loadpatents
name:-0.033428907394409
name:-0.027282953262329
name:-0.014770030975342
Shulman; Amichai Patent Filings

Shulman; Amichai

Patent Applications and Registrations

Patent applications and USPTO patent grants for Shulman; Amichai.The latest application filed is for "orchestration of multiple wireless sensors for monitoring a wirelss spectrum and protocols".

Company Profile
14.59.60
  • Shulman; Amichai - Tel Aviv IL
  • Shulman; Amichai - Givataim IL
  • Shulman; Amichai - Foster City CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Orchestration Of Multiple Wireless Sensors For Monitoring A Wirelss Spectrum And Protocols
App 20220303803 - Shulman; Amichai ;   et al.
2022-09-22
Data based web application firewall
Grant 11,436,358 - Margel , et al. September 6, 2
2022-09-06
Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols
Grant 11,297,518 - Shulman , et al. April 5, 2
2022-04-05
Aggregating Alerts Of Malicious Events For Computer Security
App 20220086125 - Yehudai; Gilad ;   et al.
2022-03-17
Aggregating alerts of malicious events for computer security
Grant 11,218,448 - Yehudai , et al. January 4, 2
2022-01-04
Continuous Database Security And Compliance
App 20210248237 - REICH; Avidan ;   et al.
2021-08-12
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 11,063,960 - Be'ery , et al. July 13, 2
2021-07-13
Privacy-preserving Learning Of Web Traffic
App 20210203642 - MANTIN; Itsik ;   et al.
2021-07-01
Coordinated detection and differentiation of denial of service attacks
Grant 11,050,786 - Be'ery , et al. June 29, 2
2021-06-29
Continuous database security and compliance
Grant 11,003,779 - Reich , et al. May 11, 2
2021-05-11
Techniques For Targeted Botnet Protection
App 20210092142 - NIV; Nitzan ;   et al.
2021-03-25
Techniques for targeted botnet protection
Grant 10,911,472 - Niv , et al. February 2, 2
2021-02-02
Continuous Database Security And Compliance
App 20210012007 - REICH; Avidan ;   et al.
2021-01-14
Detection of malicious attempts to access a decoy database object based on connection type
Grant 10,834,130 - Erez , et al. November 10, 2
2020-11-10
Continuous database security and compliance
Grant 10,824,730 - Reich , et al. November 3, 2
2020-11-03
Techniques for detecting enterprise intrusions utilizing active tokens
Grant 10,805,325 - Shulman , et al. October 13, 2
2020-10-13
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20200137026 - SHULMAN; Amichai ;   et al.
2020-04-30
Data Based Web Application Firewall
App 20200097676 - MARGEL; Shiri ;   et al.
2020-03-26
Continuous Database Security And Compliance
App 20200065494 - REICH; Avidan ;   et al.
2020-02-27
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
Grant 10,567,342 - Shulman , et al. Feb
2020-02-18
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20200036683 - SHULMAN; Amichai ;   et al.
2020-01-30
Aggregating Alerts Of Malicious Events For Computer Security
App 20190372934 - Yehudai; Gilad ;   et al.
2019-12-05
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20190349395 - BE'ERY; Tal Arieh ;   et al.
2019-11-14
Techniques for detecting compromises of enterprise end stations utilizing noisy tokens
Grant 10,469,523 - Shulman , et al. No
2019-11-05
Detection Of Malicious Attempts To Access A Decoy Database Object Based On Connection Type
App 20190289034 - EREZ; Elad ;   et al.
2019-09-19
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Grant 10,404,712 - Margel , et al. Sep
2019-09-03
Coordinated detection and differentiation of denial of service attacks
Grant 10,404,742 - Be'ery , et al. Sep
2019-09-03
Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Grant 10,382,400 - Margel , et al. A
2019-08-13
Data access verification for enterprise resources
Grant 10,382,464 - Shulman , et al. A
2019-08-13
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications
Grant 10,104,095 - Shulman , et al. October 16, 2
2018-10-16
Virtual encryption patching using multiple transport layer security implementations
Grant 10,020,941 - Shulman , et al. July 10, 2
2018-07-10
Techniques For Detecting Enterprise Intrusions Utilizing Active Tokens
App 20180048665 - SHULMAN; Amichai ;   et al.
2018-02-15
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications
App 20170366559 - SHULMAN; Amichai ;   et al.
2017-12-21
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20170339165 - BE'ERY; Tal Arieh ;   et al.
2017-11-23
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications
Grant 9,781,133 - Shulman , et al. October 3, 2
2017-10-03
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 9,762,592 - Be'ery , et al. September 12, 2
2017-09-12
Techniques For Targeted Botnet Protection Using Collective Botnet Analysis
App 20170251016 - NIV; Nitzan ;   et al.
2017-08-31
Techniques For Targeted Botnet Protection
App 20170251015 - NIV; Nitzan ;   et al.
2017-08-31
Techniques For Detecting Compromises Of Enterprise End Stations Utilizing Noisy Tokens
App 20170244749 - SHULMAN; Amichai ;   et al.
2017-08-24
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens
App 20170244672 - SHULMAN; Amichai ;   et al.
2017-08-24
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets
App 20170237709 - MARGEL; Shiri ;   et al.
2017-08-17
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers
App 20170237711 - MARGEL; Shiri ;   et al.
2017-08-17
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers
App 20170187719 - MARGEL; Shiri ;   et al.
2017-06-29
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets
App 20170187718 - MARGEL; Shiri ;   et al.
2017-06-29
Detection of compromised unmanaged client end stations using synchronized tokens from enterprise-managed client end stations
Grant 9,680,833 - Dulce , et al. June 13, 2
2017-06-13
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Grant 9,674,201 - Margel , et al. June 6, 2
2017-06-06
Techniques for preventing large-scale data breaches utilizing differentiated protection layers
Grant 9,674,202 - Margel , et al. June 6, 2
2017-06-06
Compromised insider honey pots using reverse honey tokens
Grant 9,667,651 - Shulman , et al. May 30, 2
2017-05-30
Data Access Verification For Enterprise Resources
App 20170111380 - SHULMAN; Amichai ;   et al.
2017-04-20
Virtual Encryption Patching Using Multiple Transport Layer Security Implementations
App 20170093824 - SHULMAN; Amichai ;   et al.
2017-03-30
Data access verification for enterprise resources
Grant 9,591,008 - Shulman , et al. March 7, 2
2017-03-07
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20170026407 - BE'ERY; Tal Arieh ;   et al.
2017-01-26
Detection Of Compromised Unmanaged Client End Stations Using Synchronized Tokens From Enterprise-managed Client End Stations
App 20160381023 - DULCE; Sagie ;   et al.
2016-12-29
Coordinated detection and differentiation of denial of service attacks
Grant 9,485,264 - Be'Ery , et al. November 1, 2
2016-11-01
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20160301712 - SHULMAN; Amichai ;   et al.
2016-10-13
System and method for preventing web frauds committed using client-scripting attacks
Grant 9,455,997 - Shulman , et al. September 27, 2
2016-09-27
Data Access Verification For Enterprise Resources
App 20160261616 - SHULMAN; Amichai ;   et al.
2016-09-08
Compromised insider honey pots using reverse honey tokens
Grant 9,401,927 - Shulman , et al. July 26, 2
2016-07-26
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20150365428 - BE'ERY; Tal Arieh ;   et al.
2015-12-17
Coordinated detection and differentiation of denial of service attacks
Grant 9,148,440 - Be'ery , et al. September 29, 2
2015-09-29
On-demand content classification using an out-of-band communications channel for facilitating file activity monitoring and control
Grant 9,128,941 - Shulman , et al. September 8, 2
2015-09-08
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20150207806 - BE'ERY; Tal Arieh ;   et al.
2015-07-23
Coordinated Detection And Differentiation Of Denial Of Service Attacks
App 20150150123 - Be'ery; Tal Arieh ;   et al.
2015-05-28
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20150135266 - Shulman; Amichai ;   et al.
2015-05-14
Automatic generation of attribute values for rules of a web application layer attack detector
Grant 9,027,136 - Be'ery , et al. May 5, 2
2015-05-05
Automatic generation of different attribute values for detecting a same type of web application layer attack
Grant 9,027,137 - Be'ery , et al. May 5, 2
2015-05-05
Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors
Grant 9,009,832 - Be'ery , et al. April 14, 2
2015-04-14
Iterative automatic generation of attribute values for rules of a web application layer attack detector
Grant 8,997,232 - Be'ery , et al. March 31, 2
2015-03-31
System and method for preventing web frauds committed using client-scripting attacks
Grant 8,984,630 - Shulman , et al. March 17, 2
2015-03-17
Compromised insider honey pots using reverse honey tokens
Grant 8,973,142 - Shulman , et al. March 3, 2
2015-03-03
Compromised Insider Honey Pots Using Reverse Honey Tokens
App 20150013006 - Shulman; Amichai ;   et al.
2015-01-08
Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source
Grant 8,904,558 - Shulman , et al. December 2, 2
2014-12-02
Community-based Defense Through Automatic Generation Of Attribute Values For Rules Of Web Application Layer Attack Detectors
App 20140317740 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Iterative Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20140317739 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Automatic Generation Of Different Attribute Values For Detecting A Same Type Of Web Application Layer Attack
App 20140317741 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector
App 20140317738 - Be'ery; Tal Arieh ;   et al.
2014-10-23
Detecting web browser based attacks using browser response comparison tests launched from a remote source
Grant 8,869,279 - Shulman , et al. October 21, 2
2014-10-21
Detecting Web Browser Based Attacks Using Browser Digest Compute Tests Using Digest Code Provided By A Remote Source
App 20140289855 - Shulman; Amichai ;   et al.
2014-09-25
On-demand Content Classification Using An Out-of-band Communications Channel For Facilitating File Activity Monitoring And Control
App 20140258294 - Shulman; Amichai ;   et al.
2014-09-11
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications
App 20140230058 - Shulman; Amichai ;   et al.
2014-08-14
Detecting web browser based attacks using browser digest compute tests launched from a remote source
Grant 8,752,208 - Shulman , et al. June 10, 2
2014-06-10
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
Grant 8,713,682 - Shulman , et al. April 29, 2
2014-04-29
Method for monitoring stored procedures
Grant 8,453,255 - Shulman , et al. May 28, 2
2013-05-28
Dealing with web attacks using cryptographically signed HTTP cookies
Grant 8,448,233 - Shulman , et al. May 21, 2
2013-05-21
Techniques for tracking actual users in web application security systems
Grant 8,392,963 - Shulman , et al. March 5, 2
2013-03-05
Dealing With Web Attacks Using Cryptographically Signed Http Cookies
App 20130055384 - SHULMAN; AMICHAI ;   et al.
2013-02-28
Detecting Web Browser Based Attacks Using Browser Response Comparison Tests Launched From A Remote Source
App 20120304296 - Shulman; Amichai ;   et al.
2012-11-29
Detecting Web Browser Based Attacks Using Browser Digest Compute Tests Launched From A Remote Source
App 20120291129 - SHULMAN; AMICHAI ;   et al.
2012-11-15
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks
App 20120227106 - SHULMAN; AMICHAI ;   et al.
2012-09-06
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks
App 20120180129 - Shulman; Amichai ;   et al.
2012-07-12
System and method for preventing web frauds committed using client-scripting attacks
Grant 8,181,246 - Shulman , et al. May 15, 2
2012-05-15
Method and system for transparently encrypting sensitive information
Grant 8,135,948 - Shulman , et al. March 13, 2
2012-03-13
Method For Monitoring Stored Procedures
App 20120023132 - SHULMAN; Amichai ;   et al.
2012-01-26
Correlation Engine For Detecting Network Attacks And Detection Method
App 20110289583 - SHULMAN; Amichai ;   et al.
2011-11-24
Method for monitoring stored procedures
Grant 8,056,141 - Shulman , et al. November 8, 2
2011-11-08
Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
Grant 8,051,484 - Shulman , et al. November 1, 2
2011-11-01
Correlation engine for detecting network attacks and detection method
Grant 8,024,804 - Shulman , et al. September 20, 2
2011-09-20
Dynamic Learning Method And Adaptive Normal Behavior Profile (nbp) Architecture For Providing Fast Protection Of Enterprise Applications
App 20100251377 - SHULMAN; Amichai ;   et al.
2010-09-30
Method and apparatus for high-speed detection and blocking of zero day worm attacks
Grant 7,752,662 - Shulman , et al. July 6, 2
2010-07-06
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
Grant 7,743,420 - Shulman , et al. June 22, 2
2010-06-22
System and method for correlating between HTTP requests and SQL queries
Grant 7,640,235 - Shulman , et al. December 29, 2
2009-12-29
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks
App 20080320567 - SHULMAN; Amichai ;   et al.
2008-12-25
Method For Monitoring Stored Procedures
App 20080065640 - SHULMAN; Amichai ;   et al.
2008-03-13
Method and system for transparently encrypting sensitive information
App 20070294539 - Shulman; Amichai ;   et al.
2007-12-20
Correlation engine for detecting network attacks and detection method
App 20070214503 - Shulman; Amichai ;   et al.
2007-09-13
System And Method For Correlating Between Http Requests And Sql Queries
App 20070136312 - Shulman; Amichai ;   et al.
2007-06-14
Techniques For Tracking Actual Users In Web Application Security Systems
App 20070124806 - Shulman; Amichai ;   et al.
2007-05-31
Method And Security System For Indentifying And Blocking Web Attacks By Enforcing Read-only Parameters
App 20060272008 - Shulman; Amichai ;   et al.
2006-11-30
Method and apparatus for high-speed detection and blocking of zero day worm attacks
App 20050188215 - Shulman, Amichai ;   et al.
2005-08-25
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
App 20050120054 - Shulman, Amichai ;   et al.
2005-06-02
Company Registrations
SEC0001533440Shulman Amichai

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed