name:-0.22204899787903
name:-0.19648599624634
name:-0.14141702651978
WatchGuard Technologies, Inc. Patent Filings

WatchGuard Technologies, Inc.

Patent Applications and Registrations

Patent applications and USPTO patent grants for WatchGuard Technologies, Inc..The latest application filed is for "method and apparatus for detecting and handling evil twin access points".

Company Profile
5.54.20
  • WatchGuard Technologies, Inc. - Seattle WA US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Trademarks
Patent Activity
PatentDate
Method and apparatus for detecting and handling evil twin access points
Grant 11,432,152 - Elliott , et al. August 30, 2
2022-08-30
Method And Apparatus For Detecting And Handling Evil Twin Access Points
App 20210345112 - Elliott; Scott ;   et al.
2021-11-04
Systems and methods for identifying and performing an action in response to identified malicious network traffic
Grant 10,432,658 - Back , et al. O
2019-10-01
Reputation-based method and system for determining a likelihood that a message is undesired
Grant 10,193,898 - Gabe Ja
2019-01-29
Location-aware configuration
Grant 9,444,682 - Linden , et al. September 13, 2
2016-09-13
Cluster architecture for network security processing
Grant 9,203,865 - Linden , et al. December 1, 2
2015-12-01
Systems and methods for the rapid deployment of network security devices
Grant 9,003,485 - Marvais , et al. April 7, 2
2015-04-07
Systems and methods for scalable network monitoring
Grant 8,977,746 - Hughes , et al. March 10, 2
2015-03-10
Systems And Methods For Scalable Network Monitoring
App 20140289847 - Hughes; Mark D. ;   et al.
2014-09-25
Systems And Methods For Scalable Network Monitoring
App 20140289390 - Hughes; Mark D. ;   et al.
2014-09-25
Systems and methods for scalable network monitoring
Grant 8,839,402 - Hughes , et al. September 16, 2
2014-09-16
Systems and methods for the rapid deployment of network security devices
Grant 8,799,992 - Marvais , et al. August 5, 2
2014-08-05
Location-aware Configuration
App 20140059188 - Linden; Thomas ;   et al.
2014-02-27
Scalable transparent proxy
Grant 8,650,632 - Boscolo , et al. February 11, 2
2014-02-11
Reputation-based Method And System For Determining A Likelihood That A Message Is Undesired
App 20130347108 - Gabe; Christopher John
2013-12-26
Method and system for recognizing desired email
Grant 8,572,190 - Alsop , et al. October 29, 2
2013-10-29
Location-aware configuration
Grant 8,560,645 - Linden , et al. October 15, 2
2013-10-15
Reputation-based method and system for determining a likelihood that a message is undesired
Grant 8,527,592 - Gabe September 3, 2
2013-09-03
Email server system and method
Grant 8,504,675 - Walker August 6, 2
2013-08-06
Cluster Architecture For Network Security Processing
App 20130191881 - Linden; Thomas ;   et al.
2013-07-25
Cluster Architecture And Configuration For Network Security Devices
App 20130173766 - Linden; Thomas ;   et al.
2013-07-04
System and method for providing security for SIP-based communications
Grant 8,464,329 - Fogel June 11, 2
2013-06-11
Cluster architecture for network security processing
Grant 8,392,496 - Linden , et al. March 5, 2
2013-03-05
Cluster architecture and configuration for network security devices
Grant 8,316,113 - Linden , et al. November 20, 2
2012-11-20
Email Server System And Method
App 20120278415 - Walker; Bruce Murray
2012-11-01
Scalable Transparent Proxy
App 20120216275 - Boscolo; Christopher ;   et al.
2012-08-23
Method and apparatus for controlling unsolicited messaging
Grant 8,223,751 - Gilchrist , et al. July 17, 2
2012-07-17
Scalable transparent proxy
Grant 8,191,132 - Boscolo , et al. May 29, 2
2012-05-29
Email server system and method
Grant 8,176,162 - Walker May 8, 2
2012-05-08
Method and apparatus for controlling unsolicited messaging in real time messaging networks
Grant 8,150,002 - Gilchrist , et al. April 3, 2
2012-04-03
Replicating message queues between clustered email gateway systems
Grant 7,970,844 - Osborne , et al. June 28, 2
2011-06-28
Tunnel designation system for virtual private networks
Grant 7,882,558 - Lin February 1, 2
2011-02-01
Method and system for detecting undesired email containing image-based messages
Grant 7,882,187 - Gammage , et al. February 1, 2
2011-02-01
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache
Grant 7,773,604 - Lin August 10, 2
2010-08-10
Location-aware Configuration
App 20100191837 - Linden; Thomas ;   et al.
2010-07-29
Cluster Architecture and Configuration for Network Security Devices
App 20100169446 - Linden; Thomas ;   et al.
2010-07-01
Self-Monitoring Cluster of Network Security Devices
App 20100162036 - Linden; Thomas ;   et al.
2010-06-24
Cluster Architecture for Network Security Processing
App 20100162383 - Linden; Thomas ;   et al.
2010-06-24
Method And System For Recognizing Desired Email
App 20100077052 - Alsop; John ;   et al.
2010-03-25
Method And Apparatus For Controlling Unsolicited Messaging In Real Time Messaging Networks
App 20100046723 - Gilchrist; Rod ;   et al.
2010-02-25
Method And Apparatus For Controlling Unsolicited Messaging
App 20100046727 - Gilchrist; Rod ;   et al.
2010-02-25
Email Server System And Method
App 20100049818 - Walker; Bruce Murray
2010-02-25
Replicating Message Queues Between Clustered Email Gateway Systems
App 20090320120 - Osborne; Robert ;   et al.
2009-12-24
Method and system for recognizing desired email
Grant 7,627,641 - Aslop , et al. December 1, 2
2009-12-01
Email server system and method
Grant 7,617,305 - Walker November 10, 2
2009-11-10
Method and apparatus for controlling unsolicited messaging
Grant 7,613,172 - Gilchrist , et al. November 3, 2
2009-11-03
Method and apparatus for controlling unsolicited messaging in real time messaging networks
Grant 7,613,923 - Gilchrist , et al. November 3, 2
2009-11-03
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache
Grant 7,420,976 - Lin September 2, 2
2008-09-02
Remote management of properties, such as properties for establishing a virtual private network
Grant 7,237,263 - Boscolo , et al. June 26, 2
2007-06-26
Tunnel designation system for virtual private networks
Grant 7,117,530 - Lin October 3, 2
2006-10-03
Automatically identifying subnetworks in a network
Grant 7,103,679 - Bonn September 5, 2
2006-09-05
System using stream specification and action specification stored in policy cache to process the flow of data packets by appropriate action processor
Grant 7,006,502 - Lin February 28, 2
2006-02-28
Contacting a computing device outside a local network
Grant 6,961,336 - Coggeshall November 1, 2
2005-11-01
Secure and differentiated delivery of network security information
Grant 6,834,350 - Boroughs , et al. December 21, 2
2004-12-21
Denial-of-service attack blocking with selective passing and flexible monitoring
Grant 6,751,668 - Lin , et al. June 15, 2
2004-06-15
Generalized network security policy templates for implementing similar network security policies across multiple networks
Grant 6,738,908 - Bonn , et al. May 18, 2
2004-05-18
Software programmable calendar queue cache
Grant 6,732,199 - Yu , et al. May 4, 2
2004-05-04
Managing multiple network security devices from a manager device
Grant 6,678,827 - Rothermel , et al. January 13, 2
2004-01-13
Policy engine architecture
Grant 6,625,150 - Yu September 23, 2
2003-09-23
Automatically identifying subnetworks in a network
Grant 6,618,755 - Bonn September 9, 2
2003-09-09
Network packet classification
Grant 6,597,661 - Bonn July 22, 2
2003-07-22
Portion of a display panel or computer screen with an icon image
Grant D473,879 - Lee April 29, 2
2003-04-29
Policy engine using stream classifier and policy binding database to associate data packet with appropriate action processor for processing without involvement of a host processor
Grant 6,542,508 - Lin April 1, 2
2003-04-01

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed