loadpatents
Patent applications and USPTO patent grants for Schutz; Harald.The latest application filed is for "intrusion detection with honeypot keys".
Patent | Date |
---|---|
Intrusion Detection With Honeypot Keys App 20210344715 - Schutz; Harald ;   et al. | 2021-11-04 |
Intrusion detection with honeypot keys Grant 11,089,056 - Schutz , et al. August 10, 2 | 2021-08-10 |
Key throttling to mitigate unauthorized file access Grant 10,979,449 - Humphries , et al. April 13, 2 | 2021-04-13 |
Perimeter enforcement of encryption rules Grant 10,834,061 - Humphries , et al. November 10, 2 | 2020-11-10 |
Behavioral-based control of access to encrypted content by a process Grant 10,691,824 - Ray , et al. | 2020-06-23 |
Intermediate encryption for exposed content Grant 10,686,827 - Schutz , et al. | 2020-06-16 |
Key throttling to mitigate unauthorized file access Grant 10,681,078 - Humphries , et al. | 2020-06-09 |
Behavioral-based control of access to encrypted content by a process Grant 10,657,277 - Ray , et al. | 2020-05-19 |
Process-level control of encrypted content Grant 10,650,154 - Ray , et al. | 2020-05-12 |
Just-in-time encryption Grant 10,628,597 - Berger , et al. | 2020-04-21 |
Intrusion Detection With Honeypot Keys App 20200106808 - Schutz; Harald ;   et al. | 2020-04-02 |
Labeling objects on an endpoint for encryption management Grant 10,558,800 - Ray , et al. Feb | 2020-02-11 |
Key Throttling To Mitigate Unauthorized File Access App 20200036747 - Humphries; Russell ;   et al. | 2020-01-30 |
Key management for compromised enterprise endpoints Grant 10,516,531 - Schutz , et al. Dec | 2019-12-24 |
Perimeter Enforcement Of Encryption Rules App 20190253399 - Humphries; Russell ;   et al. | 2019-08-15 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20190228172 - Ray; Kenneth D. ;   et al. | 2019-07-25 |
Perimeter enforcement of encryption rules Grant 10,263,966 - Humphries , et al. | 2019-04-16 |
Key Management For Compromised Enterprise Endpoints App 20180367299 - Schutz; Harald ;   et al. | 2018-12-20 |
Labeling Objects On An Endpoint For Encryption Management App 20180276378 - Ray; Kenneth D. ;   et al. | 2018-09-27 |
Key management for compromised enterprise endpoints Grant 10,063,373 - Schutz , et al. August 28, 2 | 2018-08-28 |
Behavioral-based control of access to encrypted content by a process Grant 9,984,248 - Ray , et al. May 29, 2 | 2018-05-29 |
Labeling objects on an endpoint for encryption management Grant 9,965,627 - Ray , et al. May 8, 2 | 2018-05-08 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20180075249 - Ray; Kenneth D. ;   et al. | 2018-03-15 |
Key Throttling To Mitigate Unauthorized File Access App 20170359370 - Humphries; Russell ;   et al. | 2017-12-14 |
Intermediate Encryption For Exposed Content App 20170302696 - Schutz; Harald ;   et al. | 2017-10-19 |
Just-in-time Encryption App 20170302458 - Berger; Andreas ;   et al. | 2017-10-19 |
Perimeter Enforcement Of Encryption Rules App 20170302635 - Humphries; Russell ;   et al. | 2017-10-19 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20170235967 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Process-level Control Of Encrypted Content App 20170235966 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Key Management For Compromised Enterprise Endpoints App 20170078093 - Schutz; Harald ;   et al. | 2017-03-16 |
Key management for compromised enterprise endpoints Grant 9,537,841 - Schutz , et al. January 3, 2 | 2017-01-03 |
Key Management For Compromised Enterprise Endpoints App 20160191476 - Schutz; Harald ;   et al. | 2016-06-30 |
Labeling Objects On An Endpoint For Encryption Management App 20160078225 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Burner Grant 8,246,345 - Schutz , et al. August 21, 2 | 2012-08-21 |
Burner App 20110229836 - Schutz; Harald ;   et al. | 2011-09-22 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.