loadpatents
name:-0.026341915130615
name:-0.051000118255615
name:-0.0035669803619385
Szor; Peter Patent Filings

Szor; Peter

Patent Applications and Registrations

Patent applications and USPTO patent grants for Szor; Peter.The latest application filed is for "system and method to mitigate malicious calls".

Company Profile
3.47.17
  • Szor; Peter - Huntington Beach CA
  • Szor; Peter - Santa Clara CA
  • Szor; Peter - Santa Monica CA US
  • Szor; Peter - Northridge CA
  • Szor; Peter - Los Angeles CA
  • Szor; Peter - Budapest HU
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and method to mitigate malicious calls
Grant 10,204,223 - Szor , et al. Feb
2019-02-12
System And Method To Mitigate Malicious Calls
App 20180004951 - Szor; Peter ;   et al.
2018-01-04
System and method to mitigate malicious calls
Grant 9,767,283 - Szor , et al. September 19, 2
2017-09-19
System And Method To Mitigate Malicious Calls
App 20150379267 - Szor; Peter ;   et al.
2015-12-31
Intelligent hashes for centralized malware detection
Grant 8,732,825 - Park , et al. May 20, 2
2014-05-20
Centralized scanner database with optimal definition distribution using network queries
Grant 8,214,977 - Szor July 10, 2
2012-07-10
Metamorphic computer virus detection
Grant 7,937,764 - Szor May 3, 2
2011-05-03
Refining behavioral detections for early blocking of malicious code
Grant 7,818,802 - Szor , et al. October 19, 2
2010-10-19
Dynamic detection of computer worms
Grant 7,779,473 - Szor August 17, 2
2010-08-17
Method and apparatus for detecting hidden network communication channels of rootkit tools
Grant 7,665,136 - Szor February 16, 2
2010-02-16
Method and apparatus to detect and prevent malicious changes to tokens
Grant 7,665,139 - Szor , et al. February 16, 2
2010-02-16
Method and apparatus for detecting hidden rootkits
Grant 7,665,123 - Szor , et al. February 16, 2
2010-02-16
Method and apparatus to block fast-spreading computer worms that use DNS MX record queries
Grant 7,634,808 - Szor , et al. December 15, 2
2009-12-15
Intelligent Hashes for Centralized Malware Detection
App 20090300761 - Park; John ;   et al.
2009-12-03
Centralized Scanner Database With Qptimal Definition Distribution Using Network Queries
App 20090293125 - Szor; Peter
2009-11-26
Detection of SYSENTER/SYSCALL hijacking
Grant 7,617,534 - Szor , et al. November 10, 2
2009-11-10
Method and apparatus for preventing rootkit installation
Grant 7,607,173 - Szor , et al. October 20, 2
2009-10-20
Cache scanning system and method
Grant 7,590,813 - Szor September 15, 2
2009-09-15
Detecting malicious software through process dump scanning
Grant 7,568,233 - Szor , et al. July 28, 2
2009-07-28
Alternated update system and method
Grant 7,549,169 - Sobel , et al. June 16, 2
2009-06-16
No-execute processor feature global disabling prevention system and method
Grant 7,540,026 - Szor , et al. May 26, 2
2009-05-26
Distributed anti-malware
Grant 7,523,502 - Kennedy , et al. April 21, 2
2009-04-21
Filtered antivirus scanning
Grant 7,523,500 - Szor , et al. April 21, 2
2009-04-21
Update protection system and method
Grant 7,516,150 - McCorkendale , et al. April 7, 2
2009-04-07
Hosts file protection system and method
Grant 7,487,546 - Szor February 3, 2
2009-02-03
Selective detection of malicious computer code
Grant 7,458,099 - Nachenberg , et al. November 25, 2
2008-11-25
Kernel mode overflow attack prevention system and method
Grant 7,437,759 - Szor October 14, 2
2008-10-14
Metamorphic Computer Virus Detection
App 20080209562 - Szor; Peter
2008-08-28
Heuristic detection of malicious computer code by page tracking
Grant 7,418,729 - Szor August 26, 2
2008-08-26
Metamorphic computer virus detection
Grant 7,409,717 - Szor August 5, 2
2008-08-05
Signature extraction system and method
Grant 7,392,543 - Szor June 24, 2
2008-06-24
Preventing e-mail propagation of malicious computer code
Grant 7,380,277 - Szor May 27, 2
2008-05-27
Countering malicious code infections to computer files that have been infected more than once
Grant 7,367,056 - Szor , et al. April 29, 2
2008-04-29
Refining behavioral detections for early blocking of malicious code
Grant 7,360,249 - Szor , et al. April 15, 2
2008-04-15
In memory heuristic system and method for detecting viruses
Grant 7,340,777 - Szor March 4, 2
2008-03-04
Selective detection of malicious computer code
Grant 7,337,471 - Nachenberg , et al. February 26, 2
2008-02-26
Proactive prevention of polymorphic SMTP worms
Grant 7,334,262 - Szor February 19, 2
2008-02-19
Detecting viruses using register state
Grant 7,334,263 - Szor February 19, 2
2008-02-19
Method and system to detect dangerous file name extensions
Grant 7,328,456 - Szor , et al. February 5, 2
2008-02-05
Method and system to prevent peer-to-peer (P2P) worms
Grant 7,325,251 - Szor January 29, 2
2008-01-29
Host-based detection and prevention of malicious code propagation
Grant 7,325,185 - Szor January 29, 2
2008-01-29
Refining Behavioral Detections for Early Blocking of Malicious Code
App 20080016568 - Szor; Peter ;   et al.
2008-01-17
Dynamic detection of computer worms
Grant 7,293,290 - Szor November 6, 2
2007-11-06
Send blocking system and method
Grant 7,287,281 - Szor October 23, 2
2007-10-23
Return-to-LIBC attack blocking system and method
Grant 7,287,283 - Szor October 23, 2
2007-10-23
Fuzzy scanning system and method
Grant 7,284,273 - Szor October 16, 2
2007-10-16
Return-to-LIBC attack detection using branch trace records system and method
Grant 7,284,276 - Conover , et al. October 16, 2
2007-10-16
Exception handling validation system and method
Grant 7,281,271 - Szor October 9, 2
2007-10-09
Shell code blocking system and method
Grant 7,228,563 - Szor June 5, 2
2007-06-05
Safe memory scanning
Grant 7,216,367 - Szor May 8, 2
2007-05-08
Countering infections to communications modules
Grant 7,155,742 - Szor December 26, 2
2006-12-26
Return-to-LIBC attack detection using branch trace records system and method
App 20050166001 - Conover, Matthew ;   et al.
2005-07-28
Proactive prevention of polymorphic SMTP worms
App 20050166268 - Szor, Peter
2005-07-28
Signature extraction system and method
App 20050022018 - Szor, Peter
2005-01-27
Detecting viruses using register state
App 20040255165 - Szor, Peter
2004-12-16
Safe memory scanning
App 20040168070 - Szor, Peter
2004-08-26
Dynamic detection of computer worms
App 20040158725 - Szor, Peter
2004-08-12
Shell code blocking system and method
App 20040158729 - Szor, Peter
2004-08-12
Selective detection of malicious computer code
App 20040068664 - Nachenberg, Carey ;   et al.
2004-04-08
Heuristic detection of malicious computer code by page tracking
App 20040015712 - Szor, Peter
2004-01-22
Preventing e-mail propagation of malicious computer code
App 20040015726 - Szor, Peter
2004-01-22
Elastic pipe-connecting component for pipes or pipelines, or the like
Grant 4,186,949 - Bartha , et al. February 5, 1
1980-02-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed