loadpatents
name:-0.016085147857666
name:-0.017254114151001
name:-0.013691902160645
Watkiss; Neil Robert Tyndale Patent Filings

Watkiss; Neil Robert Tyndale

Patent Applications and Registrations

Patent applications and USPTO patent grants for Watkiss; Neil Robert Tyndale.The latest application filed is for "firewall techniques for colored objects on endpoints".

Company Profile
14.15.16
  • Watkiss; Neil Robert Tyndale - Oxford GB
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Firewall Techniques For Colored Objects On Endpoints
App 20220131836 - Thomas; Andrew J. ;   et al.
2022-04-28
Firewall techniques for colored objects on endpoints
Grant 11,140,130 - Thomas , et al. October 5, 2
2021-10-05
Context-dependent timeout for remote security services
Grant 10,951,642 - Watkiss , et al. March 16, 2
2021-03-16
Using indications of compromise for reputation based network security
Grant 10,778,725 - Ray , et al. Sept
2020-09-15
Method for conditionally hooking endpoint processes with a security agent
Grant 10,728,269 - Watkiss , et al.
2020-07-28
Labeling computing objects for improved threat detection
Grant 10,673,902 - Thomas , et al.
2020-06-02
Context-dependent Timeout For Remote Security Services
App 20200153849 - Watkiss; Neil Robert Tyndale ;   et al.
2020-05-14
Context-dependent timeout for remote security services
Grant 10,594,717 - Watkiss , et al.
2020-03-17
Labeling objects on an endpoint for encryption management
Grant 10,558,800 - Ray , et al. Feb
2020-02-11
Method For Conditionally Hooking Endpoint Processes With A Security Agent
App 20190342313 - Watkiss; Neil Robert Tyndale ;   et al.
2019-11-07
Context-dependent Timeout For Remote Security Services
App 20190342312 - Watkiss; Neil Robert Tyndale ;   et al.
2019-11-07
Threat detection using a time-based cache of reputation information on an enterprise endpoint
Grant 10,382,459 - Harris , et al. A
2019-08-13
Using Indications Of Compromise For Reputation Based Network Security
App 20190149580 - Ray; Kenneth D. ;   et al.
2019-05-16
Using indications of compromise for reputation based network security
Grant 10,225,286 - Ray , et al.
2019-03-05
Firewall Techniques For Colored Objects On Endpoints
App 20190028438 - Thomas; Andrew J. ;   et al.
2019-01-24
Using Indications Of Compromise For Reputation Based Network Security
App 20180324220 - Ray; Kenneth D. ;   et al.
2018-11-08
Firewall techniques for colored objects on endpoints
Grant 10,122,687 - Thomas , et al. November 6, 2
2018-11-06
Labeling Objects On An Endpoint For Encryption Management
App 20180276378 - Ray; Kenneth D. ;   et al.
2018-09-27
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint
App 20180278631 - Harris; Mark D. ;   et al.
2018-09-27
Labeling Computing Objects For Improved Threat Detection
App 20180278649 - Thomas; Andrew J. ;   et al.
2018-09-27
Using indications of compromise for reputation based network security
Grant 9,992,228 - Ray , et al. June 5, 2
2018-06-05
Labeling objects on an endpoint for encryption management
Grant 9,965,627 - Ray , et al. May 8, 2
2018-05-08
Threat detection using a time-based cache of reputation information on an enterprise endpoint
Grant 9,967,264 - Harris , et al. May 8, 2
2018-05-08
Labeling computing objects for improved threat detection
Grant 9,967,282 - Thomas , et al. May 8, 2
2018-05-08
Threat detection using endpoint variance
Grant 9,571,512 - Ray , et al. February 14, 2
2017-02-14
Firewall Techniques For Colored Objects On Endpoints
App 20160191465 - Thomas; Andrew J. ;   et al.
2016-06-30
Threat Detection Using Endpoint Variance
App 20160173509 - Ray; Kenneth D. ;   et al.
2016-06-16
Labeling Objects On An Endpoint For Encryption Management
App 20160078225 - Ray; Kenneth D. ;   et al.
2016-03-17
Using Indications Of Compromise For Reputation Based Network Security
App 20160080420 - Ray; Kenneth D. ;   et al.
2016-03-17
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint
App 20160080399 - Harris; Mark D. ;   et al.
2016-03-17
Labeling Computing Objects For Improved Threat Detection
App 20160080417 - Thomas; Andrew J. ;   et al.
2016-03-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed