loadpatents
Patent applications and USPTO patent grants for Thomas; Andrew J..The latest application filed is for "managing admission of unrecognized devices onto an enterprise network".
Patent | Date |
---|---|
Managing Admission Of Unrecognized Devices Onto An Enterprise Network App 20220286481 - Shaw; John Edward Tyrone ;   et al. | 2022-09-08 |
Endpoint With Remotely Programmable Data Recorder App 20220217166 - Ladnai; Beata ;   et al. | 2022-07-07 |
Dynamically Updated User Interface For Threat Investigation App 20220217167 - Saxe; Joshua Daniel ;   et al. | 2022-07-07 |
Tracking Malware Root Causes With An Event Graph App 20220198010 - Ladnai; Beata ;   et al. | 2022-06-23 |
Tracking Malware Root Causes With An Event Graph App 20220198009 - Ladnai; Beata ;   et al. | 2022-06-23 |
Securing Endpoints In A Heterogenous Enterprise Network App 20220201017 - Grimm; Moritz Daniel ;   et al. | 2022-06-23 |
Application Firewall App 20220166794 - Thomas; Andrew J. ;   et al. | 2022-05-26 |
Use Of An Application Controller To Monitor And Control Software File And Application Environments App 20220156373 - Thomas; Andrew J. | 2022-05-19 |
Chain Of Custody For Enterprise Documents App 20220156399 - Ackerman; Karl ;   et al. | 2022-05-19 |
Firewall Techniques For Colored Objects On Endpoints App 20220131836 - Thomas; Andrew J. ;   et al. | 2022-04-28 |
Using reputation to avoid false malware detections Grant 11,310,264 - Thomas April 19, 2 | 2022-04-19 |
Managing admission of unrecognized devices onto an enterprise network Grant 11,310,275 - Shaw , et al. April 19, 2 | 2022-04-19 |
Dynamic Sandbox Scarecrow For Malware Management App 20220114257 - McKerchar; Ross ;   et al. | 2022-04-14 |
Forensic query of local event streams in an enterprise network Grant 11,297,073 - Ladnai , et al. April 5, 2 | 2022-04-05 |
Chain of custody for enterprise documents Grant 11,288,385 - Ackerman , et al. March 29, 2 | 2022-03-29 |
Labeling network flows according to source applications Grant 11,277,416 - Ray , et al. March 15, 2 | 2022-03-15 |
Mitigation Of Return-oriented Programming Attacks App 20220075868 - Loman; Erik Jan ;   et al. | 2022-03-10 |
Analog-to-digital Converter With Auto-zeroing Residue Amplification Circuit App 20220077868 - STEENSGAARD-MADSEN; Jesper ;   et al. | 2022-03-10 |
Securing endpoints in a heterogenous enterprise network Grant 11,271,950 - Grimm , et al. March 8, 2 | 2022-03-08 |
Forensic Analysis Of Computing Activity App 20220070184 - Ladnai; Beata ;   et al. | 2022-03-03 |
Application firewall Grant 11,258,821 - Thomas , et al. February 22, 2 | 2022-02-22 |
Use of an application controller to monitor and control software file and application environments Grant 11,244,049 - Thomas February 8, 2 | 2022-02-08 |
Federated Security For Multi-enterprise Communications App 20220014522 - Thomas; Andrew J. ;   et al. | 2022-01-13 |
Data Augmentation For Threat Investigation In An Enterprise Network App 20210400071 - Ray; Kenneth D. ;   et al. | 2021-12-23 |
Live Discovery Of Enterprise Threats Based On Security Query Activity App 20210400070 - Ackerman; Karl ;   et al. | 2021-12-23 |
Mitigation of return-oriented programming attacks Grant 11,194,900 - Loman , et al. December 7, 2 | 2021-12-07 |
Detecting lateral movement by malicious applications Grant 11,184,392 - Thomas , et al. November 23, 2 | 2021-11-23 |
Server-client authentication with integrated status update Grant 11,184,391 - Thomas , et al. November 23, 2 | 2021-11-23 |
Dynamic Policy Based On User Experience App 20210342467 - Levy; Joseph H. ;   et al. | 2021-11-04 |
Detecting Triggering Events For Distributed Denial Of Service Attacks App 20210344707 - Ackerman; Karl ;   et al. | 2021-11-04 |
Detecting endpoint compromise based on network usage history Grant 11,165,797 - Ackerman , et al. November 2, 2 | 2021-11-02 |
Managing virtual machine security resources Grant 11,157,300 - Thomas , et al. October 26, 2 | 2021-10-26 |
Firewall techniques for colored objects on endpoints Grant 11,140,130 - Thomas , et al. October 5, 2 | 2021-10-05 |
Secure endpoint in a heterogenous enterprise network Grant 11,140,195 - Grimm , et al. October 5, 2 | 2021-10-05 |
Portal for managing admission of unrecognized devices to an enterprise network Grant 11,134,056 - Shaw , et al. September 28, 2 | 2021-09-28 |
Detecting triggering events for distributed denial of service attacks Grant 11,102,238 - Ackerman , et al. August 24, 2 | 2021-08-24 |
Forensic analysis of computing activity Grant 11,095,669 - Ladnai , et al. August 17, 2 | 2021-08-17 |
Portal for managing admission of unrecognized devices to an enterprise network Grant 11,095,609 - Shaw , et al. August 17, 2 | 2021-08-17 |
Enterprise Network Threat Detection App 20210250366 - Ladnai; Beata ;   et al. | 2021-08-12 |
Dynamic policy based on user experience Grant 11,087,014 - Levy , et al. August 10, 2 | 2021-08-10 |
Enterprise Document Classification App 20210240845 - Thomas; Andrew J. | 2021-08-05 |
Dynamic multi-factor authentication Grant 11,068,615 - Levy , et al. July 20, 2 | 2021-07-20 |
Threat Detection With Business Impact Scoring App 20210211441 - Humphries; Russell ;   et al. | 2021-07-08 |
Computer Augmented Threat Evaluation App 20210211440 - Saxe; Joshua Daniel ;   et al. | 2021-07-08 |
Managing claiming of unrecognized devices for admission to an enterprise network Grant 11,019,056 - Shaw , et al. May 25, 2 | 2021-05-25 |
Enterprise document classification Grant 10,984,122 - Thomas April 20, 2 | 2021-04-20 |
Managing claiming of unrecognized devices for admission to an enterprise network Grant 10,986,092 - Shaw , et al. April 20, 2 | 2021-04-20 |
Local proxy detection Grant 10,986,109 - Howard , et al. April 20, 2 | 2021-04-20 |
Baiting endpoints for improved detection of authentication attacks Grant 10,986,124 - Thomas , et al. April 20, 2 | 2021-04-20 |
Enterprise network threat detection Grant 10,972,485 - Ladnai , et al. April 6, 2 | 2021-04-06 |
Device management based on groups of network adapters Grant 10,972,431 - Grimm , et al. April 6, 2 | 2021-04-06 |
Electronic mail security using root cause analysis Grant 10,972,483 - Thomas , et al. April 6, 2 | 2021-04-06 |
Sandbox Environment For Document Preview And Analysis App 20210097171 - McKerchar; Ross ;   et al. | 2021-04-01 |
Secure labeling of network flows Grant 10,938,781 - Schiappa , et al. March 2, 2 | 2021-03-02 |
Computer augmented threat evaluation Grant 10,938,838 - Saxe , et al. March 2, 2 | 2021-03-02 |
Threat detection with business impact scoring Grant 10,938,839 - Humphries , et al. March 2, 2 | 2021-03-02 |
Sandbox environment for document preview and analysis Grant 10,896,254 - McKerchar , et al. January 19, 2 | 2021-01-19 |
Tracking Malicious Software Movement With An Event Graph App 20210012005 - Ladnai; Beata ;   et al. | 2021-01-14 |
Secure labeling of network flows Grant 10,880,269 - Schiappa , et al. December 29, 2 | 2020-12-29 |
Electronic mail security using a heartbeat Grant 10,868,821 - Thomas , et al. December 15, 2 | 2020-12-15 |
Network device with transparent heartbeat processing Grant 10,862,864 - Grimm , et al. December 8, 2 | 2020-12-08 |
Normalized indications of compromise Grant 10,841,339 - Ray , et al. November 17, 2 | 2020-11-17 |
Endpoint malware detection using an event graph Grant 10,817,602 - Ladnai , et al. October 27, 2 | 2020-10-27 |
Endpoint-controlled Rogue Ap Avoidance + Rogue Ap Detection Using Synchronized Security App 20200336914 - Kaushik; Anil ;   et al. | 2020-10-22 |
Enterprise Network Threat Detection App 20200304528 - Ackerman; Karl ;   et al. | 2020-09-24 |
Using indications of compromise for reputation based network security Grant 10,778,725 - Ray , et al. Sept | 2020-09-15 |
Using Reputation To Avoid False Malware Detections App 20200280567 - Thomas; Andrew J. | 2020-09-03 |
Mitigation Of Return-oriented Programming Attacks App 20200242239 - Loman; Erik Jan ;   et al. | 2020-07-30 |
Secure labeling of network flows Grant 10,721,210 - Schiappa , et al. | 2020-07-21 |
Behavioral-based control of access to encrypted content by a process Grant 10,691,824 - Ray , et al. | 2020-06-23 |
Labeling computing objects for improved threat detection Grant 10,673,902 - Thomas , et al. | 2020-06-02 |
Behavioral-based control of access to encrypted content by a process Grant 10,657,277 - Ray , et al. | 2020-05-19 |
Process-level control of encrypted content Grant 10,650,154 - Ray , et al. | 2020-05-12 |
Mitigation of return-oriented programming attacks Grant 10,650,141 - Loman , et al. | 2020-05-12 |
Use Of An Application Controller To Monitor And Control Software File And Application Environments App 20200117801 - Thomas; Andrew J. | 2020-04-16 |
Using reputation to avoid false malware detections Grant 10,616,269 - Thomas | 2020-04-07 |
Threat Detection With Business Impact Scoring App 20200074360 - Humphries; Russell ;   et al. | 2020-03-05 |
Computer Assisted Identification Of Intermediate Level Threats App 20200074336 - Saxe; Joshua Daniel ;   et al. | 2020-03-05 |
Forensic Analysis Of Computing Activity App 20200076837 - Ladnai; Beata ;   et al. | 2020-03-05 |
Computer Augmented Threat Evaluation App 20200074078 - Saxe; Joshua Daniel ;   et al. | 2020-03-05 |
Enterprise Network Threat Detection App 20200076835 - Ladnai; Beata ;   et al. | 2020-03-05 |
Forensic Query Of Local Event Streams In An Enterprise Network App 20200076834 - Ladnai; Beata ;   et al. | 2020-03-05 |
Dynamic Filtering Of Endpoint Event Streams App 20200076833 - Ladnai; Beata ;   et al. | 2020-03-05 |
Labeling objects on an endpoint for encryption management Grant 10,558,800 - Ray , et al. Feb | 2020-02-11 |
Use of an application controller to monitor and control software file and application environments Grant 10,515,211 - Thomas Dec | 2019-12-24 |
Key management for compromised enterprise endpoints Grant 10,516,531 - Schutz , et al. Dec | 2019-12-24 |
Forensic analysis of computing activity Grant 10,516,682 - Ladnai , et al. Dec | 2019-12-24 |
Endpoint malware detection using an event graph Grant 10,489,588 - Ladnai , et al. Nov | 2019-11-26 |
Endpoint malware detection using an event graph Grant 10,460,105 - Ladnai , et al. Oc | 2019-10-29 |
Chain Of Custody For Enterprise Documents App 20190318128 - Ackerman; Karl ;   et al. | 2019-10-17 |
Enterprise Document Classification App 20190318109 - Thomas; Andrew J. | 2019-10-17 |
Interface For Network Security Marketplace App 20190319987 - Levy; Joseph H. ;   et al. | 2019-10-17 |
Dynamic Multi-factor Authentication App 20190319945 - Levy; Joseph H. ;   et al. | 2019-10-17 |
Centralized Event Detection App 20190319971 - Levy; Joseph H. ;   et al. | 2019-10-17 |
Threat Response Using Event Vectors App 20190319980 - Levy; Joseph H. ;   et al. | 2019-10-17 |
Dynamic Policy Based On User Experience App 20190319961 - Levy; Joseph H. ;   et al. | 2019-10-17 |
Server drift monitoring Grant 10,447,708 - Thomas , et al. Oc | 2019-10-15 |
Securing Endpoints In A Heterogenous Enterprise Network App 20190312888 - Grimm; Moritz Daniel ;   et al. | 2019-10-10 |
Secure Endpoint In A Heterogenous Enterprise Network App 20190312887 - Grimm; Moritz Daniel ;   et al. | 2019-10-10 |
Network Device With Transparent Heartbeat Processing App 20190312838 - Grimm; Moritz Daniel ;   et al. | 2019-10-10 |
Device Management Based On Groups Of Network Adapters App 20190312839 - Grimm; Moritz Daniel ;   et al. | 2019-10-10 |
Network Device For Securing Endpoints In A Heterogeneous Enterprise Network App 20190312843 - Grimm; Moritz Daniel ;   et al. | 2019-10-10 |
Endpoint malware detection using an event graph Grant 10417419 - | 2019-09-17 |
Endpoint malware detection using an event graph Grant 10417418 - | 2019-09-17 |
Secure Labeling Of Network Flows App 20190268303 - Schiappa; Daniel Salvatore ;   et al. | 2019-08-29 |
Endpoint Malware Detection Using An Event Graph App 20190258800 - Ladnai; Beata ;   et al. | 2019-08-22 |
Managing Virtual Machine Security Resources App 20190250937 - Thomas; Andrew J. ;   et al. | 2019-08-15 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint Grant 10,382,459 - Harris , et al. A | 2019-08-13 |
Portal For Managing Admission Of Unrecognized Devices To An Enterprise Network App 20190238506 - Shaw; John Edward Tyrone ;   et al. | 2019-08-01 |
Managing Admission Of Unrecognized Devices Onto An Enterprise Network App 20190238591 - Shaw; John Edward Tyrone ;   et al. | 2019-08-01 |
Managing Claiming Of Unrecognized Devices For Admission To An Enterprise Network App 20190238538 - Shaw; John Edward Tyrone ;   et al. | 2019-08-01 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20190228172 - Ray; Kenneth D. ;   et al. | 2019-07-25 |
Sandbox Environment For Document Preview And Analysis App 20190213325 - McKerchar; Ross ;   et al. | 2019-07-11 |
Electronic Mail Security Using A Heartbeat App 20190190936 - Thomas; Andrew J. ;   et al. | 2019-06-20 |
Electronic Mail Security Using Root Cause Analysis App 20190190929 - Thomas; Andrew J. ;   et al. | 2019-06-20 |
Using Indications Of Compromise For Reputation Based Network Security App 20190149580 - Ray; Kenneth D. ;   et al. | 2019-05-16 |
Tracking Usage Of Corporate Credentials App 20190149574 - Thomas; Andrew J. ;   et al. | 2019-05-16 |
Server-client Authentication With Integrated Status Update App 20190124098 - Thomas; Andrew J. ;   et al. | 2019-04-25 |
Baiting Endpoints For Improved Detection Of Authentication Attacks App 20190124112 - Thomas; Andrew J. ;   et al. | 2019-04-25 |
Detecting Lateral Movement By Malicious Applications App 20190124097 - Thomas; Andrew J. ;   et al. | 2019-04-25 |
Server-client Authentication With Integrated Status Update App 20190124047 - Thomas; Andrew J. ;   et al. | 2019-04-25 |
Multi-factor Authentication App 20190123904 - Ackerman; Karl ;   et al. | 2019-04-25 |
Application Firewall App 20190124042 - Thomas; Andrew J. ;   et al. | 2019-04-25 |
Using indications of compromise for reputation based network security Grant 10,225,286 - Ray , et al. | 2019-03-05 |
Using Reputation To Avoid False Malware Detections App 20190036944 - Thomas; Andrew J. | 2019-01-31 |
Firewall Techniques For Colored Objects On Endpoints App 20190028438 - Thomas; Andrew J. ;   et al. | 2019-01-24 |
Key Management For Compromised Enterprise Endpoints App 20180367299 - Schutz; Harald ;   et al. | 2018-12-20 |
Using Indications Of Compromise For Reputation Based Network Security App 20180324220 - Ray; Kenneth D. ;   et al. | 2018-11-08 |
Using reputation to avoid false malware detections Grant 10,122,753 - Thomas November 6, 2 | 2018-11-06 |
Firewall techniques for colored objects on endpoints Grant 10,122,687 - Thomas , et al. November 6, 2 | 2018-11-06 |
Server Drift Monitoring App 20180309771 - Thomas; Andrew J. ;   et al. | 2018-10-25 |
Labeling Objects On An Endpoint For Encryption Management App 20180276378 - Ray; Kenneth D. ;   et al. | 2018-09-27 |
Endpoint Malware Detection Using An Event Graph App 20180276380 - Ladnai; Beata ;   et al. | 2018-09-27 |
Labeling Computing Objects For Improved Threat Detection App 20180278649 - Thomas; Andrew J. ;   et al. | 2018-09-27 |
Endpoint Malware Detection Using An Event Graph App 20180276379 - Ladnai; Beata ;   et al. | 2018-09-27 |
Normalized Indications Of Compromise App 20180278650 - Ray; Kenneth D. ;   et al. | 2018-09-27 |
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint App 20180278631 - Harris; Mark D. ;   et al. | 2018-09-27 |
Key management for compromised enterprise endpoints Grant 10,063,373 - Schutz , et al. August 28, 2 | 2018-08-28 |
Forensic Analysis Of Computing Activity App 20180227320 - Ladnai; Beata ;   et al. | 2018-08-09 |
Server drift monitoring Grant 10,038,702 - Thomas , et al. July 31, 2 | 2018-07-31 |
Using indications of compromise for reputation based network security Grant 9,992,228 - Ray , et al. June 5, 2 | 2018-06-05 |
Behavioral-based control of access to encrypted content by a process Grant 9,984,248 - Ray , et al. May 29, 2 | 2018-05-29 |
Labeling objects on an endpoint for encryption management Grant 9,965,627 - Ray , et al. May 8, 2 | 2018-05-08 |
Labeling computing objects for improved threat detection Grant 9,967,282 - Thomas , et al. May 8, 2 | 2018-05-08 |
Normalized indications of compromise Grant 9,967,283 - Ray , et al. May 8, 2 | 2018-05-08 |
Forensic analysis of computing activity Grant 9,967,267 - Ladnai , et al. May 8, 2 | 2018-05-08 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint Grant 9,967,264 - Harris , et al. May 8, 2 | 2018-05-08 |
Endpoint malware detection using an event graph Grant 9,928,366 - Ladnai , et al. March 27, 2 | 2018-03-27 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20180075249 - Ray; Kenneth D. ;   et al. | 2018-03-15 |
Mitigation Of Return-oriented Programming Attacks App 20180039776 - Loman; Erik ;   et al. | 2018-02-08 |
Use Of An Application Controller To Monitor And Control Software File And Application Environments App 20180032727 - Thomas; Andrew J. | 2018-02-01 |
Use of an application controller to monitor and control software file and application environments Grant 9,852,292 - Thomas December 26, 2 | 2017-12-26 |
Network Security App 20170359306 - Thomas; Andrew J. ;   et al. | 2017-12-14 |
Server Drift Monitoring App 20170346835 - Thomas; Andrew J. ;   et al. | 2017-11-30 |
Detecting Endpoint Compromise Based On Network Usage History App 20170310692 - Ackerman; Karl ;   et al. | 2017-10-26 |
Secure Labeling Of Network Flows App 20170310708 - Schiappa; Daniel Salvatore ;   et al. | 2017-10-26 |
Labeling Network Flows According To Source Applications App 20170310686 - Ray; Kenneth D. ;   et al. | 2017-10-26 |
Local Proxy Detection App 20170310693 - Howard; Fraser ;   et al. | 2017-10-26 |
Detecting Triggering Events For Distributed Denial Of Service Attacks App 20170310703 - Ackerman; Karl ;   et al. | 2017-10-26 |
Endpoint Malware Detection Using An Event Graph App 20170300690 - Ladnai; Beata ;   et al. | 2017-10-19 |
Forensic Analysis Of Computing Activity App 20170302685 - Ladnai; Beata ;   et al. | 2017-10-19 |
Server drift monitoring Grant 9,774,613 - Thomas , et al. September 26, 2 | 2017-09-26 |
Behavioral-based Control Of Access To Encrypted Content By A Process App 20170235967 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Process-level Control Of Encrypted Content App 20170235966 - Ray; Kenneth D. ;   et al. | 2017-08-17 |
Advanced persistent threat detection Grant 9,654,489 - Thomas May 16, 2 | 2017-05-16 |
Key Management For Compromised Enterprise Endpoints App 20170078093 - Schutz; Harald ;   et al. | 2017-03-16 |
Threat detection using endpoint variance Grant 9,571,512 - Ray , et al. February 14, 2 | 2017-02-14 |
Key management for compromised enterprise endpoints Grant 9,537,841 - Schutz , et al. January 3, 2 | 2017-01-03 |
Use Of An Application Controller To Monitor And Control Software File And Application Environments App 20160337382 - Thomas; Andrew J. | 2016-11-17 |
Advanced Persistent Threat Detection App 20160323303 - Thomas; Andrew J. | 2016-11-03 |
Advanced persistent threat detection Grant 9,392,015 - Thomas July 12, 2 | 2016-07-12 |
Use of an application controller to monitor and control software file and application environments Grant 9,390,263 - Thomas July 12, 2 | 2016-07-12 |
Key Management For Compromised Enterprise Endpoints App 20160191476 - Schutz; Harald ;   et al. | 2016-06-30 |
Firewall Techniques For Colored Objects On Endpoints App 20160191465 - Thomas; Andrew J. ;   et al. | 2016-06-30 |
Threat Detection Using Endpoint Variance App 20160173509 - Ray; Kenneth D. ;   et al. | 2016-06-16 |
Server Drift Monitoring App 20160173525 - Thomas; Andrew J. ;   et al. | 2016-06-16 |
Using Indications Of Compromise For Reputation Based Network Security App 20160080420 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Labeling Objects On An Endpoint For Encryption Management App 20160078225 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Labeling Computing Objects For Improved Threat Detection App 20160080417 - Thomas; Andrew J. ;   et al. | 2016-03-17 |
Normalized Indications Of Compromise App 20160080418 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint App 20160080399 - Harris; Mark D. ;   et al. | 2016-03-17 |
Using Reputation To Avoid False Malware Detections App 20150312267 - Thomas; Andrew J. | 2015-10-29 |
Advanced Persistent Threat Detection App 20150312266 - Thomas; Andrew J. | 2015-10-29 |
Computer security lock down methods Grant 9,015,789 - Thomas April 21, 2 | 2015-04-21 |
Dynamic scanning based on compliance metadata Grant 8,832,828 - Lyne , et al. September 9, 2 | 2014-09-09 |
Security access protection for user data stored in a cloud computing facility Grant 8,713,633 - Thomas April 29, 2 | 2014-04-29 |
Security Access Protection For User Data Stored In A Cloud Computing Facility App 20140020072 - Thomas; Andrew J. | 2014-01-16 |
Network stream scanning facility Grant 8,607,347 - Harris , et al. December 10, 2 | 2013-12-10 |
Protected access control method for shared computer resources Grant 8,392,972 - Manring , et al. March 5, 2 | 2013-03-05 |
Tissue Preservation Fluid App 20120297593 - Berry; Stephen D. ;   et al. | 2012-11-29 |
Use Of An Application Controller To Monitor And Control Software File And Application Environments App 20110246753 - Thomas; Andrew J. | 2011-10-06 |
Time-multiplexed residue amplifier Grant 8,018,370 - Thomas , et al. September 13, 2 | 2011-09-13 |
Time-multiplexed Residue Amplifier App 20110187573 - Thomas; Andrew J. ;   et al. | 2011-08-04 |
Circuits and methods to reduce or eliminate signal-dependent modulation of a reference bias Grant 7,907,074 - Zanchi , et al. March 15, 2 | 2011-03-15 |
Dynamic Scanning Based On Compliance Metadata App 20100251365 - Lyne; James I.G. ;   et al. | 2010-09-30 |
Computer Security Lock Down Methods App 20100242088 - Thomas; Andrew J. | 2010-09-23 |
Protected Access Control Method For Shared Computer Resources App 20100205657 - Manring; Bradley A.C. ;   et al. | 2010-08-12 |
Network Stream Scanning Facility App 20100083380 - Harris; Mark D. ;   et al. | 2010-04-01 |
Virtual Machine Configuration Sharing Between Host And Virtual Machines And Between Virtual Machines App 20090241192 - Thomas; Andrew J. | 2009-09-24 |
Circuits and methods to reduce or eliminate signal-dependent modulation of a reference bias App 20090121912 - Zanchi; Alfio ;   et al. | 2009-05-14 |
Foot rest Grant D487,235 - Thomas , et al. March 2, 2 | 2004-03-02 |
SEC | 0001522227 | Thomas Andrew J. |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.