loadpatents
name:-0.010102987289429
name:-0.00046896934509277
name:-0.00041103363037109
Shrum; Edgar JR. Patent Filings

Shrum; Edgar JR.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Shrum; Edgar JR..The latest application filed is for "methods, communication networks, and computer program products for selecting an endpoint and/or a midpoint path resource for traffic associated with a network element based on whether the network element can be trusted".

Company Profile
0.0.8
  • Shrum; Edgar JR. - Smyrna GA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Methods, communication networks, and computer program products for storing and/or logging traffic associated with a network element based on whether the network element can be trusted
App 20070147262 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, systems, and computer program products for billing for trust-based services provided in a communication network
App 20070147594 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, communication networks, and computer program products for configuring a communication tunnel for traffic based on whether a network element can be trusted
App 20070147397 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, communication networks, and computer program products for monitoring, examining, and/or blocking traffic associated with a network element based on whether the network element can be trusted
App 20070150582 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, communication networks, and computer program products for mirroring traffic associated with a network element based on whether the network element can be trusted
App 20070150950 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, communication networks, and computer program products for managing application(s) on a vulnerable network element due to an untrustworthy network element by sending a command to an application to reduce the vulnerability of the network element
App 20070150951 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith
App 20070150722 - Aaron; Jeffrey ;   et al.
2007-06-28
Methods, communication networks, and computer program products for selecting an endpoint and/or a midpoint path resource for traffic associated with a network element based on whether the network element can be trusted
App 20070150939 - Aaron; Jeffrey ;   et al.
2007-06-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed