C, A, Inc.
United States C Corporation
 |
No tags have been applied so far. Sign in to add some. |
|
|
![[Unknown]](https://s.thinklink.com/images/nophotommg.gif) |
|
|
|
|
[Unknown]
successor By Merger To Computer Associates Think, Inc.
|
|
|
|
|
Go Pro to view an analysis and graphs of case roles, types and more.
|
|
7/14/2021 |
Superior Court of California, County of Santa Clara |
21CV384293 |
De Carolis v. Broadcom Corporation |
Defendant |
|
|
|
8/9/2018 |
Delaware District Court |
1:18-cv-01221 |
Gusinsky v. CA, Inc. |
Defendant |
|
|
|
8/3/2018 |
New York Southern District Court |
1:18-cv-06996 |
Harvey v. CA, Inc. |
Defendant |
|
|
|
10/25/2017 |
USPTO Trademark Trial and Appeal Board |
91237448-OPP |
Ca, Inc. v. Next Level Solutions, LLC |
Plaintiff |
|
|
|
8/7/2017 |
Superior Court of California, County of Santa Clara |
17CV314099 |
Araceli Zarate v. CA, Inc |
Defendant |
|
|
|
7/26/2017 |
USPTO Trademark Trial and Appeal Board |
87304847-EXT |
Ca, Inc. v. Next Level Solutions, Llc |
Potential Opposer |
|
|
|
6/22/2017 |
New York Eastern District Court |
2:17-cv-03761 |
CA, Inc. v. Vology, Inc. |
Plaintiff |
|
|
|
6/15/2017 |
New York Eastern District Court |
1:17-cv-03623 |
CA, Inc. v. Network Solutions Provider, Inc. |
Plaintiff |
|
|
|
2/27/2017 |
USPTO Trademark Trial and Appeal Board |
91233108-OPP |
Ca, Inc. v. Ca Plus Limited |
Plaintiff |
|
|
|
2/3/2017 |
Illinois Northern District Court |
1:17-cv-00910 |
Hinkens v. CA, Inc. |
Defendant |
|
|
|
1/3/2017 |
New York Eastern District Court |
2:17-cv-00024 |
CA, Inc. d/b/a CA Technologies v. Digital Celerity LLC |
Plaintiff |
|
|
|
10/3/2016 |
USPTO Trademark Trial and Appeal Board |
86870982-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
9/28/2016 |
USPTO Trademark Trial and Appeal Board |
86870987-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
8/23/2016 |
Virginia Eastern District Court |
1:16-cv-01080 |
8712F07 v. CA, Inc. |
Defendant |
|
|
|
6/10/2016 |
Texas Northern District Court |
3:16-cv-01567 |
4FD7553 v. CA Inc |
Defendant |
|
|
|
6/5/2015 |
Court of Chancery of Delaware |
11109-VCL |
Hyer, John vs Rally Software Development Corp |
Defendant |
|
|
|
9/10/2014 |
Delaware District Court |
1:14-cv-01175 |
Clouding Corp. v. CA Inc. d/b/a/ CA Technologies |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Counter-claimant |
|
|
|
3/27/2014 |
Superior Court of California, County of San Francisco |
CGC-14-538305 |
Appdynamics Inc. et al v. Ca, Inc. |
Defendant |
|
|
|
11/22/2013 |
California Northern District Court |
5:13-cv-05430-EJD |
Bay Area Surgical Group Inc. et al v. Aetna Life Insurance C... |
Defendant |
|
|
|
6/27/2013 |
Arizona District Court |
2:13-cv-01287 |
Clancy v. CA Incorporated |
Defendant |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Plaintiff |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Counter-Defendant |
|
|
|
11/5/2012 |
New York Eastern District Court |
2:12-cv-05468 |
CA, Inc. v. New Relic, Inc. |
Plaintiff |
|
|
|
6/20/2012 |
Texas Eastern District Court |
2:12-cv-00360 |
InNova Patent Licensing, LLC v. CA, Inc. |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Claimant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Defendant |
|
|
|
4/18/2012 |
California Northern District Court |
5:12-cv-01940-LHK |
Softvault Systems, Inc. v. CA, Inc. |
Defendant |
|
|
|
4/9/2012 |
California Northern District Court |
4:12-cv-01746 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
12/23/2011 |
California Northern District Court |
3:11-cv-06638-RS |
Vasudevan Software, Inc. v. TIBCO Software, Inc. et al |
Interested Party |
|
|
|
11/3/2011 |
Superior Court of California, County of Los Angeles |
BC472854 |
Ca Inc v. Taycor Llc |
Plaintiff/Petitioner |
|
|
|
9/12/2011 |
Missouri Eastern District Court |
4:11-cv-01579 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
6/16/2011 |
Oregon District Court |
3:11-cv-00724 |
Fog Cap Acceptance, Inc. et al v. Verizon Business Network S... |
Defendant |
|
|
|
1/18/2011 |
Superior Court of California, County of Los Angeles |
BC453147 |
Charles Matheny v. Ca Inc et al |
Defendant/Respondent |
|
|
|
12/16/2010 |
Court of Chancery of Delaware |
6078-VCL |
Wang, Charles B vs CA Inc |
Defendant |
|
|
|
9/14/2010 |
Texas Eastern District Court |
6:10-cv-00472 |
Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al |
Defendant |
|
|
|
5/5/2010 |
Superior Court of California, County of San Francisco |
CGC-10-499524 |
Lisa Marie Perri v. Ca, Inc. et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Counter Claimant |
|
|
|
11/3/2009 |
Superior Court of California, County of Los Angeles |
BC425309 |
Ca Inc v. The Bedford Group |
Plaintiff/Petitioner |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC-09-493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Cross-Complainant |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC-09-493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Defendant |
|
|
|
9/23/2009 |
Court of Chancery of Delaware |
4912-CS |
9/7/2011 CONF ORD ON DISC Sage Software Inc vs C A Inc |
Defendant |
|
|
|
8/24/2009 |
District Of Columbia District Court |
1:09-cv-01600 |
SHEMESH v. CA, INC. |
Defendant |
|
|
|
8/13/2009 |
New York Eastern District Court |
1:09-cv-03517 |
Ingres Corporation v. Xing, SA et al |
Third Party Defendant |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF-09-509379 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF-09-509380 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF-09-509381 |
In Re: Ca, Inc. |
Petitioner |
|
|
Inside Counsel (1)
Go Pro to view corporate inside counsel.
Outside Counsel (142)
|
|
|
BROADCOM |
|
FisherBroyles, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FISHER BROYLES, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FOLEY & LARDNER LLP |
Washington, DC |
|
|
|
|
CA |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
|
KSC |
|
Myers Bigel Sibley & Sajovec, PA |
Raleigh, NC |
|
|
|
A. |
P.a. |
Bradley |
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
Albright |
Alan |
D |
Bracewell LLP |
Austin, TX |
|
|
|
Alicks |
Margot |
F |
Alicks, Margot F |
|
|
|
|
Allcock |
John |
|
|
Ca, |
|
|
|
Asset |
King |
Intellectual |
|
GREENWOOD VILLAGE, CO |
|
|
|
Atkins |
Alexis |
|
|
Dallas, TX |
|
|
|
Ball |
David |
J |
Bracewell LLP |
New York, NY |
|
|
|
Baxtresser |
Dean |
W. |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Beck |
Brian |
|
Spence PC |
Chicago, IL |
|
|
|
Bigel |
Pa |
Myers |
|
Raleigh, NC |
|
|
|
Blumenfeld |
Jack |
B. |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Borchers |
Lynne |
A. |
Lerner David Littenberg Krumholz & Mentilk, ... |
|
|
|
|
Brickell |
Jamie |
Mark |
Pryor Cashman LLP |
New York, NY |
|
|
|
CA |
INC. |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
CA |
INC. |
|
Coats & Bennett, PLLC |
Cary, NC |
|
|
|
Caplan |
George |
T. |
Epstein Becker & Green, PC |
Los Angeles, CA |
|
|
|
Capshaw |
Sidney |
Calvin |
Capshaw DeRieux, LLP |
Longview, TX |
|
|
|
Carney |
Kathryn |
Mary |
Davis Polk & Wardwell, LLP |
|
|
|
|
Carroll |
Otis |
W. |
Ireland Carroll & Kelley |
Tyler, TX |
|
|
|
Chase |
Crystal |
S. |
Stoel Rives, LLP |
Portland, OR |
|
|
|
Chirlin |
Daniel |
Joseph |
Walden Macht & Haran LLP |
|
|
|
|
Civins |
Conor |
M. |
Bracewell LLP |
Austin, TX |
|
|
|
Coen |
Kevin |
Michael |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Colvin |
Jennifer |
L |
Ogletree, Deakins, Nash, Smoak & Stewart, PC |
Counsel of RecordChicago, IL |
|
|
|
CORTEGIANO |
MARK |
L. |
cortegianolaw.com Law Firm Placeholder |
Middle Village, NY |
|
|
|
Cromer |
David |
E. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
D'zurilla |
David |
|
slwip.com Law Firm Placeholder |
Minneapolis, MN |
|
|
|
Daddona |
Janet |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Dal |
Anthony |
J. |
Samuels Yoelin Kantor Seymour & Spinrad, LLP |
Portland, OR |
|
|
|
Davis |
Jennifer |
A. |
FOLEY & LARDNER LLP |
BOSTON, MA |
|
|
|
Deniro |
Kirk |
J. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Dept |
Intellectual |
Property |
100 Corporation |
ORLANDO, FL |
|
|
|
DEPT |
IP |
|
Shook Hardy & Bacon LLP |
Kansas City, MO |
|
|
|
DeRieux |
Elizabeth |
|
Capshaw DeRieux, LLP |
Longview, TX |
|
|
|
Dhillon |
Nina |
|
|
Raleigh, NC |
|
|
|
DiCamillo |
Raymond |
J. |
Richards, Layton & Finger, PA |
|
|
|
|
Dixon |
Brian |
|
Littler Mendelson, PC |
San Francisco, CA |
|
|
|
Docketing |
Attention |
IP |
Womble Carlyle Sandridge & Rice, LLP |
ATLANTA, GA |
|
|
|
DRINKWATER |
B.K. |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Dunckel |
Priscilla |
L. |
Baker Botts, LLP |
Dallas, TX |
|
|
|
Ebanks |
Elizabeth |
Marie |
Ogletree, Deakins, Nash, Smoak & Stewart, PC |
Richmond, VA |
|
|
|
ENDRES |
GAYLE |
|
Myers Bigel Sibley & Sajovec, PA |
|
|
|
|
Enerson |
Benjamin |
D. |
Holland & Knight, LLP |
|
|
|
|
Erickson |
Brian |
K |
DLA Piper (US) LLP |
AUSTIN, TX |
|
|
|
Ericson |
Bruce |
A. |
Pillsbury Winthrop Shaw Pittman LLP |
San Francisco, CA |
|
|
|
Frankel |
Jonathan |
|
Wilmer Hale, LLP |
Washington, DC |
|
|
|
Freedman |
Susan |
E. |
Nixon Peabody LLP |
Raleigh, NC |
|
|
|
Garry |
Paul |
Randall |
Cozen O'Connor, PC |
Scottsdale, AZ |
|
|
|
Gates |
Matthew |
Karl |
Pillsbury Winthrop Shaw Pittman LLP |
Austin, TX |
|
|
|
Gimlan |
Gideon |
|
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Goldman |
Roger |
Steven |
Latham & Watkins LLP |
|
|
|
|
Gonzales |
Della |
|
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Gonzalez |
Della |
|
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Gould |
Andrew |
Mark |
Wick Phillips Gould & Martin, LLP |
Dallas, TX |
|
|
|
Granneman |
Vernon |
H. |
Pillsbury Winthrop Shaw Pittman LLP |
San Jose,, CA |
|
|
|
Grant |
M. |
Duncan |
Troutman Sanders, LLP |
Pa, |
|
|
|
Grouop |
Sage |
Patent |
|
RALEIGH, NC |
|
|
|
Group |
Patent |
Capital |
|
Rockwall, TX |
|
|
|
Guaragna |
John |
M. |
DLA Piper (US) LLP |
Austin, TX |
|
|
|
H. |
Alan |
W. |
Crowell & Moring LLP |
Washington, DC |
|
|
|
Hallenbeck |
James |
|
Semiconductor Corporation |
|
|
|
|
Haran |
Sean |
|
Walden Macht & Haran LLP |
New York, NY |
|
|
|
Hartmann |
Jennifer |
L |
Ruskin Moscou Faltischek, PC |
Uniondale, NY |
|
|
|
Hatfield |
Scott |
C. |
|
RALEIGH, NC |
|
|
|
Haynes |
Christine |
Dealy |
Richards, Layton & Finger, PA |
Wilmington, DE |
|
|
|
Hazelton |
David |
Rex |
Latham & Watkins LLP |
|
|
|
|
Healey |
David |
J. |
Weil Gotshal & Manges LLP |
|
|
|
|
Herbert |
John |
Mitchell |
Holland & Knight, LLP |
BOSTON, MA |
|
|
|
Hoppin |
Ralph |
|
Law Office Of Barry R. Lipsitz |
San Francisco, CA |
|
|
|
In |
Juniper |
Networks |
FISHER BROYLES, LLP |
SALT LAKE CITY, UT |
|
|
|
Ip |
Adsero |
|
|
Littleton, CO |
|
|
|
Jefcoat |
Kyle |
R |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Jones |
Molly |
Marie |
Wick Phillips Gould & Martin, LLP |
Dallas , TX |
|
|
|
Joseph |
Ii |
John |
|
Chicago, IL |
|
|
|
Kaplan |
Matthew |
A |
Kaplan, Matthew A |
|
|
|
|
Kelly |
Don |
V |
Generally Admitted |
ST. LOUIS, MO |
|
|
|
Komenda |
J. |
Kyle |
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Komneda |
J. |
Kyle |
|
ROCKWALL, TX |
|
|
|
Krumholz |
Joshua |
|
Holland & Knight, LLP |
Boston, MA |
|
|
|
Lee |
Jonathan |
R. |
Greenberg Traurig, LLP |
Chicago, IL |
|
|
|
Lester |
Nancy |
Sasser |
Ogletree, Deakins, Nash, Smoak & Stewart, PC |
Richmond, VA |
|
|
|
Lindvall |
Scott |
G. |
Arnold & Porter, LLP |
New York, NY |
|
|
|
Love |
Adanna |
M. |
Holland & Knight, LLP |
San Francisco, CA |
|
|
|
Lovett |
Steven |
T. |
Stoel Rives, LLP |
Or, |
|
|
|
Lynch |
Eric |
Edward |
The Nagi Law Firm Group LLC |
|
|
|
|
Magen |
Burt |
|
Fliesler Meyer LLP |
San Francisco, CA |
|
|
|
Manaugh |
Sara |
Linda |
|
New York, NY |
|
|
|
Marcus |
Vierra |
Magen |
|
SAN FRANCISCO, CA |
|
|
|
McEntee |
John |
P. |
Allen Matkins Leck Gamble Mallory & Natsis L... |
Phoenix, AZ |
|
|
|
Mckenna |
Christopher |
|
|
Washington, DC |
|
|
|
Mcmahan |
Michele |
Parent |
|
RALEIGH, NC |
|
|
|
Menard |
Rigel |
J. |
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
Monahan |
William |
B. |
Sullivan & Cromwell LLP |
New York, NY |
|
|
|
Montgomery |
Tamika |
|
Montgomery, Tamika |
|
|
|
|
Mulholland |
Mark |
S. |
Ruskin Moscou Faltischek, PC |
Uniondale, NY |
|
|
|
|
8/15/2024 |
Symantec Corporation |
Assignor |
Application Publication |
18806063 20240406026 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/14/2024 |
Mortha, Srinivas |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
2/14/2024 |
Chevendra, Naga Naveen |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
10/2/2023 |
Back, Ophir |
Assignor |
Application Publication |
18479358 20250111130 |
System And Method For Canvas Sanitization System And Method For Canvas Sanitization |
|
|
|
9/12/2023 |
Biswas, Dhrubojyoti |
Assignor |
Application Publication |
18465285 20250086292 |
Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... |
|
|
|
8/28/2023 |
Cosgrove, David |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Murdough, John |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Normandin, Jason |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Diep, Tim |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/23/2023 |
Zuercher, Chris |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Tomic, Gary |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Du Toit, Roelof Nico |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Elkadri, Nour Alhouda |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
7/19/2022 |
Symantec Corporation |
Assignor |
Application Publication |
17863998 20220345462 |
|
|
|
|
2/23/2022 |
Ciubotariu, Mircea |
Assignor |
Application Patent |
13902345 9411953 |
Tracking Injected Threads to Remediate Malware Tracking Injected Threads to Remediate Malware |
|
|
|
11/2/2021 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent |
29269499 29161308 29172439 29266981 29297799 29171598 29159439 29275692 29162946 29165309 D586413 D475328 D483549 D562904 D475329 D485487 D569716 D475326 D483524 D562898 |
Birding Acoustic Feedback Learning Aid Clip For Retaining Soccer Nets And Other Fastener Applications Hair Clip Front Grill Of An Automobile Trailer Trestle Connecting Device For A Combustion Facilitator Of Internal/external Comb... Integrated Tabbed Note And Clip Clip For Retaining Soccer Nets And Other Fastener Applications Undergarment Front Grill Of An Automobile Hitch Cover Golf Putter Integrated Tabbed Note And Clip Birding Acoustic Feedback Learning Aid Undergarment Hair Clip Hitch Cover Golf Putter Trailer Trestle Connecting Device For A Combustion Facilitator Of Internal/external Comb... |
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication |
17322045 20210281443 |
|
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
17322045 20210281443 12088430 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14838278 20160012220 9639694 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
15470717 20170250994 10148667 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14675327 20150281258 9374386 |
Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks |
|
|
|
6/19/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Application Application Publication Publication Patent Patent Patent |
10990894 12203018 11132649 20100058352 20050283539 7457722 8365183 8548976 |
Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... Balancing Load Requests And Failovers Using A Uddi Proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... |
|
|
|
5/19/2020 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 82 more |
11496032 09884884 09651306 08864297 29475329 14464638 12416276 09047949 29485487 15077542 11261061 09792226 13517529 10733655 09840945 09564672 29569716 29475326 11833503 10881448 10284827 08977642 29483524 14995594 10288548 12982772 10682644 ...and 82 more |
System and Method for Implementing Traffic Optimization for Overlay Netw... Display Screen With Graphical User Interface System For Managing Flow Bandwidth Utilization At Network, Transport And... Method And Apparatus For Encrypted Communications To A Secure Server Method and system for scanning network devices Automatic switching network points based on configuration profiles Graphical User Interface Including Usage Trending For Sensitive Files System And Method For Recognizing Offensive Images Display Screen Or Portion Thereof With Transitional Graphical User Inter... Multi-tiered Incremental Software Updating Network application apparatus System And Method For Add-on Services, Secondary Authentication, Authori... Internet over satellite apparatus Method And Apparatus For Network Packet Capture Distributed Storage Syst... Methods And Apparatus For Blocking Unwanted Software Downloads Display Screen With Graphical User Interface Bubble-protected System For Automatic Decryption Of File Data On A Per-u... Virtual Partition Controllable Deployment Of Software Updates Method And Apparatus For Network Packet Capture Distributed Storage Syst... Methods and Systems for Caching Content at Multiple Levels Display Screen with Graphical User Interface System For Supporting Secured Log-in Of Multiple Users Into A Plurality ... System And Method For Detecting Buffer Overflow Attacks System And Method For Dynamically Identifying Internal Hosts In A Hetero... System And Method For Recompressing A Digital Image Using Requantization System And Method For Preventing Detection Of A Selected Process Running... ...and 82 more |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Patent |
16551440 11089050 |
Isolating An Iframe Of A Webpage |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Application Patent Patent |
16551440 16560273 11204992 11089050 |
Isolating An Iframe Of A Webpage Systems And Methods For Safely Executing Unreliable Malware Isolating An Iframe Of A Webpage |
|
|
|
4/8/2020 |
Symantec Corporation |
Assignor |
Application Patent |
16560273 11204992 |
Systems And Methods For Safely Executing Unreliable Malware |
|
|
|
3/10/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Publication Patent |
11694483 20070233698 8572138 |
Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... |
|
|
|
3/4/2020 |
Segu, Murali Krishna |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanasi, Chandra Sekhar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Tiruvaipeta, Vinay Kumar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanjani, Jeetendra Gopal |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
2/25/2020 |
Kaladgi, Mohammed Mujeeb |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sawant, Yashwant Ramkishan |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Kaladgi, Ruqiya Nikhat |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sandeep, Banisetti |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
1/28/2020 |
Ball-marian, Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/28/2020 |
Lansky, Richard Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/24/2020 |
Bay Dynamics, Inc. |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent ...and 1 more |
13269570 15836796 13269561 15836791 13269569 13269565 13269562 13269568 15836794 13269566 13269560 13269563 15089260 9183269 9081830 9330091 10607014 8965836 8909680 9390082 10387452 8799207 10691796 10353922 10587644 9171055 ...and 1 more |
Content Packs for Multidimensional Data Storage Cubes Monitoring And Managing Credential And Application Threat Mitigations In... System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube Rendering Multidimensional Cube Data Intelligent Caching Of Multidimensional Cube Data Prioritizing Security Risks For A Computer System Based On Historical Ev... Unified Data Source Management Management of Multidimensional Data Storage Cubes using Content Packs Determining Monetary Loss Due To Security Risks In A Computer System System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube System For Managing Data Storages Updating a View of a Multidimensional Cube Intelligent Caching Of Multidimensional Cube Data Federated Multidimensional Data Storage Cubes Management of Multidimensional Data Storage Cubes using Content Packs Determining Monetary Loss Due To Security Risks In A Computer System Content Packs for Multidimensional Data Storage Cubes Monitoring And Managing Credential And Application Threat Mitigations In... System For Managing Data Storages Updating a View of a Multidimensional Cube Rendering Multidimensional Cube Data Federated Multidimensional Data Storage Cubes Prioritizing Security Risks For A Computer System Based On Historical Ev... Unified Data Source Management ...and 1 more |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication |
16149807 20200106779 |
Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication Patent |
16149807 20200106779 10965676 |
Peer Authentication By Source Devices Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
12/11/2019 |
Morrison, Kenneth William Scott |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
12/11/2019 |
Thorne, Jay William |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
11/25/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Publication Publication Publication Publication Publication |
10500960 10500958 10500959 10500952 10500953 20050071748 20050055569 20050071649 20050022016 20050091512 |
Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For Detecting Mass Mailing Viruses System For And Method Of Detecting Malware In Macros And Executable Scri... Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For, Scanning Electronic Documents Which Contain L... System For And Method Of Detecting Malware In Macros And Executable Scri... Method Of, And System For, Replacing External Links In Electronic Docume... Method Of, And System For, Scanning Electronic Documents Which Contain L... Method Of, And System For Detecting Mass Mailing Viruses Method Of, And System For, Replacing External Links In Electronic Docume... |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3922 more |
13559196 11861049 13248936 15716909 11657670 13074850 11292970 12843098 14727732 11027744 12545527 14513897 12361169 14145670 12238300 13773924 12058582 13539848 11960728 13408920 11632249 11124461 11016555 12534771 10676631 14138124 13910892 ...and 3922 more |
Fingerprinting For Software License Inventory Management Computer System Configuration Representation And Transfer Safe And Secure Access To Dynamic Domain Name Systems Methods And Systems For Creating And Applying Patches For Virtualized Ap... Method And System To Prevent Peer-to-peer (p2p) Worms Systems And Methods For Identifying Malicious Files Systems And Methods For Selectively Authenticating Queries Based On An A... Multi-platform And Multi-national Gateway Service Library Quantifying The Risks Of Applications For Mobile Devices Identifying Legitimate Content Using User-agent-based White Listing Detection Of Network Problems In A Computing System Systems And Methods For Identifying Non-malicious Files On Computing Dev... Method And Apparatus For Detecting Potentially Misleading Visual Represe... Methods And Systems For Detecting And Preventing The Spread Of Malware O... Systems And Methods For Assessing Internet Addresses Systems and Methods for Digitally Signing Executables with Reputation In... System And Method For Adaptive End-point Compliance Systems And Methods For Applying Security Updates To Endpoint Devices Systems And Methods For Preventing Heap-spray Attacks Method And Apparatus For Content Based Encryption System And Method Of Traffic Inspection And Stateful Connection Forwardi... Ticket Based Strong Authentication With Web Service Methods and Systems for Caching Content at Multiple Levels Technique For Data Loss Prevention Through Clipboard Operations System And Method For Identifying Web Objects Unworthy Of Being Cached Detecting And Preventing External Modification Of Passwords Techniques for Providing Access to Data in Dynamic Shared Accounts ...and 3922 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3924 more |
13341205 13191201 15471593 11537020 12941939 11233195 12583097 14644230 10942395 12495420 14219584 10623008 14039985 12165599 10014107 13706256 09469582 12039515 13463612 11864993 29159439 13176652 13030010 11359202 15070277 12758242 14857046 ...and 3924 more |
Packet Load Shedding Method And Apparatus For Fast Lookup Of Related Classification Entities ... Encrypted Search Acceleration Slow-start Adaptive Mechanisms To Improve Efficiency Of Bandwidth Alloca... Network Risk Analysis Systems And Methods For Using Reputation Information To Evaluate The Tru... Methods And Systems For Detecting Man-in-the-browser Attacks Circumstantial Blocking Of Incoming Network Traffic Containing Code Systems And Methods For Identifying A Source Of A Suspect Event Security Driver For Hypervisors And Operating Systems Of Virtualized Dat... Organizing Computer Network Identifications And Concurrent Application O... System and Method for Building Intelligent and Distributed L2 - L7 Unifi... System And Method For Providing Secure Remote Email Access Dynamic Depth Inspection Copy Data Management With Data Security Using File Prevalence To Inform Aggressiveness Of Behavioral Heuristics Use Of Database Schema For Fraud Prevention And Policy Compliance Detection of Mutated Apps and Usage Thereof Systems And Methods For Altering The State Of A Computing Device Via A C... Detecting Variants Of Known Threats Systems And Methods For Generating Memory Images Of Computing Devices Systems And Methods For Identifying Candidate Duplicate Memory Pages In ... Ambiguous-state Support In Virtual Machine Emulators Systems And Methods For Trichotomous Malware Classification Techniques For Behavior Based Malware Analysis Method And Apparatus For Controlling Transmission Flow Using Explicit Ra... Creation Of Fictitious Identities To Obfuscate Hacking Of Internal Netwo... ...and 3924 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4016 more |
14462833 12408950 12335890 13895478 13336435 11743029 15263398 11075515 14614271 12403321 12274958 12163747 12026475 13298032 11728616 13103794 15395898 11480315 13020406 12882882 14834474 11051883 14570393 14328274 10765770 12395554 14197877 ...and 4016 more |
Apparatus And Method For Identity-based Encryption Within A Conventional... Optimizing Data Loss Prevention Performance During File Transfer Operati... Hypervisor Assisted Single Instance Data Access By Multiple Virtual Mach... Client-side Extensions For Use In Connection With Http Proxy Policy Enfo... Systems And Methods For Determining Whether Malicious Files Are Targeted User Interface And Workflow For Performing Machine Learning Rogue Wireless Access Point Detection Systems And Methods For Determining Reputations Of Digital Certificate S... Systems And Methods For Generating Machine Learning-based Classifiers Fo... Control Flow Redirection And Analysis For Detecting Vulnerability Exploi... Identifying and Blocking Overlay Phishing Embedded Security Blades For Cloud Service Providers Systems And Methods For Processing Data Flows Systems and Methods for Providing Guidance on the Potential Impact of Ap... Detecting File System Layout Discrepancies Network Address Translation Gateway For Local Area Networks Using Local ... Methods And Systems For Handling Component-object-model Communications Packet Load Shedding Live Stream Archiving Method And Apparatus Protecting Cryptographic Secrets Using File System Attributes Slow-start Adaptive Mechanisms To Improve Efficiency Of Bandwidth Alloca... Network Risk Analysis Systems And Methods For Using Reputation Information To Evaluate The Tru... Method And Apparatus For Monitoring A Computer To Detect Operating Syste... Detecting And Blocking Drive Sharing Worms Role-based Access Control Using Dynamically Shared Cloud Accounts Security Driver For Hypervisors And Operating Systems Of Virtualized Dat... ...and 4016 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4018 more |
13551576 11963694 13416647 11854350 13242163 15472827 13049480 15369913 15186053 11285272 12832550 14954425 12689028 14690340 12539573 14492103 12415803 14268157 10392196 13917365 13517537 11959103 13231919 15468895 11393444 12963435 12830084 ...and 4018 more |
Process Boundary Isolation Using Constrained Processes System And Method For Detecting Malicious Applications Secure And Scalable Detection Of Preselected Data Embedded In Electronic... Methods And Apparatus For Blocking Unwanted Software Downloads Method And System To Detect Dangerous File Name Extensions Preventing Inappropriate Data Transfers Based On Reputation Scores Detecting Malware Using Cost Characteristics Filtered Antivirus Scanning Preventing Uninstallation Of Applications Management Of Actions In Multiple Virtual And Non-virtual Environments Forward Application Compatible Firewall Systems And Methods For Detecting Potentially Illegitimate Wireless Acce... Systems And Methods For Using File Paths To Identify Potentially Malicio... Correlating Network Dns Data To Filter Content Systems And Methods For Enabling Users To Launch Applications Without En... Method And System For Detecting Malware Containing E-mails Based On Inco... Method And Apparatus For Accessing Computers In A Distributed Computing ... Systems And Methods For Detecting Transactional Message Sequences That A... High-accuracy Confidential Data Detection System And Method For Continuous Protection Of Working Set Data Using A ... Systems And Methods For Detecting Malware Partition Configuration and Creation Mechanisms for Network Traffic Mana... Method And Apparatus For Policy Management In A Network Device Ransomware Locked Data Decryption Through Ransomware Key Transposition Time And Space Efficient Method And System For Detecting Structured Data... System And Method For Add-on Services, Secondary Authentication, Authori... Detonate Targeted Malware Using Environment Context Information ...and 4018 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4020 more |
12436633 14305497 10741046 12371116 10448567 10206388 09768482 12059003 13558177 15994951 13246794 11645958 13073702 12980768 11292687 12842023 12696970 14717939 12542099 14510547 12217071 13925338 12058490 13533114 11960706 13405293 11834576 ...and 4020 more |
Methods And Systems For Detecting And Preventing The Spread Of Malware O... Systems And Methods For Provisioning Cyber Security Simulation Exercises Network Traffic Synchronization Mechanism Data Layer Prioritization In An Application Layered System Grouped Categorization Of Internet Content Techniques For Sensor Based Attack Reflection Method And Apparatus For Detecting Leakage Of Sensitive Information Systems And Methods For Determining Reputations Of Files Determining File Ownership Of Active And Inactive Files Based On File Ac... Detecting Stealth Network Communications Systems And Methods For Protecting Data Affected By System Changes Systems And Methods For Detecting Malware On Mobile Platforms Method And System For Scanning Network Devices Handling Computer Security Incidents Through A Unified Conversational Ag... Systems And Methods For Detecting Malware Scanning Images For Pornography Method And System Of Managing Software Conflicts In Computer System That... Using Historical Accuracy of User Decision Making to Improve Accuracy of... Method And Apparatus For Identifying Invariants To Detect Software Tampe... System And Method For Computer Security Using Multiple Cages Systems And Methods For Identifying A Secure Application When Connecting... Software Reputation Establishment And Monitoring System And Method Transparent Load Balancer For Network Connections Systems And Methods For Preventing Data Loss Via Temporary-file Generati... Systems And Methods For Preventing Exploitation Of Byte Sequences That V... Layered Computing Systems And Methods For Insecure Environments Systems And Methods For Optimizing Scans Of Pre-installed Applications ...and 4020 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4024 more |
12432652 14283824 14155792 12241369 13926064 10155936 12130767 09750836 13551231 09093533 11962888 13414408 13242118 15471836 13048866 15368542 15186023 11277429 12831998 14952716 12687233 12537378 12415329 14266585 13493876 11956960 15862589 ...and 4024 more |
Retuning Of Random Classification Forests To Improve Efficacy Systems And Methods For Detecting Power Consumption Of A Computing Devic... System And Services For Handling Computing Environments As Documents Optimizing a Malware Detection Model Using Hyperparameters Enabling Selective Policy Driven Propagation Of Configuration Elements B... Method And Apparatus For Policy Management In A Network Device Creation Of Fictitious Identities To Obfuscate Hacking Of Internal Netwo... Method And Apparatus For Elastic (re)allocation Of Enterprise Workloads ... Lockless Processing Of Command Operations In Multiprocessor Systems Systems And Methods For Identifying Users Systems And Methods For Preventing Internal Network Attacks Methods And Systems For Addressing Dns Rebinding Managing Multiple Operating Systems On A Single Computer Creating A Unification Directory That Unifies A Plurality Of File System... System And Method For Prioritizing The Compilation Of Bytecode Modules D... Application Independent Write Monitoring Method For Fast Backup And Sync... Systems And Methods For Assessing Internet Addresses Method and System For Secure Network Access Using A Virtual Machine Methods, Apparatuses And Systems For Transparently Intermediating Networ... Method And System For Adding Plug-in Functionality To Virtualized Applic... Systems And Methods For Aiding In The Elimination Of False-positive Malw... Sustaining Tcp Connections Automated Classification Of Applications For Mobile Devices Detecting Network Evasion And Misinformation Automatic Network Traffic Discovery And Classification Mechanism Includi... Dynamic Call Tracking Method Based On Cpu Interrupt Instructions To Impr... Classification Techniques For Encrypted Network Traffic ...and 4024 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4026 more |
14666337 12510828 14231617 10640351 12338587 13902194 10060416 13473182 15452883 13341202 15270733 11536206 12940835 12581302 10941527 12495321 14459687 14219573 10612198 14038552 12165467 13886859 10012138 29297799 13677914 09451632 15694380 ...and 4026 more |
Graph Buffering Techniques For Classifying Non-process Threats Evaluating Relying Parties Strong Authentication Via A Federated Identity Protocol Lockless Bandwidth Management For Multiprocessor Networking Devices Systems And Methods For Facilitating Negotiation And Exchange Of Informa... Identifying Trojanized Applications for Mobile Environments Methods And Systems For Automatically Discovering Information About A Do... Bringing A Non-isolated Application Into An Isolation Layer With An Isol... Endpoint Management Using Trust Rating Data Monitoring Application Behavior By Detecting File Access Category Change... Application Identification And Control In A Network Device Transparent Garbage Collection Of Resources Systems And Methods For Determining That Uniform Resource Locators Are M... Method And Apparatus Of Network Artifact Indentification And Extraction Dual Axis Raid System For Enhanced Bandwidth And Reliability Systems And Methods For Managing Web Browser Histories Method And Apparatus For Preventing Data Leakage Faciliated By Steganogr... Efficient Scanning Of Stream Based Data Automated Separation Of Corporate And Private Data For Backup And Archiv... Enabling Efficient Use Of An Endpoint Exception Handling Validation System And Method Discovery And Classification Of Enterprise Assets Via Host Characteristi... Methods And Systems For Activating And Deactivating Virtualization Layer... System And Method For Controlling Distribution Of Network Communications Systems And Methods For Thwarting Illegitimate Initialization Attempts System And Method For Reducing Data Loss Prevention Scans ...and 4026 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4028 more |
10782396 12397009 12269173 13967963 12147761 13291716 15391495 11479270 13017028 11324573 12881258 11176590 12710324 14822927 11048033 14567440 12470213 14315312 10757742 12393957 14190430 10459870 12141440 09827742 13619978 09189559 11984093 ...and 4028 more |
Detecting Application Leaks Method And Apparatus For Restricting Access To Encrypted Data Methods And Systems For Obtaining Url Filtering Information Runtime Malware Detection Method, System, And Computer Readable Medium For Remote Assistance, Supp... Installer Trust Chain Validation System And Method For Service Assisted Mobile Pairing Of Password-less C... System And Method For Building Intelligent And Distributed L2 - L7 Unifi... Method and apparatus for securing confidential data for a user in a comp... Injecting Supplemental Data Into Data Queries At Network End-points Confidence Level Threshold Selection Assistance For A Data Loss Preventi... Method And Apparatus For Aggregating Notices And Alerts Into An Aggregat... Hair Clip System And Method For Tokenization Of Data For Storage In A Cloud Method For Implementing Ejection-safe Api Interception Method For Real Time Protocol Media Recording Language Detection To Improve Efficiency Of Content Scanning Engine In D... Simulating Pxe Booting For Virtualized Machines Streaming Media Bitrate Switching Methods And Apparatus Using Bit Arrays In Incremental Scanning Of Content For Sensitive Data Calculating Domain Registrar Reputation by Analysis of Hosted Domains Enforcement Of Compliance With Network Security Policies Systems And Methods For Performing Customized Large-scale Data Analytics Detecting Man-in-the-middle Attacks Via Security Transitions Personal computing device -based mechanism to detect preselected data Systems And Methods For Obscuring Network Services Filtering Malware Related Content ...and 4028 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4032 more |
13869740 13661637 13450879 11729398 11496852 15253502 11344787 12885298 11186133 14835016 14581341 14330842 10775537 12268253 13952490 13843664 12020954 13289998 11694703 13098268 15387887 11324571 12879831 12707970 14791022 11047381 12557219 ...and 4032 more |
Proactively Analyzing Binary Files From Suspicious Sources Method For Real Time Protocol Media Recording Systems And Methods For Completing Multi-factor Authentication Via Mobil... Method And System For Employing User Input For File Classification And M... Method and apparatus for allowing sharing of streamable applications Pre-calculating And Updating Data Loss Prevention (dlp) Policies Prior T... Decision Tree Induction That Is Sensitive To Attribute Computational Com... Method And Apparatus To Hook Shared Libraries Across All Processes On Wi... Techniques For Application Code Obfuscation Systems And Methods For Configuring Information Displayed On A Screen Sample-specific Sandbox Configuration Based On Endpoint Telemetry System And Method For Dynamically Identifying Internal Hosts In A Hetero... Systems And Methods For Automated Classification Of Application Network ... Detecting And Remediating Malware Dropped By Files Systems And Methods For Managing Illegitimate Authentication Attemps Redundancy Management Service For Peer-to-peer Networks Systems And Methods For Detecting Malicious Processes That Encrypt Files Techniques for Managing Search Engine Results Method And System For Running An Application In A Clean Operating Enviro... Systems And Methods For Enforcing Geolocation-based Policies Pre-emptive Application Blocking For Updates Methods And Systems For Authenticating Devices Selective Detection Of Malicious Computer Code Protecting User Identity At A Cloud Using A Distributed User Identity Sy... Code Module Operating System (os) Interactions Intercepting System And M... Multi-tiered Incremental Software Updating Methods And Systems For Secure Storage Segmentation Based On Security Co... ...and 4032 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4036 more |
12559990 10782751 12399114 14205316 13974440 12147939 12024079 13449508 13291773 15632280 15391556 11479371 11324607 12881800 12713606 14822930 11049478 14569101 12470312 14315321 10763731 12395039 14190471 09841700 13626738 11862990 15384343 ...and 4036 more |
Method Using Kernel Mode Assistance For The Detection And Removal Of Thr... System And Method For Hierarchical And Chained Internet Security Analysi... Method, System, And Computer Readable Medium For Gathering Usage Statist... Method, System, And Computer Program Product For Blocking Malicious Prog... Structured Text and Pattern Matching for Data Loss Prevention in Object-... Behavioral Classification of Network Data Flows Identifying An Application User As A Source Of Database Activity Adding Supplemental Data To A Security-related Query Incremental Machine Learning For Data Loss Prevention Method And Apparatus For Efficient Token Matching Using Complex Rules Trailer Trestle Systems And Methods For Monitoring Application Resource Usage On Mobile ... Simulated Computer System For Monitoring Of Software Performance Providing Disk Layout Information To An Operating System For Booting Aft... Systems And Methods For Managing Registration And Discovery Of Uri Schem... Use Of External Information About A File To Determine Virtualization Method For Automatically Classifying Traffic In A Pocket Communications ... Systems And Methods For Replacing Application Methods At Runtime Server Side Verification Of Digital Signatures In Streaming Environments Automatic Server Configuration Using A Storage Configuration Database Systems And Methods For Determining Trustworthiness Of Software Programs Methods And Systems For Handling Component-object-model Communications Personal Computing Device -based Mechanism To Detect Preselected Data System And Method For Implementing Traffic Optimization For Overlay Netw... Methods And Systems For Converting Non-layered-software-application Inst... Behavior Profiling System For The Distribution And Deployment Of Applications, With Provisi... ...and 4036 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4040 more |
12512906 14479205 12198046 12047567 13483835 15787104 11770384 15462390 11538196 15273209 11386573 11234478 11091790 14645452 10978051 12495621 10815405 14221267 14041826 13895658 12079647 12044361 13463664 29159439 11865039 15706612 13187307 ...and 4040 more |
Systems And Methods For Determining Security Risk Profiles Systems And Methods For Gesture-based Distribution Of Files Relevance Ranking In A Computer System Systems And Methods For Reducing Infection Risk Of Computing Systems Systems And Methods For Using Virtualization Of Operating-system-level C... Previewing File Information Over A Network Systems And Methods For Efficiently Matching Files System For The Distribution And Deployment Of Applications With Provisio... System And Method Of Delaying Connection Acceptance To Support Connectio... Http Proxy Authentication Using Custom Headers Automatic Reset For Time-based Credentials On A Mobile Device Evaluating The Predictability Of A Pass Phrase Systems And Methods For Dynamically Modifying Rules For Selecting Suitab... Application Streaming And Network File System Optimization Via Feature P... System And Method For Business Systems Transactions And Infrastructure M... Identifying Application Sources On Non-rooted Devices Method And Apparatus For Identifying Domain Name Abuse Method And Apparatus For Policy Management In A Network Device Method And System For Detecting And Protecting Against Potential Data Lo... Systems And Methods, Apparatus, And Computer Readable Media For Intercep... Safe Memory Scanning Systems And Methods For Detecting Suspicious Files Adaptive Data Loss Prevention Policies Dynamic Bandwidth Management Responsive To Access Link State In Redundan... Systems And Methods For Protecting Files From Malicious Encryption Attem... Enforcing Digital Rights Management In A Heterogeneous Environment Method And Apparatus For Filtering Email Spam Using Email Noise Reductio... ...and 4038 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4042 more |
12436633 14305497 10741046 12371116 10448567 10206388 09768482 12059003 13558177 15985441 13246794 11645958 13073702 12980768 11292687 12842023 12696970 14717939 12542099 14510547 12217071 13925338 12058490 13533114 11960706 13405293 11834576 ...and 4042 more |
Data Layer Prioritization In An Application Layered System Grouped Categorization Of Internet Content Techniques For Sensor Based Attack Reflection Method And Apparatus For Detecting Leakage Of Sensitive Information Systems And Methods For Determining Reputations Of Files Determining File Ownership Of Active And Inactive Files Based On File Ac... Detecting Stealth Network Communications Systems And Methods For Protecting Data Affected By System Changes Systems And Methods For Detecting Malware On Mobile Platforms Method And System For Scanning Network Devices Systems And Methods For Identifying Users Systems And Methods For Detecting Malware Scanning Images For Pornography Method And System Of Managing Software Conflicts In Computer System That... Using Historical Accuracy of User Decision Making to Improve Accuracy of... Method And Apparatus For Identifying Invariants To Detect Software Tampe... System And Method For Computer Security Using Multiple Cages Systems And Methods For Identifying A Secure Application When Connecting... Software Reputation Establishment And Monitoring System And Method Transparent Load Balancer For Network Connections Systems And Methods For Preventing Data Loss Via Temporary-file Generati... Systems And Methods For Preventing Exploitation Of Byte Sequences That V... Layered Computing Systems And Methods For Insecure Environments Systems And Methods For Optimizing Scans Of Pre-installed Applications Software Update Checking Method Proactive Prevention Of Polymorphic Smtp Worms Systems And Methods For Identifying Variants Of Samples Based On Similar... ...and 4041 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4056 more |
10902229 12263739 13944275 10252061 13834311 12059458 13422702 16018044 13282709 15615070 11685534 11477231 12854153 11171249 14538599 14301949 10722949 14168659 10431145 13930339 10173503 13787757 12058927 13556401 11966005 15940787 11860060 ...and 4056 more |
The detection of malware using time spans and periods of activity for ne... Systems and Methods for Using Reputation Information to Evaluate the Tru... Path Variablizing Layered System Systems And Methods For Determining Security Reputations Of Wireless Net... System And Method For Distributing Heuristics To Network Intermediary De... A System Analyzing Configuration Fingerprints Of Network Nodes For Grant... Systems And Methods For Classifying Files As Specific Types Of Malware Method And Apparatus For Multi-tenant Policy Management In A Network Dev... Data and Control Plane Architecture for Network Application Traffic Mana... Automatically Detecting Insider Threats Using User Collaboration Pattern... Systems And Methods For Managing Data Loss Prevention Policies For Appli... System And Method For Controlling Distribution Of Network Communications Systems And Methods For Preventing Data Loss From Data Containers Systems And Methods For Determining Authorship Of An Unclassified Notifi... Method And System For Enhancing Ms Exchange (mapi) End User Experiences ... Internet Over Satellite System User Associated Geo-location Based Reauthorization To Protect Confidenti... Methods And Systems For Enforcing Network Access Control In A Virtual En... Unified Permissions Control For Remotely And Locally Stored Files Whose ... Service Assisted Reliable Transaction Signing Methods And Systems For Computing Device Remediation Selective Detection Of Malicious Computer Code Preventing The Loss Of Sensitive Data Synchronized With A Mobile Device Systems And Methods For Maintaining File-type Information Method Of And System For Heuristically Detecting Viruses In Executable C... Application Malware Filtering For Advertising Networks Methods And Systems For Merging Virtualization Sublayers ...and 4054 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4058 more |
10872832 14176265 12256838 12131702 13794513 09134883 13420492 11860686 15488696 15374624 15188950 14960073 11027489 12421479 14269145 10712396 12354645 14142446 12130306 13770032 13048784 11396070 12967411 11271327 11121556 14675611 14486424 ...and 4058 more |
Network Traffic Scanning Of Encrypted Data Network Traffic Synchronization Mechanism Assessing Risk Based On Offline Activity History Grouped Categorization Of Internet Content Processing Data Flows With A Data Flow Processor Method And Apparatus For Detecting Leakage Of Sensitive Information Controlling Encrypted Traffic Flows Using Out-of-path Analysis Devices Determining File Ownership Of Active And Inactive Files Based On File Ac... Detecting Stealth Network Communications Systems And Methods For Protecting Data Affected By System Changes Systems And Methods For Detecting Malware On Mobile Platforms Method And Apparatus For Identifying A Web Server Systems And Methods For Identifying Users Systems And Methods For Detecting Malware Scanning Images For Pornography Method And System Of Managing Software Conflicts In Computer System That... Systems And Methods For Identifying Malware Method And Apparatus For Identifying Invariants To Detect Software Tampe... Dynamic Port Management Systems And Methods For Identifying A Secure Application When Connecting... Software Reputation Establishment And Monitoring System And Method Transparent Load Balancer For Network Connections Systems And Methods For Preventing Data Loss Via Temporary-file Generati... Systems And Methods For Preventing Exploitation Of Byte Sequences That V... Layered Computing Systems And Methods For Insecure Environments Systems And Methods For Customizing User Icons Identifying Originators Of Malware ...and 4057 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4065 more |
12550880 14535733 10720329 10431010 10162732 13787747 09751105 12058896 09127249 15940589 11644511 11135833 11026520 10850466 10684979 12350902 10113394 13756298 09724337 12057809 13364462 11824004 11614758 13048413 15167670 11264117 12533857 ...and 4065 more |
Dynamic Replacement Of System Call Tables Dynamically Ranking And Presentation Of Endpoints Based On Age Of Sympto... Method And Apparatus To Report Policy Violations In Messages Network Object Cache Engine Activating Malicious Actions Within Electronic Documents Partition Configuration and Creation Mechanisms for Network Traffic Mana... Method And System For Policy-based Protection Of Application Data Ransomware Locked Data Decryption Through Ransomware Key Transposition Time And Space Efficient Method And System For Detecting Structured Data... System And Method For Add-on Services, Secondary Authentication, Authori... Systems And Methods For Tuning Application Network Behavior Systems And Methods For Efficiently Deploying Updates Within A Cryptogra... Methods And Systems For Filtering Encrypted Traffic System And Methodology For Messaging Server-based Management And Enforce... Systems And Methods For Using Property Tables To Perform Non-iterative M... System And Method For Detecting Content Similarity Within Email Document... Application Independent Write Monitoring Method For Fast Backup And Sync... Systems And Methods For Secure Third-party Data Storage Method For Secure System Shutdown Secure and scalable detection of preselected data embedded in electronic... Identifying Misuse Of Legitimate Objects Data Loss Protection Through Application Data Access Classification Tcp Connection Migration User Interface And Workflow For Performing Machine Learning Systems And Methods For Protecting Enterprise Rights Management Keys Monitoring And Controlling Services Systems And Methods For Detecting Suspicious Applications Based On How E... ...and 4064 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4067 more |
13543730 09067655 13412588 15935600 13240959 15471593 11636713 13048810 15365507 15185104 12831004 14952410 12687071 12414478 14266518 12128490 13754810 29266981 11956172 15842095 11809419 13227151 11565494 13048336 11391979 14938874 11096310 ...and 4067 more |
Graduated Enforcement of Restrictions According to an Application's Repu... In Memory Heuristic System And Method For Detecting Viruses Systems And Methods For Multicast Streaming Analysis Systems And Methods For Evaluating The Performance Of Remote Computing S... Vulnerability Assessment Of Disk Images Systems And Methods For Secure Hybrid Third-party Data Storage Systems And Methods For Providing Adaptive Views Of Domain Name System R... Network Traffic Synchronization And Data Compression In Redundant Networ... Systems And Methods For Blocking Push Authentication Spam Systems And Methods For Using Reputation Data To Detect Packed Malware Adaptive Correlation Of Service Level Agreement And Network Application ... Protecting User Identity At A Cloud Using A Distributed User Identity Sy... Systems and Methods for Sharing the Results of Computing Operations Amon... Enhanced Qos Solution For Thin Client Or Remote Access Sessions Techniques For Classifying And Labeling Data Systems and Methods for Merging Virtual Layers System And Method For Efficiently Forwarding Client Requests In A Tcp/ip... Systems And Methods For Classifying Files Applications Processing In A Network Apparatus Endpoint Management Using Trust Rating Data Systems And Methods For Securing Computing Devices That Are Not In Users... Enabling Selective Policy Driven Propagation of Configuration Elements B... System And Method Of Controlling Data Center Resources For Management Of... Systems And Methods For Identifying Suspicious Controller Area Network M... User Account Level Anti-malware Exclusions Lockless Processing Of Command Operations In Multiprocessor Systems Systems And Methods For Server Load Control ...and 4066 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4069 more |
12430675 14274557 10412708 12240711 13926050 10154070 12130616 12058782 13543730 09067655 13412588 15935600 13240959 15471593 11636713 13048810 15365507 15185104 12831004 14952410 12687071 12414478 14266518 12128490 13754810 29165309 11956172 ...and 4069 more |
Systems And Methods For Classifying Files Applications Processing In A Network Apparatus Endpoint Management Using Trust Rating Data Systems And Methods For Securing Computing Devices That Are Not In Users... Enabling Selective Policy Driven Propagation of Configuration Elements B... System And Method Of Controlling Data Center Resources For Management Of... Systems And Methods For Identifying Suspicious Controller Area Network M... User Account Level Anti-malware Exclusions Lockless Processing Of Command Operations In Multiprocessor Systems Systems And Methods For Server Load Control Systems And Methods For Protecting Platform-as-a-service Platforms Systems And Methods For Identifying External Functions Called By Untrust... Boot Failure Recovery Systems And Methods For Content-aware Access Control System And Method For Prioritizing The Compilation Of Bytecode Modules D... Method And System For Describing And Extracting Application Information Systems And Methods For Predicting Optimum Run Times For Software Sample... Method And Apparatus For Using Expiration Information To Improve Confide... Multiple Cache Communication And Uncacheable Objects Systems And Methods For Protecting User Accounts Detecting Network Interface Card Level Malware A System Utilizing Updated Spam Signatures For Performing Secondary Sign... Systems And Methods For Scanning Packed Programs In Response To Detectin... Behavioral Detection Based On Uninstaller Modification Or Removal Computer Communications Monitor Dynamic Call Tracking Method Based On Cpu Interrupt Instructions To Impr... Classification Techniques For Encrypted Network Traffic ...and 4068 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4071 more |
14462833 12408950 12335890 13895478 16362369 13336435 11743029 15263398 11075515 14614271 12403321 12274958 12163747 12026475 13298032 11728616 13103794 15395898 11480315 13020406 12882882 14834474 11051883 14570393 14328274 10765770 12395554 ...and 4071 more |
Apparatus And Method For Identity-based Encryption Within A Conventional... Optimizing Data Loss Prevention Performance During File Transfer Operati... Hypervisor Assisted Single Instance Data Access By Multiple Virtual Mach... Client-side Extensions For Use In Connection With Http Proxy Policy Enfo... Systems And Methods For Determining Whether Malicious Files Are Targeted User Interface And Workflow For Performing Machine Learning Rogue Wireless Access Point Detection Systems And Methods For Determining Reputations Of Digital Certificate S... Systems And Methods For Generating Machine Learning-based Classifiers Fo... Control Flow Redirection And Analysis For Detecting Vulnerability Exploi... Identifying and Blocking Overlay Phishing Embedded Security Blades For Cloud Service Providers Systems And Methods For Processing Data Flows Securely Sharing A Transport Layer Security Session With One Or More Tru... Systems and Methods for Providing Guidance on the Potential Impact of Ap... Detecting File System Layout Discrepancies Network Address Translation Gateway For Local Area Networks Using Local ... Methods And Systems For Handling Component-object-model Communications Packet Load Shedding Live Stream Archiving Method And Apparatus Protecting Cryptographic Secrets Using File System Attributes Slow-start Adaptive Mechanisms To Improve Efficiency Of Bandwidth Alloca... Network Risk Analysis Systems And Methods For Using Reputation Information To Evaluate The Tru... Method And Apparatus For Monitoring A Computer To Detect Operating Syste... Detecting And Blocking Drive Sharing Worms Role-based Access Control Using Dynamically Shared Cloud Accounts ...and 4070 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4091 more |
13645307 09233860 16022784 11863567 11478786 15231692 14991730 10892615 10754318 14184581 10459213 13800305 09794094 13599830 15994951 13249108 15608769 12844738 11153892 12699183 14732811 11030390 12549689 14527499 10864109 10718375 12363696 ...and 4091 more |
Virtual Machine File System Restriction System And Method System And Method For Secure Electronic Communication In A Partially Key... Systems And Methods For Preventing False Positive Malware Identification Selective Removal Of Protected Content From Web Requests Sent To An Inte... Method And System For Detecting Changes In Computer Files And Settings A... Selective Removal Of Protected Content From Web Requests Sent To An Inte... Capture And Regeneration Of A Network Data Using A Virtual Software Swit... Cache Scanning System And Method Systems And Methods For Identifying Malware Systems And Methods For End-user Initiated Data-loss-prevention Content ... Virtual Endpoint Systems And Methods For Determining That Files Found On Client Devices C... Method And System For Identification Of Data Owner In An Unstructured Da... Filtering Training Data For Machine Learning Systems And Methods For Automated Generation Of Generic Signatures Used ... Detecting Malware Signed with Multiple Credentials Authenticated Communication Using A Shared Unpredictable Secret Systems And Methods To Enable Automatic Password Management In A Proximi... Method, System, And Computer Readable Medium For Provisioning And Remote... Behavior Based Processing Of A New Version Or Variant Of A Previously Ch... System And Method Of Traffic Inspection And Stateful Connection Forwardi... Preventing Inappropriate Data Transfers Based on Reputation Scores Method And Apparatus For Administering Mobile Client Devices Across Loca... Artificial Intelligence (ai) Techniques For Learning And Modeling Intern... Systems And Methods For Maintaining Location-aware Virtualization Layers Threat Emergence Date Scan Optimization To Avoid Unnecessary Loading Of ... Detecting And Protecting Against Computing Breaches Based On Lateral Mov... ...and 4090 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4095 more |
13666770 09429217 13457152 16147051 11864955 11739361 13168929 13027053 15059326 12752880 14588146 10928687 14337955 12270043 13856229 12059764 09283677 16112111 11864348 11711094 13018076 15041040 11177775 12558356 10902690 10459936 12264101 ...and 4095 more |
Methods And Systems For Handling Component-object-model Communications Signature Extraction System And Method System And Method For Implementing Traffic Optimization For Overlay Netw... Communication-based Reputation System Method And Apparatus To Detect And Recover From A Stack Frame Corruption System For The Distribution And Deployment Of Applications, With Provisi... Hygiene-based Discovery Of Exploited Portals Methods, Apparatuses And Systems Facilitating Classification Of Web Serv... Systems And Methods For Remediating The Effects Of Malware Systems And Methods For Detecting A Process To Establish A Backdoor Conn... Intrustion Protection System Utilizing Layers And Triggers Systems And Methods For Preventing The Execution Of Online Malvertising Systems And Methods For Reputation-based Application Of Data-loss Preven... Ssl Validation And Stripping Using Trustworthiness Factors Proactive Protection Of Mobile Operating System Malware Via Blocking Of ... Real-time Access Of Opportunistically Locked Files Without Breaking Oppo... Barricading a computer system when installing or migrating software Systems And Methods For Controlling Access To Credentials Partial Risk Score Calculation For A Data Object Method And System For Creating And Executing Generic Software Packages Behavioral Analysis Of Scripting Utility Usage In An Enterprise Systems And Methods For Identifying The Spreading Of Sensitive Data By A... System And Method For Distributed Ssl Processing Between Co-operating No... Systems And Methods For Securing Push Authentications Techniques For Providing Role-based Access Control Using Dynamic Shared ... Methods And Systems For Creating And Updating Approved-file And Trusted-... Discovery Of Computer System Incidents To Be Remediated Based On Correla... ...and 4093 more |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Trademark |
6018153 |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Application |
88592328 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78329139 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3309758 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78885741 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
4486898 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
85355876 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3294596 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
86441858 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4273070 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
85428609 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4759918 |
|
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Application |
73471191 |
 |
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Trademark |
1355047 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Trademark |
4759918 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Application |
86441858 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86697834 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76077730 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86354568 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86141424 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76358837 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85918617 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456898 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
78424526 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85144826 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982041 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3953936 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2460389 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2638737 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3461082 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5099925 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1914615 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2383995 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5268716 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1654777 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5206150 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
4527953 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85079904 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75797459 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76247818 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
77293710 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
87015542 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
74467812 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75550401 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86681257 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
73815903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982040 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85863409 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2508404 |
|
|
|
Incoming Payments
Outgoing Payments
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/4/2008 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
4/2/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
3/30/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
10/2/2006 |
Democratic Governors Association |
Donation |
Cash |
$50,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
| Total |
|
|
|
$250,750.00 |
|
|
|