C, A, Inc.
United States C Corporation
 |
No tags have been applied so far. Sign in to add some. |
|
|
![[Unknown]](https://s.thinklink.com/images/nophotommb.gif) |
|
|
|
|
[Unknown]
successor By Merger To Computer Associates Think, Inc.
|
|
|
|
|
Go Pro to view an analysis and graphs of case roles, types and more.
|
|
7/14/2021 |
Superior Court of California, County of Santa Clara |
21CV384293 |
De Carolis v. Broadcom Corporation |
Defendant |
|
|
|
8/9/2018 |
Delaware District Court |
1:18-cv-01221 |
Gusinsky v. CA, Inc. |
Defendant |
|
|
|
8/3/2018 |
New York Southern District Court |
1:18-cv-06996 |
Harvey v. CA, Inc. |
Defendant |
|
|
|
10/25/2017 |
USPTO Trademark Trial and Appeal Board |
91237448-OPP |
Ca, Inc. v. Next Level Solutions, LLC |
Plaintiff |
|
|
|
8/7/2017 |
Superior Court of California, County of Santa Clara |
17CV314099 |
Araceli Zarate v. CA, Inc |
Defendant |
|
|
|
7/26/2017 |
USPTO Trademark Trial and Appeal Board |
87304847-EXT |
Ca, Inc. v. Next Level Solutions, Llc |
Potential Opposer |
|
|
|
2/27/2017 |
USPTO Trademark Trial and Appeal Board |
91233108-OPP |
Ca, Inc. v. Ca Plus Limited |
Plaintiff |
|
|
|
10/3/2016 |
USPTO Trademark Trial and Appeal Board |
86870982-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
9/28/2016 |
USPTO Trademark Trial and Appeal Board |
86870987-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
6/5/2015 |
Delaware Court of Chancery |
11109-VCL |
Hyer, John vs Rally Software Development Corp |
Defendant |
|
|
|
9/10/2014 |
Delaware District Court |
1:14-cv-01175 |
Clouding Corp. v. CA Inc. d/b/a/ CA Technologies |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Counter-claimant |
|
|
|
3/27/2014 |
Superior Court of California, County of San Francisco |
CGC 14 538305 |
Appdynamics Inc. et al v. Ca, Inc. |
Defendant |
|
|
|
11/22/2013 |
California Northern District Court |
5:13-cv-05430-EJD |
Bay Area Surgical Group Inc. et al v. Aetna Life Insurance C... |
Defendant |
|
|
|
6/27/2013 |
Arizona District Court |
2:13-cv-01287 |
Clancy v. CA Incorporated |
Defendant |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Plaintiff |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Counter-Defendant |
|
|
|
11/5/2012 |
New York Eastern District Court |
2:12-cv-05468 |
CA, Inc. v. New Relic, Inc. |
Plaintiff |
|
|
|
6/20/2012 |
Texas Eastern District Court |
2:12-cv-00360 |
InNova Patent Licensing, LLC v. CA, Inc. |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Claimant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Defendant |
|
|
|
4/18/2012 |
California Northern District Court |
5:12-cv-01940-LHK |
Softvault Systems, Inc. v. CA, Inc. |
Defendant |
|
|
|
4/9/2012 |
California Northern District Court |
4:12-cv-01746 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
12/23/2011 |
California Northern District Court |
3:11-cv-06638-RS |
Vasudevan Software, Inc. v. TIBCO Software, Inc. et al |
Interested Party |
|
|
|
11/3/2011 |
Superior Court of California, County of Los Angeles |
BC472854 |
Ca Inc v. Taycor Llc |
Plaintiff/Petitioner |
|
|
|
9/12/2011 |
Missouri Eastern District Court |
4:11-cv-01579 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
6/16/2011 |
Oregon District Court |
3:11-cv-00724 |
Fog Cap Acceptance, Inc. et al v. Verizon Business Network S... |
Defendant |
|
|
|
1/18/2011 |
Superior Court of California, County of Los Angeles |
BC453147 |
Charles Matheny v. Ca Inc et al |
Defendant/Respondent |
|
|
|
12/16/2010 |
Delaware Court of Chancery |
6078-VCL |
Wang, Charles B vs CA Inc |
Defendant |
|
|
|
9/14/2010 |
Texas Eastern District Court |
6:10-cv-00472 |
Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al |
Defendant |
|
|
|
5/5/2010 |
Superior Court of California, County of San Francisco |
CGC 10 499524 |
Lisa Marie Perri v. Ca, Inc. et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Counter Claimant |
|
|
|
11/3/2009 |
Superior Court of California, County of Los Angeles |
BC425309 |
Ca Inc v. The Bedford Group |
Plaintiff/Petitioner |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC 09 493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Cross-Complainant |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC 09 493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Defendant |
|
|
|
9/23/2009 |
Delaware Court of Chancery |
4912-CS |
9/7/2011 CONF ORD ON DISC Sage Software Inc vs C A Inc |
Defendant |
|
|
|
8/24/2009 |
District Of Columbia District Court |
1:09-cv-01600 |
SHEMESH v. CA, INC. |
Defendant |
|
|
|
8/13/2009 |
New York Eastern District Court |
1:09-cv-03517 |
Ingres Corporation v. Xing, SA et al |
Third Party Defendant |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509379 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509380 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509381 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
3/31/2009 |
Delaware Court of Chancery |
4467-VCS |
1/31/2011 Electronic Data Systems LLC vs CA Inc et al |
Defendant |
|
|
|
1/20/2009 |
Delaware Court of Chancery |
4300-VCS |
12/17/2010 CONF ORDER C A Inc vs Ingres Corp |
Plaintiff |
|
|
|
12/30/2008 |
Texas Eastern District Court |
2:08-cv-00484 |
Information Protection and Authentication of Texas, LLC v. S... |
Counter-Claimant |
|
|
|
11/25/2008 |
Delaware Court of Chancery |
4195-CC |
02/18/10 CONF ORDER Cordrey, Richard S et al vs CA Inc |
Plaintiff |
|
|
|
10/22/2008 |
Delaware Court of Chancery |
4111-CC |
02/18/10 CONF ORDER C A Inc vs Richard S Cordrey et al |
Plaintiff |
|
|
|
8/6/2008 |
New York Eastern District Court |
2:08-cv-03191 |
CA, Inc. v. Xing et al |
Plaintiff |
|
|
Inside Counsel (3)
Go Pro to view corporate inside counsel.
Outside Counsel (147)
|
|
Vancott |
: |
Fabian |
Ca Technologies |
Salt Lake City, UT |
|
|
|
Love |
Adanna |
M. |
Holland & Knight, LLP |
San Francisco, CA |
|
|
|
Ip |
Adsero |
|
|
Littleton, CO |
|
|
|
H. |
Alan |
W. |
Crowell & Moring LLP |
Washington, DC |
|
|
|
Albright |
Alan |
D. |
Bracewell LLP |
Austin, TX |
|
|
|
Wright |
Alexandra |
Grace |
Cozen O'Connor, PC |
Chicago, IL |
|
|
|
Atkins |
Alexis |
|
|
Dallas, TX |
|
|
|
Robinson |
Anne |
Wylde |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Wermuth |
Anneliese |
|
Cozen O'Connor, PC |
Chicago, IL |
|
|
|
Dal |
Anthony |
J. |
Samuels Yoelin Kantor Seymour & Spinrad, LLP |
Portland, OR |
|
|
|
Docketing |
Attention |
IP |
Womble Carlyle Sandridge & Rice, LLP |
ATLANTA, GA |
|
|
|
DRINKWATER |
B.K. |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Vancott |
Bagley |
:. |
Ca Technologies |
Salt Lake City, UT |
|
|
|
Shelton |
Barry |
K. |
Bracewell LLP |
Austin, TX |
|
|
|
Shelton |
Barry |
Kenneth |
Pillsbury Winthrop Shaw Pittman LLP |
Austin, TX |
|
|
|
Stern |
Benjamin |
M. |
Debevoise & Plimpton LLP |
|
|
|
|
Enerson |
Benjamin |
D. |
Holland & Knight, LLP |
|
|
|
|
Stern |
Benjamin |
M. |
Holland & Knight, LLP |
Boston, MA |
|
|
|
Sorrels |
Bradley |
D. |
Wilson Sonsini Goodrich & Rosati, PC |
Wilmington, DE |
|
|
|
Williams |
Bradley |
Paul |
Baker Botts, LLP |
Dallas, TX |
|
|
|
Williams. |
Bradley |
P. |
|
DALLAS, TX |
|
|
|
Erickson |
Brian |
K. |
DLA Piper (US) LLP |
AUSTIN, TX |
|
|
|
Tompkins |
Brian |
H. |
Bracewell LLP |
Austin, TX |
|
|
|
Beck |
Brian |
Joel |
Holland & Knight, LLP |
Chicago, IL |
|
|
|
|
BROADCOM |
|
FisherBroyles, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FISHER BROYLES, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FOLEY & LARDNER LLP |
Washington, DC |
|
|
|
Ericson |
Bruce |
A. |
Pillsbury Winthrop Shaw Pittman LLP |
San Francisco, CA |
|
|
|
MAGEN. |
BURT |
|
|
San Francisco, CA |
|
|
|
|
CA |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
TECHNOLOGIES |
CA |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Riggs |
Candi |
L. |
|
Raleigh, NC |
|
|
|
Haynes |
Christine |
Dealy |
Richards, Layton & Finger, PA |
Wilmington, DE |
|
|
|
Mckenna |
Christopher |
J. |
Foley & Lardner, LLP |
Boston, MA |
|
|
|
Mckenna |
Christopher |
J. |
FOLEY & LARDNER LLP |
BOSTON, MA |
|
|
|
Civins |
Conor |
Monroe |
Bracewell LLP |
Austin, TX |
|
|
|
Civins |
Conor |
Monroe |
Pillsbury Winthrop Shaw Pittman LLP |
Austin, TX |
|
|
|
Chase |
Crystal |
S. |
Stoel Rives, LLP |
Portland, OR |
|
|
|
Scheffel |
David |
A. |
Allen Matkins Leck Gamble Mallory & Natsis L... |
Uniondale, NY |
|
|
|
Robins |
David |
A. |
Lipman & Plesur, LLP |
Jericho, NY |
|
|
|
Healey |
David |
J. |
Goldstein, Faucett & Preberg, LLP |
|
|
|
|
Ball |
David |
John |
Bracewell LLP |
New York, NY |
|
|
|
Hazelton |
David |
Rex |
Latham & Watkins LLP |
|
|
|
|
Teklits |
David |
John |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
D'zurilla |
David |
|
Schwegman, Lundberg & Woessner, PA |
Minneapolis, MN |
|
|
|
Cromer |
David |
E. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Purks |
David |
K. |
|
RESEARCH TRIANGLE PARK, NC |
|
|
|
Purks |
David |
K. |
SAGE PATENT GROUP |
RALEIGH, NC |
|
|
|
Rambin |
Daymon |
Jeffrey |
Capshaw DeRieux, LLP |
Gladewater, TX |
|
|
|
Baxtresser |
Dean |
W. |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Gonzales |
Della |
L. |
|
ROCKWALL, TX |
|
|
|
Gonzales |
Della |
L. |
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Gonzalez |
Della |
|
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Kelly |
Don |
V. |
Gallop, Johnson & Neuman, L.C. |
St Louis, MO |
|
|
|
DeRieux |
Elizabeth |
L. |
Capshaw DeRieux, LLP |
Longview, TX |
|
|
|
RUCKI |
ELIZABETH |
|
Baker Botts, LLP |
Dallas, TX |
|
|
|
Rucki |
Elizabeth |
K. |
cyberassure.net Law Firm Placeholder |
DALLAS, TX |
|
|
|
Rucki |
Elizabeth |
K. |
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Rucki |
Elizabeth |
K. |
decent.ch Law Firm Placeholder |
Dallas, TX |
|
|
|
ENDRES |
GAYLE |
|
Myers Bigel Sibley & Sajovec, PA |
|
|
|
|
Caplan |
George |
T. |
Epstein Becker & Green, PC |
Los Angeles, CA |
|
|
|
Schultz |
George |
R. |
|
Dallas, TX |
|
|
|
Gimlan |
Gideon |
|
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Pllc |
Gilliam |
IP |
Ca Technologies |
Austin, TX |
|
|
|
Saffer |
Ian |
L. |
|
Littleton, CO |
|
|
|
Joseph |
Ii |
John |
|
Chicago, IL |
|
|
|
CA |
INC. |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
CA |
INC. |
|
Coats & Bennett, PLLC |
Cary, NC |
|
|
|
Dept |
Intellectual |
Property |
Shook Hardy & Bacon LLP |
Kansas City, MO |
|
|
|
DEPT |
IP |
|
Shook Hardy & Bacon LLP |
Kansas City, MO |
|
|
|
Komenda |
J. |
Kyle |
|
Dallas, TX |
|
|
|
Komneda |
J. |
Kyle |
|
ROCKWALL, TX |
|
|
|
Blumenfeld |
Jack |
B. |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Hallenbeck |
James |
D. |
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
Brickell |
Jamie |
Mark |
Pryor Cashman LLP |
New York, NY |
|
|
|
DADDONA |
JANET |
|
|
Dallas, TX |
|
|
|
Daddona |
Janet |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Vogel |
Jason |
M. |
|
Ny 10036, |
|
|
|
Davis |
Jennifer |
|
FOLEY & LARDNER LLP |
BOSTON, MA |
|
|
|
McEntee |
John |
Peter |
Allen Matkins Leck Gamble Mallory & Natsis L... |
Phoenix, AZ |
|
|
|
Allcock |
John |
|
|
Ca, |
|
|
|
Guaragna |
John |
M. |
DLA Piper (US) LLP |
Austin, TX |
|
|
|
Herbert |
John |
Mitchell |
Holland & Knight, LLP |
BOSTON, MA |
|
|
|
Frankel |
Jonathan |
J. |
Wilmer, Cutler & Pickering Hale & Dorr LLP (... |
|
|
|
|
Lee |
Jonathan |
|
|
Houston, TX |
|
|
|
Krumholz |
Joshua |
C. |
Holland & Knight, LLP |
Boston, MA |
|
|
|
In |
Juniper |
Networks |
FisherBroyles, LLP |
SALT LAKE CITY, UT |
|
|
|
Carney |
Kathryn |
Mary |
Davis Polk & Wardwell, LLP |
|
|
|
|
OLIVER |
KATHY |
|
|
MCLEAN, VA |
|
|
|
Coen |
Kevin |
Michael |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Asset |
King |
Intellectual |
|
GREENWOOD VILLAGE, CO |
|
|
|
Deniro |
Kirk |
J. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
|
KSC |
|
Myers Bigel Sibley & Sajovec, PA |
Raleigh, NC |
|
|
|
Jefcoat |
Kyle |
Robert |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Vierra |
Larry |
E. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Pedersen. |
Luke |
K. |
|
DALLAS, TX |
|
|
|
Pedersen |
Luke |
K. |
Baker Botts, LLP |
Dallas, TX |
|
|
|
Borchers |
Lynne |
A. |
Lerner David Littenberg Krumholz & Mentilk, ... |
|
|
|
|
Grant |
M. |
Duncan |
Pepper Hamilton, LLP |
Pa, |
|
|
|
Alicks |
Margot |
F |
Alicks, Margot F |
|
|
|
|
|
8/15/2024 |
Symantec Corporation |
Assignor |
Application Publication |
18806063 20240406026 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/14/2024 |
Mortha, Srinivas |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
2/14/2024 |
Chevendra, Naga Naveen |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
10/2/2023 |
Back, Ophir |
Assignor |
Application Publication |
18479358 20250111130 |
System And Method For Canvas Sanitization System And Method For Canvas Sanitization |
|
|
|
9/12/2023 |
Biswas, Dhrubojyoti |
Assignor |
Application Publication |
18465285 20250086292 |
Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... |
|
|
|
8/28/2023 |
Cosgrove, David |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Murdough, John |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Normandin, Jason |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Diep, Tim |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/23/2023 |
Zuercher, Chris |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Tomic, Gary |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Du Toit, Roelof Nico |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Elkadri, Nour Alhouda |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
7/19/2022 |
Symantec Corporation |
Assignor |
Application Publication |
17863998 20220345462 |
|
|
|
|
2/23/2022 |
Ciubotariu, Mircea |
Assignor |
Application Patent |
13902345 9411953 |
Tracking Injected Threads to Remediate Malware Tracking Injected Threads to Remediate Malware |
|
|
|
11/2/2021 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent |
29171598 29297799 29159439 29275692 29162946 29165309 29161308 29269499 29172439 29266981 D475329 D485487 D475326 D569716 D483524 D562898 D475328 D586413 D483549 D562904 |
Integrated Tabbed Note And Clip Birding Acoustic Feedback Learning Aid Undergarment Hair Clip Golf Putter Hitch Cover Connecting Device For A Combustion Facilitator Of Internal/external Comb... Trailer Trestle Birding Acoustic Feedback Learning Aid Clip For Retaining Soccer Nets And Other Fastener Applications Hair Clip Front Grill Of An Automobile Connecting Device For A Combustion Facilitator Of Internal/external Comb... Trailer Trestle Integrated Tabbed Note And Clip Clip For Retaining Soccer Nets And Other Fastener Applications Undergarment Front Grill Of An Automobile Golf Putter Hitch Cover |
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication |
17322045 20210281443 |
|
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
17322045 20210281443 12088430 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14838278 20160012220 9639694 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
15470717 20170250994 10148667 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14675327 20150281258 9374386 |
Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks |
|
|
|
6/19/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Application Application Publication Publication Patent Patent Patent |
10990894 12203018 11132649 20100058352 20050283539 7457722 8365183 8548976 |
Balancing Load Requests And Failovers Using A Uddi Proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... |
|
|
|
5/19/2020 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 82 more |
11833503 10881448 14995594 10284827 08977642 29483524 10288548 15137492 12982772 10682644 09090774 29562898 11391610 29475328 13952487 09846117 09615891 29586413 12290215 11019594 15077428 12356079 11106194 09047316 29483549 11146855 09790434 ...and 82 more |
Display Screen With Graphical User Interface System for supporting secured log-in of multiple users into a plurality ... Flow scheduling for network application apparatus Method, System, And Computer Program Product For Security Within A Globa... Identifying The Origin Of Hard-copy Documents Systems And Methods For Detecting Potentially Malicious Content Within N... Display Screen with Graphical User Interface Display Screen With Graphical User Interface Dynamic Signature Inspection-based Network Intrusion Detection Method And Apparatus For Encrypted Communications To A Secure Server Multi-tiered Incremental Software Updating Automatic switching network points based on configuration profiles Securing A Network With Data Flow Processing Systems and Methods for Processing Data Flows Display Screen Or Portion Thereof With Transitional Graphical User Inter... Multi-tiered Incremental Software Updating System And Method For Add-on Services, Secondary Authentication, Authori... Controllable Deployment Of Software Updates Method And Apparatus For Network Packet Capture Distributed Storage Syst... System And Method For Recognizing Offensive Images Display Screen With Graphical User Interface System For Managing Flow Bandwidth Utilization At Network, Transport And... Virtual Partition System And Method For Recompressing A Digital Image Using Requantization System And Method For Preventing Detection Of A Selected Process Running... Applications Processing In A Network Apparatus System For Supporting Secured Log-in Of Multiple Users Into A Plurality ... ...and 82 more |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Patent |
16551440 11089050 |
Isolating An Iframe Of A Webpage |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Application Patent Patent |
16560273 16551440 11204992 11089050 |
Isolating An Iframe Of A Webpage Isolating An Iframe Of A Webpage Systems And Methods For Safely Executing Unreliable Malware |
|
|
|
4/8/2020 |
Symantec Corporation |
Assignor |
Application Patent |
16560273 11204992 |
Systems And Methods For Safely Executing Unreliable Malware |
|
|
|
3/10/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Publication Patent |
11694483 20070233698 8572138 |
Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... |
|
|
|
3/4/2020 |
Segu, Murali Krishna |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanasi, Chandra Sekhar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Tiruvaipeta, Vinay Kumar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanjani, Jeetendra Gopal |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
2/25/2020 |
Kaladgi, Mohammed Mujeeb |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sawant, Yashwant Ramkishan |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Kaladgi, Ruqiya Nikhat |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sandeep, Banisetti |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
1/28/2020 |
Ball-marian, Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/28/2020 |
Lansky, Richard Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/24/2020 |
Bay Dynamics, Inc. |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent ...and 1 more |
13269565 13269562 13269568 15836794 13269566 13269560 13269563 15089260 15836796 13269570 13269561 15836791 13269569 8909680 9390082 10387452 10691796 8799207 10353922 10587644 9171055 9183269 9081830 9330091 10607014 8965836 ...and 1 more |
Management of Multidimensional Data Storage Cubes using Content Packs Determining Monetary Loss Due To Security Risks In A Computer System Content Packs for Multidimensional Data Storage Cubes Monitoring And Managing Credential And Application Threat Mitigations In... System For Managing Data Storages Updating a View of a Multidimensional Cube Rendering Multidimensional Cube Data Federated Multidimensional Data Storage Cubes Unified Data Source Management Prioritizing Security Risks For A Computer System Based On Historical Ev... Content Packs for Multidimensional Data Storage Cubes Monitoring And Managing Credential And Application Threat Mitigations In... System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube Rendering Multidimensional Cube Data Intelligent Caching Of Multidimensional Cube Data Unified Data Source Management Prioritizing Security Risks For A Computer System Based On Historical Ev... Management of Multidimensional Data Storage Cubes using Content Packs Determining Monetary Loss Due To Security Risks In A Computer System System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube System For Managing Data Storages Updating a View of a Multidimensional Cube Intelligent Caching Of Multidimensional Cube Data Federated Multidimensional Data Storage Cubes ...and 1 more |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication |
16149807 20200106779 |
Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication Patent |
16149807 20200106779 10965676 |
Peer Authentication By Source Devices Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
12/11/2019 |
Morrison, Kenneth William Scott |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
12/11/2019 |
Thorne, Jay William |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
11/25/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Publication Publication Publication Publication Publication |
10500959 10500952 10500953 10500960 10500958 20050071649 20050022016 20050091512 20050071748 20050055569 |
Method Of, And System For, Replacing External Links In Electronic Docume... Method Of, And System For, Scanning Electronic Documents Which Contain L... Method Of, And System For Detecting Mass Mailing Viruses Method Of, And System For, Replacing External Links In Electronic Docume... Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For Detecting Mass Mailing Viruses System For And Method Of Detecting Malware In Macros And Executable Scri... Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For, Scanning Electronic Documents Which Contain L... System For And Method Of Detecting Malware In Macros And Executable Scri... |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3922 more |
12059670 13633867 09220125 12019331 15862589 11478276 14551925 10744268 12381937 14184353 10458819 13796109 13588360 13249045 11672497 12844496 14732809 11030139 12548159 14525030 12362352 14150639 13777893 09750835 11961895 12967833 11271656 ...and 3922 more |
Systems And Methods For Providing Secure Access To Local Network Devices Data Loss Prevention In The Event Of Malware Detection Return-to-libc Attack Detection Using Branch Trace Records System And Me... Systems And Methods For Detecting Suspicious Internet Addresses Presentation Of An Extracted Artifact Based On An Indexing Technique Portable firewall adapter Systems And Methods For Protecting Purpose-built Appliances On Local Net... Systems And Methods For Translating Non-comparable Values Into Comparabl... Securely Hooking Installations For Compatibility With Other Applications Systems And Methods For Determining That Files Found On Client Devices C... Method And System For Identification Of Data Owner In An Unstructured Da... Automatically Deriving Order Of Initialization For Computing Services Ac... Systems And Methods For Establishing A Reputation For Related Program Fi... Systems And Methods For Contextual Evaluation Of Files For Use In File R... Client Compliancy With Self-policing Clients Runtime Malware Detection Method, System, And Computer Readable Medium For Remote Device Managemen... By-pass port facilitating network device failure detection in wide area ... Managing Data Encrypting Applications Techniques For Creating An Encrypted Virtual Hard Disk Application-aware Rate Control Remotely Validating A Webpage Video Stream Systems And Methods For Detecting Malware Variants Selective Revocation Of Heuristic Exemption For Content With Digital Sig... System And Method Of Sort-order Preserving Tokenization Use Of Geo-location Data For Spam Detection Method And System For Controlling Data Flow In An Internet Over Satellit... ...and 3922 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3924 more |
13360084 15621452 12956911 15167670 11243824 12797301 14674604 12511885 12338877 10354947 12197325 10080574 12113914 13740051 13477580 13345081 11769122 13206360 15471836 11537252 11233872 12769262 14644732 10949465 12495556 10814843 14221259 ...and 3924 more |
Establishing Tunnels Between Selective Endpoint Devices Along Communicat... Method And Apparatus For Monitoring A Computer System For Malicious Soft... System and method for filtering data received by a computer system Techniques For Detecting An Intranet Spoofing Attack Adaptive Data Loss Prevention Policies Enhanced Flow Data Records Including Traffic Type Data Systems And Methods For Protecting Organizations Against Spear Phishing ... Systems And Methods For Automatically Generating Computer-assistance Vid... Packet Load Shedding Malware Management Method And Apparatus For Automatically Excluding False Positives From De... Differential Threat Detection Processing Technique For Data Loss Prevention Through Clipboard Operations Data Replication Across Enterprise Boundaries System And Method For Monitoring Memory Usage Systems And Methods For Identifying Compromised Devices Within Industria... Altering Application Behavior Based On Content Provider Reputation Client Compliancy In A Nat Environment System And Method For Assessing Characteristics Of Web Sites Systems And Methods For Displaying A Dynamic List Of Virtual Objects Whe... Utilizing Early Exclusive Volume Access And Direct Volume Manipulation T... Systems And Methods For Securing Computing Devices That Are Not In Users... Method And System For Adding Plug-in Functionality To Virtualized Applic... Systems And Methods For Detecting And Addressing Data Flaws In Software ... Systems And Methods For Dynamically Varying Web Application Firewall Sec... Managing Network Content System And Method Of Traffic Inspection And Stateful Connection Forwardi... ...and 3924 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4016 more |
12182287 10033465 12079767 13733131 12044836 13467620 13341041 15439897 13038232 15265346 11376770 12916267 15072589 12768157 14866634 12579093 12495111 14450181 14214581 12329671 10320015 12165003 13872623 12060244 09402815 12032571 13453214 ...and 4016 more |
Cost-aware, Bandwidth Management Systems Adaptive To Network Conditions Systems And Methods For Handling Fraudulent Uses Of Brands Method And Apparatus For Detecting Malware On A Computer System System And Method For Computer Security Using Multiple Cages Dynamic Workspace Modification Data Loss Detection Method For Handling Fuzziness In Sensitive Keywords System And Methods For Cross-tier Transaction Tracing Automated Construction Of Network Whitelists Using Host-based Security C... Systems And Methods For Analyzing Malware Automatically Estimating Correlation Between Hardware Or Software Change... Using Tunable Metrics for Iterative Discovery of Groups of Alert Types I... Systems And Methods For Identifying Potential Malware Cross Ui Platform Alerting Of Security Status Anomaly Based Geofencing Leveraging Location Duration Techniques For Providing Missed Arrival Notifications Method and apparatus for providing connectivity control Creating An Execution Safety Container For Unreliable Exploits Systems And Methods For Processing Data Flows Mapping Regulations And Frameworks To Policies Using Control Statements Systems And Methods For Network Traffic Routing To Reduce Service Conges... Policy Enforcing Browser Systems And Methods For Processing Data Flows Systems And Methods For Data Loss Prevention Virtual Bandwidth Management Deployment Architectures System And Method For Tracking The Source Of A Computer Attack In-line Filtering Of Insecure Or Unwanted Mobile Device Software Compone... Centralized Scanner Database With Optimal Definition Distribution Using ... ...and 4016 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4018 more |
09827742 13619978 09189559 11984093 11862859 13082206 15381462 15223782 11324190 14973337 14745504 10870785 12433443 12369331 12242625 12130812 13418332 13242216 15474067 15372012 11419953 12969334 15188415 11286021 14958273 12691228 12540567 ...and 4018 more |
User Interface And Workflow For Performing Machine Learning Systems And Methods For Protecting Enterprise Rights Management Keys Method And System For Use Of Storage Caching With A Distributed File Sys... Systems And Methods For Detecting Suspicious Applications Based On How E... Method And Apparatus For Network Packet Capture Distributed Storage Syst... Method And Apparatus For Creating An Information Security Policy Based O... Apparatus and Method for Decryption of Secure Communication Sessions Utilizing Communications Obfuscation Proxy To Protect System Services Self-quarantining Network Partial Risk Score Calculation For A Data Object Software Object Corruption Detection Flow Scheduling For Network Application Apparatus System And Method For Distributing Heuristics To Network Intermediary De... Malware Detection Using File Heritage Data Process tracking application layered system Systems And Methods For Applying Security Updates To Endpoint Devices System And Method For Distributing Heuristics To Network Intermediary De... A System Analyzing Configuration Fingerprints Of Network Nodes For Grant... Tracking Of Software Executables That Come From Untrusted Locations Method And Apparatus For Multi-tenant Policy Management In A Network Dev... Data and Control Plane Architecture for Network Application Traffic Mana... Automatically Detecting Insider Threats Using User Collaboration Pattern... Method And System For Protecting Content Of Sensitive Web Applications System And Method For Controlling Distribution Of Network Communications Trailer Trestle Systems And Methods For Determining Authorship Of An Unclassified Notifi... Method And System For Enhancing Ms Exchange (mapi) End User Experiences ... ...and 4018 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4020 more |
12141022 13827467 09810874 13605448 09165532 13421757 15381140 15199700 11303804 14972001 12432923 14293660 12367388 14163071 12241852 13928348 12130786 13551576 11963694 13416647 11854350 13242163 15472827 13049480 15369913 15186053 11285272 ...and 4020 more |
Monitoring And Controlling Services Systems And Methods For Authenticating Devices Token Provisioning Method And Apparatus For Creating An Information Security Policy Based O... Data Loss Prevention Of Information Using Structured Document Templates ... Referrer Cache Chain Universal Network Driver Interface Installer Systems And Methods For Determining The Trustworthiness Of Files Within ... Systems And Methods For Managing Access To A Peripheral Device Network Application Apparatus System And Method For Distributing Heuristics To Network Intermediary De... Rolling Incremental Updates Layer Typed Prioritizing Application Layered Systems Systems And Methods For Applying Security Updates To Endpoint Devices Bypass Mechanism for Virtual Computing Infrastructures Dropping Packets To Prevent Unauthorized Data Transfer Through Multimedi... System And Method For Prioritizing Endpoints And Detecting Potential Rou... Systems And Methods For Blocking An Outgoing Request Associated With An ... Load Balancing Using A Distributed Hash Automatically Detecting A Malicious File Using Name Mangling Strings Automated Human Assisted Authentication System And Method For Controlling Distribution Of Network Communications Systems And Methods For Detecting Anomalous Behavior Within Computing Se... Techniques For Directory Server Integration Method And System For Authentication Among Peer Appliances Within A Comp... Software-implemented Method For Identifying Nodes On A Network Systems And Methods For Evaluating Application Trustworthiness ...and 4020 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4024 more |
12130206 13532660 11960251 11829740 15469610 13048668 11394846 12966307 14947915 11112192 14675545 14485287 10841776 12414170 14262349 12340559 14097163 10364252 12210242 13907378 10093359 13742153 09623275 11950505 13358413 15799032 15466383 ...and 4024 more |
Network decoys Systems And Methods For Increasing Compliance With Data Loss Prevention ... Method And Apparatus For Monitoring Code Injection Into A Process Execut... Secure Storage Access Using Third Party Capability Tokens Systems And Methods For Secure Communications Between Devices Method And Apparatus For Verifying Print Jobs To Prevent Confidential Da... Portable Memory Storage Devices With Application Layers Quantitative Security Improvement System Based on Crowdsourcing Systems And Methods For Managing Notificaton Messages Generated By One O... Malicious E-mail Attack Inversion Filter Systems And Methods For Detecting Malware Infections Via Domain Name Ser... Techniques For Interaction With A Guest Virtual Machine System And Method For Modifying User Memory From An Arbitrary Kernel Sta... System And Method For Annotating Client-server Transactions System And Method For Hypertext Transfer Protocol Layered Reconstruction Token sharing system and method Systems And Methods For Authenticating Whole Disk Encryption Systems Techniques For Securing A Checked-out Virtual Machine In A Virtual Deskt... Method And Apparatus For Enabling E-mail Routing And Filtering Based On ... Systems And Methods For Recovering Encrypted Information Data Loss Prevention (dlp) Through Removeable Media Method And System For Controlling Network Traffic Within The Same Connec... Systems And Methods For Utilizing An Information Trail To Enforce Data L... Systems And Methods For Processing Data Flows Providing Image-based Guidance For Remote Assistance Multiple Cache Communication Dynamic Insertion And Removal Of Virtual Software Sub-layers ...and 4024 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4026 more |
12340125 14092757 13903994 15716909 09615676 15437601 15263981 13355529 11771796 13216739 11540816 13045971 15138129 12781177 11092281 12603465 14469571 12409464 10633907 29159439 12180661 13722682 09483536 13188344 11219314 14620225 10938473 ...and 4026 more |
Zone Breakout Detection Techniques For Clipboard Monitoring Leveraging Indexed Document Matching To Automatically Train Svm Classifi... Adaptive, Application-aware Selection Of Differntiated Network Services Systems And Methods For Classifying Permissions On Mobile Devices Systems and Methods for Sharing the Results of Analyses Among Virtual Ma... Data Access Security Systems And Methods For Reverse-engineering Malware Protocols Computer Virus Detection Systems And Methods Detecting Reboot Events To Enable Nac Reassessment Systems And Methods For Filtering Shortcuts From User Profiles Running A Virtual Machine Directly From A Physical Machine Using Snapsho... Automated Separation Of Corporate And Private Data For Backup And Archiv... Method And Apparatus For Generating Configuration Rules For Computing En... Systems And Methods For Deploying A Pre-boot Environment To Enable An Ad... Responding To Detected Application Vulnerability Exploits Systems And Methods For Detecting Obscure Cyclic Application-layer Messa... Systems And Methods For Implementing Multi-factor Authentication Method For Determining The Health Impact Of An Application Based On Info... Systems And Methods For Enforcing Data Loss Prevention (dlp) Policies Du... Virtual Port Multiplexing Apparatus and Method for Characterizing the Risk of a User Contracting M... Intelligent Hashes for Centralized Malware Detection Systems And Methods For Encrypting Files System And Method For Dynamically Controlling Aggregate And Individual P... Access Control System For A Mobile Device Method And Apparatus For Preventing Data Leakage Of E-discovery Data Ite... ...and 4026 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4028 more |
13430607 11863101 13285922 11691317 15385952 13006853 11324496 12862092 14988393 12706368 14750342 11043649 12554247 14541007 10881194 14178727 12259212 13938615 12135713 09149527 11967570 13420569 15587762 15376968 11427938 15192859 14966797 ...and 4028 more |
Systems And Methods For The Creation Of Software Packages Using Layered ... Systems And Methods For Optimizing Scans Of Pre-installed Applications Software Update Checking Method Proactive Prevention Of Polymorphic Smtp Worms Systems And Methods For Identifying Variants Of Samples Based On Similar... Systems and Methods for Locating Malware Selective File And Folder Snapshot Image Creation Systems And Methods For Protecting Automated Execution Environments Agai... Enabling Efficient Review Of Media Objects Associated With A Client Devi... Automatic Local Deployment Of Site Associated Cues For Antiphishing Purp... Systems And Methods For Detecting Unknown Vulnerabilities In Computing P... Detecting Network Devices And Mapping Topology Using Network Introspecti... Effective Aggregation And Presentation Of Database Intrusion Incidents Systems And Methods For Facilitating Single Sign-on For Multiple Devices Techniques For Virtual Environment-based Web Client Management Weighted Prioritizing Layered Computing System Systems And Methods For Data Visualization Facilitating Secure 24x7 On-demand Service Availability While Minimizing... Traffic Synchronization Across Multiple Devices In Wide Area Network Top... Indirect Access Control Establishing Tunnels Between Selective Endpoint Devices Along Communicat... Spam Honeypot Domain Identification Systems And Methods For Identifying Malicious Computer Files Systems and Methods for Monitoring the Activity of Devices Within an Org... Method And Apparatus To Enable Confidential Browser Referrals Securely Sharing A Transport Layer Security Session With One Or More Tru... Systems And Methods To Protect Against A Vulnerability Event ...and 4028 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4032 more |
12180661 13722682 09483536 15834951 15468153 13188344 11219314 14620225 10938473 10802672 12406324 14030745 13869921 13663269 12032162 15452883 11731071 13151141 11499283 13020436 15254748 12890425 11199759 14587048 14331151 10781207 10500953 ...and 4032 more |
Systems And Methods For Preventing The Installation Of Unapproved Applic... Systems And Methods For Improving The Effectiveness Of Decision Trees Update Protection System And Method Systems And Methods For Performing Application Container Introspection Systems And Methods For Diverting Children From Restricted Computing Act... Method And Apparatus For Generating Readable, Unique Identifiers Systems And Methods For Restarting Computing Devices Into Security-appli... Behavioral Signature Generation Using Clustering Fast System Call Hooking On X86-64 Bit Windows Xp Platforms Discovery of Groupings of Security Alert Types and Corresponding Complex... Ip-based Blocking Of Malware Monitoring And Managing Changes To Non-structured Storage Of System Conf... Previewing File Information Over a Network Systems And Methods For Monitoring Information Shared Via Communication ... Software Testing Framework For Multiple Operating System, Hardware, And ... Method And System For Automatic Authentication Techniques For Parsing Electronic Files Systems And Methods For Enforcing Data Loss Prevention Policies Split-domain Name Service Systems And Methods For Computer Program Update Protection Systems And Methods For Synchronizing Microservice Data Stores Systems And Methods For Transferring Authentication Credentials Composite Execution of Rename Operations in Wide Area File Systems Automatic Switching Network Points Based On Configuration Profiles Off-device Anti-malware Protection For Mobile Devices Metamorphic Computer Virus Detection System And Method For Tracking And Filtering Alerts In An Enterprise And... ...and 4032 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4036 more |
14025755 12059791 09329963 12029402 16399338 11864867 13116760 13020424 15047130 12724316 11053596 12559319 10921478 10500952 10264922 12147700 12059700 13645307 09233860 16112111 11863567 11478786 15231692 14991730 10892615 10754318 14184581 ...and 4036 more |
Hosts File Protection System And Method Pre-calculating And Updating Data Loss Prevention (dlp) Policies Prior T... Individualized Time-to-Live for Reputation Scores of Computer Files Method And Apparatus To Hook Shared Libraries Across All Processes On Wi... Securely Storing And Provisioning Security Telemetry Of Multiple Organiz... Systems And Methods For Aggregating Data For Resources In A Target Group... Packet Filtering Methods And Systems Systems And Methods For Automated Classification Of Application Network ... Software Signing Certificate Reputation Model Efficient isolation of backup versions of data objects affected by malic... Systems And Methods For Detecting Malicious Processes That Encrypt Files Method And System For Ensuring Compliance In Public Clouds Using Fine-gr... Multiple-developer Architecture For Facilitating The Localization Of Sof... Systems And Methods For Detecting Malicious Computing Events Use Of Geo-location Data For Spam Detection Pre-emptive Application Blocking For Updates Malware Detection Facilitated by Copying a Memory Range From an Emulator... Methods And Systems For Authenticating Devices System, Method, And Apparatus For Processor Detection In A Pre-boot Exec... Undergarment Providing Dynamically Shared Cloud Accounts Profiling Application Usage From Application Streaming Multi-tiered Incremental Software Updating Methods And Systems For Secure Storage Segmentation Based On Security Co... Scanning Images For Pornography Computer Software Run-time Analysis Systems And Methods Supporting Proximity Based Security Code Transfer From Mobile/tablet App... ...and 4036 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4040 more |
12079767 13733131 12044836 13467620 29275692 13341041 15439897 13038232 15265346 11376770 12916267 15072589 12768157 14866634 12579093 12495111 14450181 14214581 12329671 10320015 12165003 13872623 12060244 09402815 12032571 13453214 16433691 ...and 4040 more |
Host-based Detection And Prevention Of Malicious Code Propagation Systems And Methods For Trusting Digitally Signed Files In The Absence O... Method And Apparatus For Securing Transactions Using Verified Resource L... Cost-aware, Bandwidth Management Systems Adaptive To Network Conditions Systems And Methods For Handling Fraudulent Uses Of Brands Method And Apparatus For Detecting Malware On A Computer System System And Method For Computer Security Using Multiple Cages Dynamic Workspace Modification Data Loss Detection Method For Handling Fuzziness In Sensitive Keywords System And Methods For Cross-tier Transaction Tracing Automated Construction Of Network Whitelists Using Host-based Security C... Systems And Methods For Analyzing Malware Automatically Estimating Correlation Between Hardware Or Software Change... Using Tunable Metrics for Iterative Discovery of Groups of Alert Types I... Systems And Methods For Identifying Potential Malware Cross Ui Platform Alerting Of Security Status Anomaly Based Geofencing Leveraging Location Duration Techniques For Providing Missed Arrival Notifications Method and apparatus for providing connectivity control Creating An Execution Safety Container For Unreliable Exploits Systems And Methods For Processing Data Flows Mapping Regulations And Frameworks To Policies Using Control Statements Systems And Methods For Network Traffic Routing To Reduce Service Conges... Policy Enforcing Browser Systems And Methods For Processing Data Flows Systems And Methods For Data Loss Prevention Virtual Bandwidth Management Deployment Architectures ...and 4038 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4042 more |
12141022 13827467 09810874 13605448 09165532 13421757 15381140 15199700 11303804 14972001 12432923 14293660 12367388 14163071 12241852 13928348 12130786 13551576 11963694 13416647 11854350 13242163 15472827 13049480 15369913 15186053 11285272 ...and 4042 more |
Method And Apparatus For Creating An Information Security Policy Based O... Data Loss Prevention Of Information Using Structured Document Templates ... Referrer Cache Chain Universal Network Driver Interface Installer Systems And Methods For Determining The Trustworthiness Of Files Within ... Systems And Methods For Managing Access To A Peripheral Device Network Application Apparatus System And Method For Distributing Heuristics To Network Intermediary De... Rolling Incremental Updates Layer Typed Prioritizing Application Layered Systems Systems And Methods For Applying Security Updates To Endpoint Devices Bypass Mechanism for Virtual Computing Infrastructures Dropping Packets To Prevent Unauthorized Data Transfer Through Multimedi... System And Method For Prioritizing Endpoints And Detecting Potential Rou... Systems And Methods For Blocking An Outgoing Request Associated With An ... Load Balancing Using A Distributed Hash Automatically Detecting A Malicious File Using Name Mangling Strings Automated Human Assisted Authentication System And Method For Controlling Distribution Of Network Communications Image Quality Optimization During Remote Isolated Sessions Techniques For Directory Server Integration Method And System For Authentication Among Peer Appliances Within A Comp... Software-implemented Method For Identifying Nodes On A Network Systems And Methods For Evaluating Application Trustworthiness Methods And Systems For Providing Resource-access Information Electronic Mail File Access System Techniques For Predicting And Protecting Spearphishing Targets ...and 4041 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4056 more |
12059084 13559196 15988583 11861049 13248936 11657670 13074850 11292970 12843098 14727732 11027744 12545527 14513897 12361169 14145670 12238300 13773924 12058582 13539848 11960728 13408920 11632249 15359123 14952344 11124461 11016555 12534771 ...and 4056 more |
Computer System Configuration Representation And Transfer Safe And Secure Access To Dynamic Domain Name Systems Methods And Systems For Creating And Applying Patches For Virtualized Ap... Method And System To Prevent Peer-to-peer (p2p) Worms Systems And Methods For Identifying Malicious Files Systems And Methods For Selectively Authenticating Queries Based On An A... Multi-platform And Multi-national Gateway Service Library Quantifying The Risks Of Applications For Mobile Devices Identifying Legitimate Content Using User-agent-based White Listing Detection Of Network Problems In A Computing System Systems And Methods For Adjusting Behavioral Detection Heuristics Method And Apparatus For Detecting Potentially Misleading Visual Represe... Methods And Systems For Detecting And Preventing The Spread Of Malware O... Detecting Malicious Code Based On Deviations In Executable Image Import ... Systems and Methods for Digitally Signing Executables with Reputation In... System And Method For Adaptive End-point Compliance Systems And Methods For Evaluating Cybersecurity Risk Systems And Methods For Preventing Heap-spray Attacks Method And Apparatus For Content Based Encryption Systems And Methods For Creating A Deception Computing System Ticket Based Strong Authentication With Web Service Methods and Systems for Caching Content at Multiple Levels Systems And Methods For Authenticating Applications Installed On Computi... System And Method For Identifying Web Objects Unworthy Of Being Cached Detecting And Preventing External Modification Of Passwords Detonate Targeted Malware Using Environment Context Information Techniques for Providing Access to Data in Dynamic Shared Accounts ...and 4054 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4058 more |
12058782 13543730 09067655 13412588 15935600 13240959 15471593 11636713 13048810 15365507 15185104 12831004 14952410 12687071 12414478 14266518 12128490 13754810 11956172 15842095 11809419 13227151 11565494 13048336 11391979 14938874 11096310 ...and 4058 more |
In Memory Heuristic System And Method For Detecting Viruses Systems And Methods For Multicast Streaming Analysis Systems And Methods For Evaluating The Performance Of Remote Computing S... Vulnerability Assessment Of Disk Images Systems And Methods For Secure Hybrid Third-party Data Storage Systems And Methods For Providing Adaptive Views Of Domain Name System R... Network Traffic Synchronization And Data Compression In Redundant Networ... Systems And Methods For Blocking Push Authentication Spam Systems And Methods For Using Reputation Data To Detect Packed Malware Adaptive Correlation Of Service Level Agreement And Network Application ... Protecting User Identity At A Cloud Using A Distributed User Identity Sy... Systems and Methods for Sharing the Results of Computing Operations Amon... Enhanced Qos Solution For Thin Client Or Remote Access Sessions Techniques For Classifying And Labeling Data Systems and Methods for Merging Virtual Layers System And Method For Efficiently Forwarding Client Requests In A Tcp/ip... Systems And Methods For Classifying Files Applications Processing In A Network Apparatus Endpoint Management Using Trust Rating Data Systems And Methods For Securing Computing Devices That Are Not In Users... Enabling Selective Policy Driven Propagation of Configuration Elements B... System And Method Of Controlling Data Center Resources For Management Of... Systems And Methods For Identifying Suspicious Controller Area Network M... User Account Level Anti-malware Exclusions Lockless Processing Of Command Operations In Multiprocessor Systems Systems And Methods For Server Load Control Systems And Methods For Protecting Platform-as-a-service Platforms ...and 4057 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4065 more |
12260913 13938697 10234661 12140037 09794093 09152222 11967954 13420574 15588280 15377448 11430212 12981826 15193653 14968453 11150815 12698745 10862048 12430574 14273510 10716337 10411572 13925357 10151598 12130559 08959313 15928770 11839342 ...and 4065 more |
Multi-platform And Multi-national Gateway Service Library Quantifying The Risks Of Applications For Mobile Devices Identifying Legitimate Content Using User-agent-based White Listing Detection Of Network Problems In A Computing System Systems And Methods For Adjusting Behavioral Detection Heuristics Method And Apparatus For Detecting Potentially Misleading Visual Represe... Methods And Systems For Detecting And Preventing The Spread Of Malware O... Detecting Malicious Code Based On Deviations In Executable Image Import ... Systems and Methods for Digitally Signing Executables with Reputation In... System And Method For Adaptive End-point Compliance Apparatus and Method for Characterizing the Risk of a User Contracting M... Systems And Methods For Preventing Heap-spray Attacks Method And Apparatus To Determine Device Mobility History Systems And Methods For Creating A Deception Computing System Load Balancing for Network Devices Methods And Systems For Caching Content At Multiple Levels Systems And Methods For Generating Training Documents Used By Classifica... System And Method For Identifying Web Objects Unworthy Of Being Cached Detecting And Preventing External Modification Of Passwords Automated Scoring Of Intra-sample Sections For Malware Detection Techniques For Providing Access To Data In Dynamic Shared Accounts Method And Apparatus For Identifying Web Attacks Method For Data Rate Control For Heterogenous Or Peer Internetworking Exchange Of Digital Certificates In A Client-proxy-server Network Config... Virtual Machine File System Content Protection System And Method Cryptographic System With Methods For User-controlled Message Recovery Systems And Methods For Determining Potential Impacts Of Applications On... ...and 4064 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4067 more |
09157751 13420868 11672894 15379709 11461320 12982750 15198778 11302706 14969388 12432652 14283824 14155792 12241369 13926064 10155936 12130767 09750836 13551231 09093533 11962888 13414408 13242118 15471836 13048866 15368542 15186023 11277429 ...and 4067 more |
Automated Classification Of Applications For Mobile Devices Detecting Network Evasion And Misinformation Automatic Network Traffic Discovery And Classification Mechanism Includi... Dynamic Call Tracking Method Based On Cpu Interrupt Instructions To Impr... Classification Techniques For Encrypted Network Traffic Filtering cached content based on embedded URLs Data Loss Prevention Of Information Using Structured Document Templates ... Systems and Methods for Virtualizing Software Associated with External C... Profiling Users Based On Artificially Constructed Deceptive Content Practical And Dynamic Approach To Enterprise Hardening Detection Of Malicious Script Operations Using Statistical Analysis Methods And Systems For Detecting And Preventing The Spread Of Malware O... Systems And Methods For Assessing Internet Addresses Techniques For Automatic Management Of File System Encryption Drivers File Type Associative Application Layered System Application Classification and Management Systems And Methods For Detecting A Potentially Malicious Uniform Resour... Method And Apparatus For Peer-to-peer Compliancy Validation In Secure Ma... Systems And Methods For Preventing Malicious Network Connections Using C... Cloning Using Streaming Restore Web Site Hygiene-based Computer Security Systems And Methods For Labeling Automatically Generated Reports Mechanism For Profiling User And Group Accesses To A Content Repository System And Method For Controlling Distribution Of Network Communications Systems And Methods For Chaining Virtual Private Networks Systems And Methods For Using Property Tables To Perform Non-iterative M... Method And System For Authentication Among Peer Appliances Within A Comp... ...and 4066 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4069 more |
12129170 13525105 29269499 11959700 13233964 15469608 15345533 11394524 12965075 14947781 11112033 12632620 14675443 11009704 10840822 12413821 14256897 12340420 14095015 12203788 13905913 09615961 29161308 13358396 11771822 11540821 13046664 ...and 4069 more |
Network Traffic Identification By Waveform Analysis Applying Security Policies Based On Context Of A Workload Methods And Systems For Normalizing Data Loss Prevention Categorization ... Protecting A Computer Coupled To A Network From Malicious Code Infection... Gateway-based Audit Log And Method For Prevention Of Data Leakage Systems And Methods For Focusing Product Testing Based On Areas Of Chang... Presentation Of Network Source And Executable Characteristics Technique For Data Loss Prevention For A Cloud Sync Application Systems And Methods For Defending A Shellcode Attack Preventing Unauthorized Installs And Uninstalls Of Software Modules Detecting Malicious Software Secure Network Cache Content System And Method For Unified Threat Management With A Relational Rules ... System And Method For Assessing Characteristics Of Web Sites System And Method For Hypertext Transfer Protocol Layered Reconstruction Token sharing system and method Systems And Methods For Providing Interfaces For Visualizing Threats Wit... Method To Create A Content Management Recommendation Based On Presence O... Method and apparatus for monitoring source data that is a target of a ba... Real-time Anomaly Detection In A Network Using State Transitions System For Data Loss Prevention Handshake Between Computing Systems On-demand Access To A Virtual Representation Of A Physical Computer Syst... Systems And Methods For Improving Performance Of Cascade Classifiers For... Systems And Methods For Addressing Security Vulnerabilities On Computing... Techniques For Differencing Binary Installation Packages Network Object Cache Engine Method and Apparatus for Mitigating Performance Impact of Background Pro... ...and 4068 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4071 more |
12182287 10033465 12079767 13733131 12044836 13467620 13341041 15439897 13038232 15265346 11376770 12916267 15072589 12768157 14866634 12579093 12495111 14450181 14214581 12329671 10320015 12165003 13872623 12060244 09402815 12032571 13453214 ...and 4071 more |
Cost-aware, Bandwidth Management Systems Adaptive To Network Conditions Systems And Methods For Handling Fraudulent Uses Of Brands Method And Apparatus For Detecting Malware On A Computer System System And Method For Computer Security Using Multiple Cages Dynamic Workspace Modification Data Loss Detection Method For Handling Fuzziness In Sensitive Keywords System And Methods For Cross-tier Transaction Tracing Automated Construction Of Network Whitelists Using Host-based Security C... Systems And Methods For Analyzing Malware Automatically Estimating Correlation Between Hardware Or Software Change... Using Tunable Metrics for Iterative Discovery of Groups of Alert Types I... Systems And Methods For Identifying Potential Malware Cross Ui Platform Alerting Of Security Status Anomaly Based Geofencing Leveraging Location Duration Techniques For Providing Missed Arrival Notifications Method and apparatus for providing connectivity control Creating An Execution Safety Container For Unreliable Exploits Systems And Methods For Processing Data Flows Mapping Regulations And Frameworks To Policies Using Control Statements Systems And Methods For Network Traffic Routing To Reduce Service Conges... Policy Enforcing Browser Systems And Methods For Processing Data Flows Systems And Methods For Data Loss Prevention Virtual Bandwidth Management Deployment Architectures System And Method For Tracking The Source Of A Computer Attack In-line Filtering Of Insecure Or Unwanted Mobile Device Software Compone... Centralized Scanner Database With Optimal Definition Distribution Using ... ...and 4070 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4091 more |
09981672 12059817 09330318 16138939 11864873 13324987 15052717 12724414 11057988 12559943 10923589 12475291 12396969 14205205 09934926 12059725 13646586 09243185 13446081 16024492 11478932 13017027 11174181 12469744 10756986 10459768 12059258 ...and 4091 more |
Systems And Methods For Protecting Users From Website Security Risks Usi... System And Method For Managing Data Loss Due To Policy Violations In Tem... Method For Real Time Protocol Media Recording Systems And Methods For Completing Multi-factor Authentication Via Mobil... Method And System For Employing User Input For File Classification And M... Method and apparatus for allowing sharing of streamable applications Systems And Methods For Scalable Network Monitoring In Virtual Data Cent... Decision Tree Induction That Is Sensitive To Attribute Computational Com... Detecting Unsanctioned Network Servers Techniques For Application Code Obfuscation Systems And Methods For Configuring Information Displayed On A Screen System And Method For Dynamically Identifying Internal Hosts In A Hetero... Print Interface Technology Agnostic Data Loss Prevention Through Print O... Detecting And Remediating Malware Dropped By Files Redundancy Management Service For Peer-to-peer Networks Systems And Methods For Detecting Malicious Processes On Computing Devic... Techniques for Managing Search Engine Results Method And System For Running An Application In A Clean Operating Enviro... Systems And Methods For Evaluating Security Services Systems And Methods For Enforcing Geolocation-based Policies End-to-end Transactional Protection For Requests In A Web Application Systems And Methods For Altering Time Data Techniques For Identifying Potential Malware Domain Names Selective Detection Of Malicious Computer Code Systems And Methods For Detecting Anomalous Behavior Within Computing Se... Protecting User Identity At A Cloud Using A Distributed User Identity Sy... Code Module Operating System (os) Interactions Intercepting System And M... ...and 4090 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4095 more |
10060416 13473182 13341202 15452109 11536206 15268260 12940835 12581302 10941527 12495321 14459687 14219573 10612198 14038552 12165467 13886859 10012138 13677914 09451632 13459046 16192653 11864985 15678096 13174718 13028124 15061057 12755299 ...and 4095 more |
Systems And Methods For Identifying A Source Of A Suspect Event Systems And Methods For Retaining An Executable Environment During A Dat... Signature Driven Cache Extension For Stream Based Scanning Dynamic On-device Passcodes To Lock Lost Or Stolen Devices Method Of Detecting Data Loss Using Multiple References To A File In A D... Correlation Of Application Instance Life Cycle Events In Performance Mon... Systems And Methods For Detecting Potentially Malicious Applications Accelerated Tcp Network Communications System And Methods For Tracing Transactions Techniques For Generating A Virtual Private Container System And Method For Vulnerability Risk Analysis Tracking Time Usage On A Disconnected Client Over A Period Of Time Protecting Dynamic And Short-lived Virtual Machine Instances In Cloud En... Selectively Trusting Signed Files Graph Buffering Systems And Methods For Providing Computing Security By Classifying Orga... Techniques For Classifying Non-process Threats Evaluating Relying Parties Detecting Name Resolution Spoofing Strong Authentication Via A Federated Identity Protocol Lockless Bandwidth Management For Multiprocessor Networking Devices Application Identification And Control In A Network Device Identifying Trojanized Applications for Mobile Environments Methods And Systems For Automatically Discovering Information About A Do... Securely Sharing A Transport Layer Security Session With One Or More Tru... Endpoint Management Using Trust Rating Data Monitoring Application Behavior By Detecting File Access Category Change... ...and 4093 more |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Trademark |
6018153 |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Application |
88592328 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78329139 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3309758 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78885741 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
4486898 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
85355876 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3294596 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
86441858 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4273070 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
85428609 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4759918 |
|
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Application |
73471191 |
 |
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Trademark |
1355047 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Trademark |
4759918 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Application |
86441858 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86697834 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76077730 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86354568 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86141424 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76358837 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85918617 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456898 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
78424526 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85144826 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982041 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3953936 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2460389 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2638737 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3461082 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5099925 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1914615 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2383995 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5268716 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1654777 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5206150 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
4527953 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85079904 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75797459 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76247818 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
77293710 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
87015542 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
74467812 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75550401 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86681257 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
73815903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982040 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85863409 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2508404 |
|
|
|
Incoming Payments
Outgoing Payments
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/4/2008 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
4/2/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
3/30/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
10/2/2006 |
Democratic Governors Association |
Donation |
Cash |
$50,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
| Total |
|
|
|
$250,750.00 |
|
|
|