision making to improve accuracy of predictive modeling based automatic classification
Grant 9,373,080 - Satish June 21, 2
2016-06-21
Learning Based Security Threat Containment
App 20160164909 - Satish; Sourabh ;   et al.
2016-06-09
Managing Workflows Upon A Security Incident
App 20160164918 - Satish; Sourabh ;   et al.
2016-06-09
Action Recommendations For Computing Assets Based On Enrichment Information
App 20160164917 - Friedrichs; Oliver ;   et al.
2016-06-09
Classifying Kill-chains For Security Incidents
App 20160164891 - Satish; Sourabh ;   et al.
2016-06-09
Containment Of Security Threats Within A Computing Environment
App 20160164908 - Satish; Sourabh ;   et al.
2016-06-09
Management Of Security Actions Based On Computing Asset Classification
App 20160164895 - Satish; Sourabh ;   et al.
2016-06-09
Incident Response Automation Engine
App 20160164919 - Satish; Sourabh ;   et al.
2016-06-09
Automated Responses To Security Threats
App 20160164916 - Satish; Sourabh ;   et al.
2016-06-09
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20160164892 - Satish; Sourabh ;   et al.
2016-06-09
Security Actions For Computing Assets Based On Enrichment Information
App 20160164907 - Satish; Sourabh ;   et al.
2016-06-09
Detecting malware through package behavior
Grant 9,361,460 - Satish June 7, 2
2016-06-07
Methods and systems for enabling community-tested security features for legacy applications
Grant 9,332,033 - Sobel , et al. May 3, 2
2016-05-03
Systems and methods for identifying uniform resource locators that link to potentially malicious resources
Grant 9,330,258 - Satish , et al. May 3, 2
2016-05-03
Systems and methods for reporting security vulnerabilities
Grant 9,323,930 - Satish April 26, 2
2016-04-26
Systems and methods for establishing reputations of files
Grant 9,323,924 - Roundy , et al. April 26, 2
2016-04-26
Identifying misuse of legitimate objects
Grant 9,276,947 - Satish March 1, 2
2016-03-01
Communication-based reputation system
Grant 9,246,931 - Nachenberg , et al. January 26, 2
2016-01-26
Systems and methods for identifying malicious files
Grant 9,245,123 - Satish January 26, 2
2016-01-26
Method and apparatus for securing confidential data for a user in a computer
Grant 9,246,887 - Satish , et al. January 26, 2
2016-01-26
Application optimization for use based on feature popularity
Grant 9,235,390 - Satish , et al. January 12, 2
2016-01-12
Determining file risk based on security reputation of associated objects
Grant 9,231,969 - Satish January 5, 2
2016-01-05
Educating computer users concerning security threats
Grant 9,230,115 - Satish January 5, 2
2016-01-05
Detecting malicious tampering of web forms
Grant 9,230,105 - Satish , et al. January 5, 2
2016-01-05
Systems and methods for replicating computing system environments
Grant 9,223,966 - Satish , et al. December 29, 2
2015-12-29
Identifying predictive models resistant to concept drift
Grant 9,171,253 - Wright , et al. October 27, 2
2015-10-27
Systems and methods for clustering data samples
Grant 9,152,703 - Satish October 6, 2
2015-10-06
Identifying Misuse Of Legitimate Objects
App 20150281268 - Satish; Sourabh
2015-10-01
Techniques for detecting malicious activity
Grant 9,141,795 - Satish September 22, 2
2015-09-22
Calculating domain registrar reputation by analysis of hosted domains
Grant 9,130,962 - Hernacki , et al. September 8, 2
2015-09-08
Systems and methods for determining that uniform resource locators are malicious
Grant 9,083,729 - Doshi , et al. July 14, 2
2015-07-14
Identifying misuse of legitimate objects
Grant 9,075,989 - Satish July 7, 2
2015-07-07
Social trust based security model
Grant 9,077,715 - Satish , et al. July 7, 2
2015-07-07
Systems and methods for directing application updates
Grant 9,064,120 - Satish , et al. June 23, 2
2015-06-23
Techniques for reducing executable code vulnerability
Grant 9,058,492 - Satish June 16, 2
2015-06-16
Techniques for detecting infected websites
Grant 8,997,228 - Satish , et al. March 31, 2
2015-03-31
Detecting malware signed with multiple credentials
Grant 8,996,875 - Sobel , et al. March 31, 2
2015-03-31
Profiling application usage from application streaming
Grant 8,977,764 - Ramzan , et al. March 10, 2
2015-03-10
Method and apparatus for providing connectivity control
Grant 8,958,399 - Hernacki , et al. February 17, 2
2015-02-17
Educating computer users concerning social engineering security threats
Grant 8,955,109 - Satish February 10, 2
2015-02-10
Systems and methods for creating and managing backups based on health information
Grant 8,949,187 - Satish , et al. February 3, 2
2015-02-03
Identifying Misuse Of Legitimate Objects
App 20150020197 - Satish; Sourabh
2015-01-15
Systems and methods for determining authorship of an unclassified notification message
Grant 8,935,154 - Satish , et al. January 13, 2
2015-01-13
Systems And Methods For Directing Application Updates
App 20150007332 - Satish; Sourabh ;   et al.
2015-01-01
Systems and methods for exonerating untrusted software components
Grant 8,918,873 - Satish , et al. December 23, 2
2014-12-23
Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process
Grant 8,914,888 - Satish , et al. December 16, 2
2014-12-16
Communication-based reputation system
Grant 8,904,520 - Nachenberg , et al. December 2, 2
2014-12-02
Secure network cache content
Grant 8,887,277 - Sobel , et al. November 11, 2
2014-11-11
Evaluating relying parties
Grant 8,887,273 - Satish , et al. November 11, 2
2014-11-11
Techniques For Detecting Malicious Activity
App 20140331320 - SATISH; Sourabh
2014-11-06
Method and apparatus for accepting a digital identity of a user based on transitive trust among parties
Grant 8,881,253 - Satish , et al. November 4, 2
2014-11-04
Method and apparatus for identifying an optimal configuration of a resource
Grant 8,874,705 - Satish October 28, 2
2014-10-28
Identity and reputation monitoring
Grant 8,868,719 - Satish , et al. October 21, 2
2014-10-21
Enabling NAC reassessment based on fingerprint change
Grant 8,862,730 - Hernacki , et al. October 14, 2
2014-10-14
Systems and methods for identifying security risks in downloads
Grant 8,839,374 - Mehta , et al. September 16, 2
2014-09-16
Method and apparatus for collaborative claim verification
Grant 8,819,413 - Hernacki , et al. August 26, 2
2014-08-26
Method and apparatus for automating controlled computing environment protection
Grant 8,806,651 - Satish , et al. August 12, 2
2014-08-12
Application streaming and network file system optimization via integration with identity management solutions
Grant 8,806,046 - Satish , et al. August 12, 2
2014-08-12
Application streaming proactive failover
Grant 8,799,494 - Ramzan , et al. August 5, 2
2014-08-05
Method and apparatus for providing identity claim validation
Grant 8,788,836 - Hernacki , et al. July 22, 2
2014-07-22
Data access security
Grant 8,788,845 - Satish July 22, 2
2014-07-22
Classifying Samples Using Clustering
App 20140201208 - Satish; Sourabh ;   et al.
2014-07-17
Method and apparatus for securing confidential data for a user in a computer
Grant 8,782,403 - Satish , et al. July 15, 2
2014-07-15
Methods and systems for defragmenting virtual machine prefetch data on physical storage
Grant 8,775,716 - Cook , et al. July 8, 2
2014-07-08
Endpoint management using trust rating data
Grant 8,763,076 - Satish , et al. June 24, 2
2014-06-24
Systems and methods for determining and quantifying the impact of an application on the health of a system
Grant 8,762,987 - Satish June 24, 2
2014-06-24
Methods and systems for processing web content encoded with malicious code
Grant 8,745,742 - Satish , et al. June 3, 2
2014-06-03
Methods And Systems For Enabling Community-tested Security Features For Legacy Applications
App 20140143828 - Sobel; William E. ;   et al.
2014-05-22
Methods and systems for enabling community-tested security features for legacy applications
Grant 8,713,687 - Sobel , et al. April 29, 2
2014-04-29
Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing system
Grant 8,694,983 - Sobel , et al. April 8, 2
2014-04-08
Method and system for protecting user identification information
Grant 8,689,001 - Satish , et al. April 1, 2
2014-04-01
Providing installer package information to a user
Grant 8,677,346 - Griffin , et al. March 18, 2
2014-03-18
Systems and methods for looking up anti-malware metadata
Grant 8,667,592 - Sobel , et al. March 4, 2
2014-03-04
Enforcing expected control flow in program execution
Grant 8,645,923 - Satish , et al. February 4, 2
2014-02-04
Altering application behavior based on content provider reputation
Grant 8,627,476 - Satish , et al. January 7, 2
2014-01-07
Systems and methods for user-specific tuning of classification heuristics
Grant 8,626,675 - Satish January 7, 2
2014-01-07
Systems and methods for preventing unauthorized modification of network resources
Grant 8,627,407 - Satish , et al. January 7, 2
2014-01-07
Process boundary isolation using constrained processes
Grant 8,607,348 - Satish , et al. December 10, 2
2013-12-10
User role determination based on content and application classification
Grant 8,600,995 - Satish , et al. December 3, 2
2013-12-03
Techniques for managing search engine results
Grant 8,595,211 - Satish November 26, 2
2013-11-26
Secure network cache content
Grant 8,584,234 - Sobel , et al. November 12, 2
2013-11-12
Optimized application streaming for just in time compiled components
Grant 8,578,056 - Satish , et al. November 5, 2
2013-11-05
Malware detection efficacy by identifying installation and uninstallation scenarios
Grant 8,578,345 - Kennedy , et al. November 5, 2
2013-11-05
Systems and methods for revoking digital signatures
Grant 8,572,730 - Sobel , et al. October 29, 2
2013-10-29
Method and apparatus for identifying a web server
Grant 8,566,589 - Satish October 22, 2
2013-10-22
Method and apparatus for enabling e-mail routing and filtering based on dynamic identities
Grant 8,566,401 - Hernacki , et al. October 22, 2
2013-10-22
Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing
Grant 8,533,831 - Satish September 10, 2
2013-09-10
Method and apparatus for evaluating internet resources using a computer health metric
Grant 8,533,842 - Satish September 10, 2
2013-09-10
Preventing malware from abusing application data
Grant 8,499,354 - Satish , et al. July 30, 2
2013-07-30
Uninstall and system performance based software application reputation
Grant 8,499,063 - Satish , et al. July 30, 2
2013-07-30
Detecting malware through package behavior
Grant 8,499,350 - Satish July 30, 2
2013-07-30
Decision tree induction that is sensitive to attribute computational complexity
Grant 8,495,096 - Pereira , et al. July 23, 2
2013-07-23
Use of interactive messaging channels to verify endpoints
Grant 8,490,190 - Hernacki , et al. July 16, 2
2013-07-16
Enabling efficient use of an endpoint
Grant 8,473,924 - Satish , et al. June 25, 2
2013-06-25
Enforcing digital rights management in a heterogeneous environment
Grant 8,468,608 - Hernacki , et al. June 18, 2
2013-06-18
Method And System For Automatic Application Recommendation
App 20130085886 - Satish; Sourabh ;   et al.
2013-04-04
Systems And Methods For Looking Up Anti-malware Metadata
App 20120240229 - Sobel; William E. ;   et al.
2012-09-20
Safely Updating Latent Applications to Reduce Attack Surface
App 20120054729 - Sobel; William E. ;   et al.
2012-03-01
Systems and Methods for Alternating Malware Classifiers in an Attempt to Frustrate Brute-Force Malware Testing
App 20120005750 - Satish; Sourabh
2012-01-05
Behavioral Signature Generation Using Clustering
App 20110271341 - Satish; Sourabh ;   et al.
2011-11-03
Methods and Systems for Detecting Man-in-the-Browser Attacks
App 20100162393 - Sobel; William E. ;   et al.
2010-06-24
Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications
App 20100154027 - Sobel; William E. ;   et al.
2010-06-17
Calculating Domain Registrar Reputation by Analysis of Hosted Domains
App 20090328224 - Hernacki; Brian ;   et al.
2009-12-31
System and Method for Prioritizing the Compilation of Bytecode Modules During Installation of a Software Application
App 20090249313 - Sobel; William E. ;   et al.
2009-10-01
Providing Image-Based Guidance for Remote Assistance
App 20090164899 - HERNACKI; Brian ;   et al.
2009-06-25
Methods And Systems For Creating And Updating Approved-file And Trusted-domain Databases
App 20090089290 - Nachenberg; Carey ;   et al.
2009-04-02
Method and apparatus for managing digital identities through a single interface
App 20080256594 - Satish; Sourabh ;   et al.
2008-10-16
Method and apparatus for accepting a digital identity of a user based on transitive trust among parties
App 20080244722 - Satish; Sourabh ;   et al.
2008-10-02
Detecting suspicious embedded malicious content in benign file formats
App 20080010538 - Satish; Sourabh ;   et al.
2008-01-10
Trend analysis based on network admission control fingerprints
App 20070233862 - Satish; Sourabh ;   et al.
2007-10-04

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed