loadpatents
name:-0.021284103393555
name:-0.014690160751343
name:-0.0049700736999512
Schutz; Harald Patent Filings

Schutz; Harald

Patent Applications and Registrations

Patent applications and USPTO patent grants for Schutz; Harald.The latest application filed is for "intrusion detection with honeypot keys".

Company Profile
4.17.18
  • Schutz; Harald - Linz AT
  • Schutz; Harald - Hennef DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Intrusion Detection With Honeypot Keys
App 20210344715 - Schutz; Harald ;   et al.
2021-11-04
Intrusion detection with honeypot keys
Grant 11,089,056 - Schutz , et al. August 10, 2
2021-08-10
Key throttling to mitigate unauthorized file access
Grant 10,979,449 - Humphries , et al. April 13, 2
2021-04-13
Perimeter enforcement of encryption rules
Grant 10,834,061 - Humphries , et al. November 10, 2
2020-11-10
Behavioral-based control of access to encrypted content by a process
Grant 10,691,824 - Ray , et al.
2020-06-23
Intermediate encryption for exposed content
Grant 10,686,827 - Schutz , et al.
2020-06-16
Key throttling to mitigate unauthorized file access
Grant 10,681,078 - Humphries , et al.
2020-06-09
Behavioral-based control of access to encrypted content by a process
Grant 10,657,277 - Ray , et al.
2020-05-19
Process-level control of encrypted content
Grant 10,650,154 - Ray , et al.
2020-05-12
Just-in-time encryption
Grant 10,628,597 - Berger , et al.
2020-04-21
Intrusion Detection With Honeypot Keys
App 20200106808 - Schutz; Harald ;   et al.
2020-04-02
Labeling objects on an endpoint for encryption management
Grant 10,558,800 - Ray , et al. Feb
2020-02-11
Key Throttling To Mitigate Unauthorized File Access
App 20200036747 - Humphries; Russell ;   et al.
2020-01-30
Key management for compromised enterprise endpoints
Grant 10,516,531 - Schutz , et al. Dec
2019-12-24
Perimeter Enforcement Of Encryption Rules
App 20190253399 - Humphries; Russell ;   et al.
2019-08-15
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20190228172 - Ray; Kenneth D. ;   et al.
2019-07-25
Perimeter enforcement of encryption rules
Grant 10,263,966 - Humphries , et al.
2019-04-16
Key Management For Compromised Enterprise Endpoints
App 20180367299 - Schutz; Harald ;   et al.
2018-12-20
Labeling Objects On An Endpoint For Encryption Management
App 20180276378 - Ray; Kenneth D. ;   et al.
2018-09-27
Key management for compromised enterprise endpoints
Grant 10,063,373 - Schutz , et al. August 28, 2
2018-08-28
Behavioral-based control of access to encrypted content by a process
Grant 9,984,248 - Ray , et al. May 29, 2
2018-05-29
Labeling objects on an endpoint for encryption management
Grant 9,965,627 - Ray , et al. May 8, 2
2018-05-08
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20180075249 - Ray; Kenneth D. ;   et al.
2018-03-15
Key Throttling To Mitigate Unauthorized File Access
App 20170359370 - Humphries; Russell ;   et al.
2017-12-14
Intermediate Encryption For Exposed Content
App 20170302696 - Schutz; Harald ;   et al.
2017-10-19
Just-in-time Encryption
App 20170302458 - Berger; Andreas ;   et al.
2017-10-19
Perimeter Enforcement Of Encryption Rules
App 20170302635 - Humphries; Russell ;   et al.
2017-10-19
Behavioral-based Control Of Access To Encrypted Content By A Process
App 20170235967 - Ray; Kenneth D. ;   et al.
2017-08-17
Process-level Control Of Encrypted Content
App 20170235966 - Ray; Kenneth D. ;   et al.
2017-08-17
Key Management For Compromised Enterprise Endpoints
App 20170078093 - Schutz; Harald ;   et al.
2017-03-16
Key management for compromised enterprise endpoints
Grant 9,537,841 - Schutz , et al. January 3, 2
2017-01-03
Key Management For Compromised Enterprise Endpoints
App 20160191476 - Schutz; Harald ;   et al.
2016-06-30
Labeling Objects On An Endpoint For Encryption Management
App 20160078225 - Ray; Kenneth D. ;   et al.
2016-03-17
Burner
Grant 8,246,345 - Schutz , et al. August 21, 2
2012-08-21
Burner
App 20110229836 - Schutz; Harald ;   et al.
2011-09-22

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed