C, A, Inc.
United States C Corporation
 |
No tags have been applied so far. Sign in to add some. |
|
|
![[Unknown]](https://s.thinklink.com/images/nophotommb.gif) |
|
|
|
|
[Unknown]
successor By Merger To Computer Associates Think, Inc.
|
|
|
|
|
Go Pro to view an analysis and graphs of case roles, types and more.
|
|
7/14/2021 |
Superior Court of California, County of Santa Clara |
21CV384293 |
De Carolis v. Broadcom Corporation |
Defendant |
|
|
|
8/9/2018 |
Delaware District Court |
1:18-cv-01221 |
Gusinsky v. CA, Inc. |
Defendant |
|
|
|
8/3/2018 |
New York Southern District Court |
1:18-cv-06996 |
Harvey v. CA, Inc. |
Defendant |
|
|
|
10/25/2017 |
USPTO Trademark Trial and Appeal Board |
91237448-OPP |
Ca, Inc. v. Next Level Solutions, LLC |
Plaintiff |
|
|
|
8/7/2017 |
Superior Court of California, County of Santa Clara |
17CV314099 |
Araceli Zarate v. CA, Inc |
Defendant |
|
|
|
7/26/2017 |
USPTO Trademark Trial and Appeal Board |
87304847-EXT |
Ca, Inc. v. Next Level Solutions, Llc |
Potential Opposer |
|
|
|
2/27/2017 |
USPTO Trademark Trial and Appeal Board |
91233108-OPP |
Ca, Inc. v. Ca Plus Limited |
Plaintiff |
|
|
|
10/3/2016 |
USPTO Trademark Trial and Appeal Board |
86870982-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
9/28/2016 |
USPTO Trademark Trial and Appeal Board |
86870987-EXT |
Ca, Inc. v. Ca Plus Limited |
Potential Opposer |
|
|
|
6/5/2015 |
Delaware Court of Chancery |
11109-VCL |
Hyer, John vs Rally Software Development Corp |
Defendant |
|
|
|
9/10/2014 |
Delaware District Court |
1:14-cv-01175 |
Clouding Corp. v. CA Inc. d/b/a/ CA Technologies |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Defendant |
|
|
|
4/28/2014 |
California Northern District Court |
3:14-cv-01945 |
AppDynamics, Inc. et al v. CA, Inc. |
Counter-claimant |
|
|
|
3/27/2014 |
Superior Court of California, County of San Francisco |
CGC 14 538305 |
Appdynamics Inc. et al v. Ca, Inc. |
Defendant |
|
|
|
11/22/2013 |
California Northern District Court |
5:13-cv-05430-EJD |
Bay Area Surgical Group Inc. et al v. Aetna Life Insurance C... |
Defendant |
|
|
|
6/27/2013 |
Arizona District Court |
2:13-cv-01287 |
Clancy v. CA Incorporated |
Defendant |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Plaintiff |
|
|
|
4/10/2013 |
New York Eastern District Court |
2:13-cv-02111 |
CA, Inc. v. AppDynamics, Inc. |
Counter-Defendant |
|
|
|
11/5/2012 |
New York Eastern District Court |
2:12-cv-05468 |
CA, Inc. v. New Relic, Inc. |
Plaintiff |
|
|
|
6/20/2012 |
Texas Eastern District Court |
2:12-cv-00360 |
InNova Patent Licensing, LLC v. CA, Inc. |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Defendant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Claimant |
|
|
|
6/15/2012 |
Oregon District Court |
3:12-cv-01066 |
Tranxition, Inc. v. Total Defense, Inc. et al |
Counter-Defendant |
|
|
|
4/18/2012 |
California Northern District Court |
5:12-cv-01940-LHK |
Softvault Systems, Inc. v. CA, Inc. |
Defendant |
|
|
|
4/9/2012 |
California Northern District Court |
4:12-cv-01746 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
12/23/2011 |
California Northern District Court |
3:11-cv-06638-RS |
Vasudevan Software, Inc. v. TIBCO Software, Inc. et al |
Interested Party |
|
|
|
11/3/2011 |
Superior Court of California, County of Los Angeles |
BC472854 |
Ca Inc v. Taycor Llc |
Plaintiff/Petitioner |
|
|
|
9/12/2011 |
Missouri Eastern District Court |
4:11-cv-01579 |
Compression Technology Solutions LLC v. CA, Inc. et al |
Defendant |
|
|
|
6/16/2011 |
Oregon District Court |
3:11-cv-00724 |
Fog Cap Acceptance, Inc. et al v. Verizon Business Network S... |
Defendant |
|
|
|
1/18/2011 |
Superior Court of California, County of Los Angeles |
BC453147 |
Charles Matheny v. Ca Inc et al |
Defendant/Respondent |
|
|
|
12/16/2010 |
Delaware Court of Chancery |
6078-VCL |
Wang, Charles B vs CA Inc |
Defendant |
|
|
|
9/14/2010 |
Texas Eastern District Court |
6:10-cv-00472 |
Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al |
Defendant |
|
|
|
5/5/2010 |
Superior Court of California, County of San Francisco |
CGC 10 499524 |
Lisa Marie Perri v. Ca, Inc. et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Defendant |
|
|
|
4/29/2010 |
Texas Eastern District Court |
6:10-cv-00225 |
Stragent, LLC et al v. Amazon.Com, Inc., et al |
Counter Claimant |
|
|
|
11/3/2009 |
Superior Court of California, County of Los Angeles |
BC425309 |
Ca Inc v. The Bedford Group |
Plaintiff/Petitioner |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC 09 493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Cross-Complainant |
|
|
|
10/7/2009 |
Superior Court of California, County of San Francisco |
CGC 09 493239 |
Pru/sks Brannan Associates LLC, v. Ca, Inc. A Delaware Corpo... |
Defendant |
|
|
|
9/23/2009 |
Delaware Court of Chancery |
4912-CS |
9/7/2011 CONF ORD ON DISC Sage Software Inc vs C A Inc |
Defendant |
|
|
|
8/24/2009 |
District Of Columbia District Court |
1:09-cv-01600 |
SHEMESH v. CA, INC. |
Defendant |
|
|
|
8/13/2009 |
New York Eastern District Court |
1:09-cv-03517 |
Ingres Corporation v. Xing, SA et al |
Third Party Defendant |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509379 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509380 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
4/8/2009 |
Superior Court of California, County of San Francisco |
CPF 09 509381 |
In Re: Ca, Inc. |
Petitioner |
|
|
|
3/31/2009 |
Delaware Court of Chancery |
4467-VCS |
1/31/2011 Electronic Data Systems LLC vs CA Inc et al |
Defendant |
|
|
|
1/20/2009 |
Delaware Court of Chancery |
4300-VCS |
12/17/2010 CONF ORDER C A Inc vs Ingres Corp |
Plaintiff |
|
|
|
12/30/2008 |
Texas Eastern District Court |
2:08-cv-00484 |
Information Protection and Authentication of Texas, LLC v. S... |
Counter-Claimant |
|
|
|
11/25/2008 |
Delaware Court of Chancery |
4195-CC |
02/18/10 CONF ORDER Cordrey, Richard S et al vs CA Inc |
Plaintiff |
|
|
|
10/22/2008 |
Delaware Court of Chancery |
4111-CC |
02/18/10 CONF ORDER C A Inc vs Richard S Cordrey et al |
Plaintiff |
|
|
|
8/6/2008 |
New York Eastern District Court |
2:08-cv-03191 |
CA, Inc. v. Xing et al |
Plaintiff |
|
|
Inside Counsel (3)
Go Pro to view corporate inside counsel.
Outside Counsel (147)
|
|
Vancott |
: |
Fabian |
Ca Technologies |
Salt Lake City, UT |
|
|
|
Love |
Adanna |
M. |
Holland & Knight, LLP |
San Francisco, CA |
|
|
|
Ip |
Adsero |
|
|
Littleton, CO |
|
|
|
H. |
Alan |
W. |
Crowell & Moring LLP |
Washington, DC |
|
|
|
Albright |
Alan |
D. |
Bracewell LLP |
Austin, TX |
|
|
|
Wright |
Alexandra |
Grace |
Cozen O'Connor, PC |
Chicago, IL |
|
|
|
Atkins |
Alexis |
|
|
Dallas, TX |
|
|
|
Robinson |
Anne |
Wylde |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Wermuth |
Anneliese |
|
Cozen O'Connor, PC |
Chicago, IL |
|
|
|
Dal |
Anthony |
J. |
Samuels Yoelin Kantor Seymour & Spinrad, LLP |
Portland, OR |
|
|
|
Docketing |
Attention |
IP |
Womble Carlyle Sandridge & Rice, LLP |
ATLANTA, GA |
|
|
|
DRINKWATER |
B.K. |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Vancott |
Bagley |
:. |
Ca Technologies |
Salt Lake City, UT |
|
|
|
Shelton |
Barry |
K. |
Bracewell LLP |
Austin, TX |
|
|
|
Shelton |
Barry |
Kenneth |
Pillsbury Winthrop Shaw Pittman LLP |
Austin, TX |
|
|
|
Stern |
Benjamin |
M. |
Debevoise & Plimpton LLP |
|
|
|
|
Enerson |
Benjamin |
D. |
Holland & Knight, LLP |
|
|
|
|
Stern |
Benjamin |
M. |
Holland & Knight, LLP |
Boston, MA |
|
|
|
Sorrels |
Bradley |
D. |
Wilson Sonsini Goodrich & Rosati, PC |
Wilmington, DE |
|
|
|
Williams |
Bradley |
Paul |
Baker Botts, LLP |
Dallas, TX |
|
|
|
Williams. |
Bradley |
P. |
|
DALLAS, TX |
|
|
|
Erickson |
Brian |
K. |
DLA Piper (US) LLP |
AUSTIN, TX |
|
|
|
Tompkins |
Brian |
H. |
Bracewell LLP |
Austin, TX |
|
|
|
Beck |
Brian |
Joel |
Holland & Knight, LLP |
Chicago, IL |
|
|
|
|
BROADCOM |
|
FisherBroyles, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FISHER BROYLES, LLP |
SALT LAKE CITY, UT |
|
|
|
|
BROADCOM |
|
FOLEY & LARDNER LLP |
Washington, DC |
|
|
|
Ericson |
Bruce |
A. |
Pillsbury Winthrop Shaw Pittman LLP |
San Francisco, CA |
|
|
|
MAGEN. |
BURT |
|
|
San Francisco, CA |
|
|
|
|
CA |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
TECHNOLOGIES |
CA |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Riggs |
Candi |
L. |
|
Raleigh, NC |
|
|
|
Haynes |
Christine |
Dealy |
Richards, Layton & Finger, PA |
Wilmington, DE |
|
|
|
Mckenna |
Christopher |
J. |
Foley & Lardner, LLP |
Boston, MA |
|
|
|
Mckenna |
Christopher |
J. |
FOLEY & LARDNER LLP |
BOSTON, MA |
|
|
|
Civins |
Conor |
Monroe |
Bracewell LLP |
Austin, TX |
|
|
|
Civins |
Conor |
Monroe |
Pillsbury Winthrop Shaw Pittman LLP |
Austin, TX |
|
|
|
Chase |
Crystal |
S. |
Stoel Rives, LLP |
Portland, OR |
|
|
|
Scheffel |
David |
A. |
Allen Matkins Leck Gamble Mallory & Natsis L... |
Uniondale, NY |
|
|
|
Robins |
David |
A. |
Lipman & Plesur, LLP |
Jericho, NY |
|
|
|
Healey |
David |
J. |
Goldstein, Faucett & Preberg, LLP |
|
|
|
|
Ball |
David |
John |
Bracewell LLP |
New York, NY |
|
|
|
Hazelton |
David |
Rex |
Latham & Watkins LLP |
|
|
|
|
Teklits |
David |
John |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
D'zurilla |
David |
|
Schwegman, Lundberg & Woessner, PA |
Minneapolis, MN |
|
|
|
Cromer |
David |
E. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Purks |
David |
K. |
|
RESEARCH TRIANGLE PARK, NC |
|
|
|
Purks |
David |
K. |
SAGE PATENT GROUP |
RALEIGH, NC |
|
|
|
Rambin |
Daymon |
Jeffrey |
Capshaw DeRieux, LLP |
Gladewater, TX |
|
|
|
Baxtresser |
Dean |
W. |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Gonzales |
Della |
L. |
|
ROCKWALL, TX |
|
|
|
Gonzales |
Della |
L. |
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Gonzalez |
Della |
|
Alliance Ip, Llc |
PHOENIX, AZ |
|
|
|
Kelly |
Don |
V. |
Gallop, Johnson & Neuman, L.C. |
St Louis, MO |
|
|
|
DeRieux |
Elizabeth |
L. |
Capshaw DeRieux, LLP |
Longview, TX |
|
|
|
RUCKI |
ELIZABETH |
|
Baker Botts, LLP |
Dallas, TX |
|
|
|
Rucki |
Elizabeth |
K. |
cyberassure.net Law Firm Placeholder |
DALLAS, TX |
|
|
|
Rucki |
Elizabeth |
K. |
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Rucki |
Elizabeth |
K. |
decent.ch Law Firm Placeholder |
Dallas, TX |
|
|
|
ENDRES |
GAYLE |
|
Myers Bigel Sibley & Sajovec, PA |
|
|
|
|
Caplan |
George |
T. |
Epstein Becker & Green, PC |
Los Angeles, CA |
|
|
|
Schultz |
George |
R. |
|
Dallas, TX |
|
|
|
Gimlan |
Gideon |
|
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Pllc |
Gilliam |
IP |
Ca Technologies |
Austin, TX |
|
|
|
Saffer |
Ian |
L. |
|
Littleton, CO |
|
|
|
Joseph |
Ii |
John |
|
Chicago, IL |
|
|
|
CA |
INC. |
|
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
CA |
INC. |
|
Coats & Bennett, PLLC |
Cary, NC |
|
|
|
Dept |
Intellectual |
Property |
Shook Hardy & Bacon LLP |
Kansas City, MO |
|
|
|
DEPT |
IP |
|
Shook Hardy & Bacon LLP |
Kansas City, MO |
|
|
|
Komenda |
J. |
Kyle |
|
Dallas, TX |
|
|
|
Komneda |
J. |
Kyle |
|
ROCKWALL, TX |
|
|
|
Blumenfeld |
Jack |
B. |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Hallenbeck |
James |
D. |
Schwegman, Lundberg & Woessner, PA |
|
|
|
|
Brickell |
Jamie |
Mark |
Pryor Cashman LLP |
New York, NY |
|
|
|
DADDONA |
JANET |
|
|
Dallas, TX |
|
|
|
Daddona |
Janet |
|
Baker Botts, LLP |
DALLAS, TX |
|
|
|
Vogel |
Jason |
M. |
|
Ny 10036, |
|
|
|
Davis |
Jennifer |
|
FOLEY & LARDNER LLP |
BOSTON, MA |
|
|
|
McEntee |
John |
Peter |
Allen Matkins Leck Gamble Mallory & Natsis L... |
Phoenix, AZ |
|
|
|
Allcock |
John |
|
|
Ca, |
|
|
|
Guaragna |
John |
M. |
DLA Piper (US) LLP |
Austin, TX |
|
|
|
Herbert |
John |
Mitchell |
Holland & Knight, LLP |
BOSTON, MA |
|
|
|
Frankel |
Jonathan |
J. |
Wilmer, Cutler & Pickering Hale & Dorr LLP (... |
|
|
|
|
Lee |
Jonathan |
|
|
Houston, TX |
|
|
|
Krumholz |
Joshua |
C. |
Holland & Knight, LLP |
Boston, MA |
|
|
|
In |
Juniper |
Networks |
FisherBroyles, LLP |
SALT LAKE CITY, UT |
|
|
|
Carney |
Kathryn |
Mary |
Davis Polk & Wardwell, LLP |
|
|
|
|
OLIVER |
KATHY |
|
|
MCLEAN, VA |
|
|
|
Coen |
Kevin |
Michael |
Morris, Nichols, Arsht & Tunnell LLP |
Wilmington, DE |
|
|
|
Asset |
King |
Intellectual |
|
GREENWOOD VILLAGE, CO |
|
|
|
Deniro |
Kirk |
J. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
|
KSC |
|
Myers Bigel Sibley & Sajovec, PA |
Raleigh, NC |
|
|
|
Jefcoat |
Kyle |
Robert |
Latham & Watkins LLP |
Washington, DC |
|
|
|
Vierra |
Larry |
E. |
Vierra Magen Marcus & DeNiro LLP |
San Francisco, CA |
|
|
|
Pedersen. |
Luke |
K. |
|
DALLAS, TX |
|
|
|
Pedersen |
Luke |
K. |
Baker Botts, LLP |
Dallas, TX |
|
|
|
Borchers |
Lynne |
A. |
Lerner David Littenberg Krumholz & Mentilk, ... |
|
|
|
|
Grant |
M. |
Duncan |
Pepper Hamilton, LLP |
Pa, |
|
|
|
Alicks |
Margot |
F |
Alicks, Margot F |
|
|
|
|
|
8/15/2024 |
Symantec Corporation |
Assignor |
Application Publication |
18806063 20240406026 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/14/2024 |
Mortha, Srinivas |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
2/14/2024 |
Chevendra, Naga Naveen |
Assignor |
Application Publication |
18497503 20250141749 |
Unified Topology Across Domains Unified Topology Across Domains |
|
|
|
10/2/2023 |
Back, Ophir |
Assignor |
Application Publication |
18479358 20250111130 |
System And Method For Canvas Sanitization System And Method For Canvas Sanitization |
|
|
|
9/12/2023 |
Biswas, Dhrubojyoti |
Assignor |
Application Publication |
18465285 20250086292 |
Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... Providing Encrypted End-to-end Email Delivery Between Secure Email Clust... |
|
|
|
8/28/2023 |
Cosgrove, David |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Murdough, John |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Normandin, Jason |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/28/2023 |
Diep, Tim |
Assignor |
Application Patent |
18362920 12192083 |
Monitoring Network Volatility Monitoring Network Volatility |
|
|
|
8/23/2023 |
Zuercher, Chris |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Tomic, Gary |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Du Toit, Roelof Nico |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
8/23/2023 |
Elkadri, Nour Alhouda |
Assignor |
Application Publication |
18362881 20250047642 |
Network Security Device Network Security Device |
|
|
|
7/19/2022 |
Symantec Corporation |
Assignor |
Application Publication |
17863998 20220345462 |
|
|
|
|
2/23/2022 |
Ciubotariu, Mircea |
Assignor |
Application Patent |
13902345 9411953 |
Tracking Injected Threads to Remediate Malware Tracking Injected Threads to Remediate Malware |
|
|
|
11/2/2021 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent |
29275692 29162946 29165309 29269499 29161308 29172439 29266981 29297799 29171598 29159439 D485487 D569716 D475326 D483524 D562898 D586413 D475328 D483549 D562904 D475329 |
Undergarment Front Grill Of An Automobile Hitch Cover Golf Putter Integrated Tabbed Note And Clip Birding Acoustic Feedback Learning Aid Undergarment Hair Clip Hitch Cover Golf Putter Trailer Trestle Connecting Device For A Combustion Facilitator Of Internal/external Comb... Birding Acoustic Feedback Learning Aid Clip For Retaining Soccer Nets And Other Fastener Applications Hair Clip Front Grill Of An Automobile Trailer Trestle Connecting Device For A Combustion Facilitator Of Internal/external Comb... Integrated Tabbed Note And Clip Clip For Retaining Soccer Nets And Other Fastener Applications |
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication |
17322045 20210281443 |
|
|
|
|
6/7/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
17322045 20210281443 12088430 |
Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... Systems And Methods For Preserving System Contextual Information In An E... |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14838278 20160012220 9639694 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
15470717 20170250994 10148667 |
Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices Automated Classification Of Applications For Mobile Devices |
|
|
|
2/27/2021 |
Symantec Corporation |
Assignor |
Application Publication Patent |
14675327 20150281258 9374386 |
Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks Application Malware Filtering For Advertising Networks |
|
|
|
6/19/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Application Application Publication Publication Patent Patent Patent |
12203018 11132649 10990894 20100058352 20050283539 7457722 8365183 8548976 |
Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... Balancing Load Requests And Failovers Using A Uddi Proxy System And Method For Dynamic Resource Provisioning For Job Placement Correlation Of Application Instance Life Cycle Events In Performance Mon... Balancing load requests and failovers using a UDDI proxy System And Method For Dynamic Resource Provisioning For Job Placement |
|
|
|
5/19/2020 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 82 more |
12982772 10682644 09090774 29562898 15137492 11391610 09846117 09615891 29586413 29475328 13952487 12290215 11019594 12356079 11106194 09047316 29483549 15077428 11146855 09790434 10683564 09479356 29562904 15241729 13324986 11496032 09884884 ...and 82 more |
Methods And Apparatus For Blocking Unwanted Software Downloads Display Screen With Graphical User Interface Bubble-protected System For Automatic Decryption Of File Data On A Per-u... System And Method For Add-on Services, Secondary Authentication, Authori... Controllable Deployment Of Software Updates Method And Apparatus For Network Packet Capture Distributed Storage Syst... Applications Processing In A Network Apparatus Display Screen With Graphical User Interface System For Managing Flow Bandwidth Utilization At Network, Transport And... Virtual Partition System And Method For Recompressing A Digital Image Using Requantization System And Method For Preventing Detection Of A Selected Process Running... Systems And Methods For Sharing Data Stored On Secure Third-party Storag... Display Screen with Graphical User Interface Display Screen With Graphical User Interface System And Method For Preventing Detection Of A Selected Process Running... System And Method For Efficiently Forwarding Client Requests From A Prox... Using hierarchical INI files to represent complex user settings in a mul... Collaborative File Update System Systems And Methods For Detecting Potentially Malicious Content Within N... Display Screen with Graphical User Interface Display Screen With Graphical User Interface System for supporting secured log-in of multiple users into a plurality ... Flow scheduling for network application apparatus Method, System, And Computer Program Product For Security Within A Globa... Identifying The Origin Of Hard-copy Documents Systems and Methods for Processing Data Flows ...and 82 more |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Patent |
16551440 11089050 |
Isolating An Iframe Of A Webpage |
|
|
|
4/30/2020 |
Nortonlifelock Inc. |
Assignor |
Application Application Patent Patent |
16560273 16551440 11089050 11204992 |
Systems And Methods For Safely Executing Unreliable Malware Isolating An Iframe Of A Webpage Isolating An Iframe Of A Webpage |
|
|
|
4/8/2020 |
Symantec Corporation |
Assignor |
Application Patent |
16560273 11204992 |
Systems And Methods For Safely Executing Unreliable Malware |
|
|
|
3/10/2020 |
Avago Technologies International Sales P... |
Assignee |
Application Publication Patent |
11694483 20070233698 8572138 |
Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... Distributed Computing System Having Autonomic Deployment Of Virtual Mach... |
|
|
|
3/4/2020 |
Segu, Murali Krishna |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanasi, Chandra Sekhar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Tiruvaipeta, Vinay Kumar |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
3/4/2020 |
Varanjani, Jeetendra Gopal |
Assignor |
Application Publication |
16158009 20200120089 |
Multifactor Authentication Utilizing Issued Checks Multifactor Authentication Utilizing Issued Checks |
|
|
|
2/25/2020 |
Kaladgi, Mohammed Mujeeb |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sawant, Yashwant Ramkishan |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Kaladgi, Ruqiya Nikhat |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
2/25/2020 |
Sandeep, Banisetti |
Assignor |
Application Publication Patent |
16289577 20190197228 10713345 |
Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction Secure Biometric Authentication With Client-side Feature Extraction |
|
|
|
1/28/2020 |
Ball-marian, Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/28/2020 |
Lansky, Richard Michael |
Assignor |
Application Publication |
16154402 20200111046 |
Automated And Intelligent Time Reallocation For Agenda Items Automated And Intelligent Time Reallocation For Agenda Items |
|
|
|
1/24/2020 |
Bay Dynamics, Inc. |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent Patent ...and 1 more |
13269566 15836794 13269560 13269563 15089260 13269570 15836796 13269561 13269569 15836791 13269565 13269562 13269568 9390082 10387452 8799207 10691796 10353922 9171055 10587644 9183269 9081830 9330091 8965836 10607014 8909680 ...and 1 more |
System For Managing Data Storages Updating a View of a Multidimensional Cube Intelligent Caching Of Multidimensional Cube Data Federated Multidimensional Data Storage Cubes Determining Monetary Loss Due To Security Risks In A Computer System Management of Multidimensional Data Storage Cubes using Content Packs Monitoring And Managing Credential And Application Threat Mitigations In... Content Packs for Multidimensional Data Storage Cubes System For Managing Data Storages Updating a View of a Multidimensional Cube Rendering Multidimensional Cube Data Federated Multidimensional Data Storage Cubes Prioritizing Security Risks For A Computer System Based On Historical Ev... Unified Data Source Management Monitoring And Managing Credential And Application Threat Mitigations In... Content Packs for Multidimensional Data Storage Cubes System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube Rendering Multidimensional Cube Data Intelligent Caching Of Multidimensional Cube Data Prioritizing Security Risks For A Computer System Based On Historical Ev... Unified Data Source Management Determining Monetary Loss Due To Security Risks In A Computer System Management of Multidimensional Data Storage Cubes using Content Packs System For Managing Data Storages Generating Multiple Views Of A Multidimensional Cube ...and 1 more |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication |
16149807 20200106779 |
Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
1/23/2020 |
Girdhar, Dhiraj |
Assignor |
Application Publication Patent |
16149807 20200106779 10965676 |
Peer Authentication By Source Devices Peer Authentication By Source Devices Peer Authentication By Source Devices |
|
|
|
12/11/2019 |
Morrison, Kenneth William Scott |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
12/11/2019 |
Thorne, Jay William |
Assignor |
Application Publication |
16160537 20200117523 |
Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... Statistical Deep Content Inspection Of Api Traffic To Create Per-identif... |
|
|
|
11/25/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Publication Publication Publication Publication Publication |
10500959 10500952 10500953 10500960 10500958 20050022016 20050091512 20050071748 20050055569 20050071649 |
System For And Method Of Detecting Malware In Macros And Executable Scri... Method Of, And System For, Replacing External Links In Electronic Docume... Method Of, And System For, Scanning Electronic Documents Which Contain L... Method Of, And System For Detecting Mass Mailing Viruses Method Of, And System For, Replacing External Links In Electronic Docume... Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For Detecting Mass Mailing Viruses System For And Method Of Detecting Malware In Macros And Executable Scri... Method Of And System For Heuristically Detecting Viruses In Executable C... Method Of, And System For, Scanning Electronic Documents Which Contain L... |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication |
15806926 20190141041 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Bhabbur, Gyaneshwar |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/25/2019 |
Behera, Nirupama |
Assignor |
Application Publication Patent |
15806926 20190141041 10523675 |
Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization Remote Direct Memory Access Authorization |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3922 more |
09751781 09134076 13419360 13246774 15661715 15384999 12969471 15193653 14966797 12695996 11026525 12540907 14509064 12416020 12352022 14142115 12130206 13532660 11960251 11829740 15630131 13048668 15374303 11394846 12966307 15184294 11112192 ...and 3922 more |
Software As A Service Via Virtualization Heuristic Behavior Pattern Matching Of Data Flows In Enhanced Network Tr... Seamless Authentication Mechanism For User Processes And Web Services Re... Systems And Methods For Automatically Blacklisting An Internet Domain Ba... Pre-fetch Communication Systems And Methods Communication-based Reputation System Systems And Methods For Using Multiple In-line Heuristics To Reduce Fals... Buffering proxy for telnet access Identifying Misuse Of Legitimate Objects Wafs Disconnected-mode Read-write Access Adaptive, Flow-based Network Traffic Measurement And Monitoring System Detecting Malicious Code Based On Deviations In Executable Image Import ... Using Bit Arrays In Incremental Scanning Of Content For Sensitive Data Method And Apparatus To Detect And Prevent Malicious Changes To Tokens Apparatus and Method for Characterizing the Risk of a User Contracting M... Processing Data Flows With A Data Flow Processor Api-profile Guided Unpacking Indirect Access Control Facilitating Transition Of Network Operations From Ip Version 4 To Ip Ve... Compression Of Stream Data Using A Hierarchically-indexed Database Systems And Methods For Encrypting Files Techniques For Identifying Malicious Downloadable Applications Refining Behavioral Detections For Early Blocking Of Malicious Code Hardware Accelerated Application-Based Pattern Matching for Real Time Cl... Method And Apparatus For Request Routing One-to-many Disk Imaging Transfer Over A Network Techniques For Detecting Infected Websites ...and 3922 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 3924 more |
11873583 11763755 13190186 15470717 15274168 15087743 11231681 11082638 14632227 10940701 10810785 12407903 14036311 09999777 13326198 15465636 11515625 12897563 11214631 14854658 11064923 12559990 10782751 12399114 14205316 13974440 12147939 ...and 3924 more |
Dynamic Partitioning Of Network Resources Methods, Apparatuses And Systems Facilitating Analysis Of The Performanc... Method And System For Metadata Driven Testing Of Malware Signatures Context-aware Real-time Computer-protection Systems And Methods Host-based Detection And Prevention Of Malicious Code Propagation System To Identify Machines Infected By Malware Applying Linguistic Anal... Method And Apparatus For Securing Transactions Using Verified Resource L... Detecting Viruses Using Register State Systems And Methods For Handling Fraudulent Uses Of Brands Global, Location-aware Computer Security System And Method For Computer Security Using Multiple Cages Systems And Methods For Creating Behavioral Signatures Used To Detect Ma... Data Loss Detection Method For Handling Fuzziness In Sensitive Keywords System And Methods For Cross-tier Transaction Tracing Techniques For Generating A Virtual Private Container Systems And Methods For Analyzing Malware Adaptive Threshold Based Spam Classification Systems And Methods For Obtaining Information About Security Threats On ... Using Temporal Attributes To Detect Malware Aggregate Rate Control Using Pid Apparatus and Method for Utilizing Fourier Transforms to Characterize Ne... Techniques For Providing Missed Arrival Notifications Method and apparatus for providing connectivity control Detecting Network Packet Injection Systems And Methods For Processing Data Flows Mapping Regulations And Frameworks To Policies Using Control Statements Policy Enforcing Browser ...and 3924 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4016 more |
12956541 15151734 11242213 12790939 14922952 14673902 12510967 14245994 12338618 10350172 12195370 10076952 12109253 13476508 11901327 13341205 13191201 15452883 11537020 15270733 12941939 11233195 12583097 14644230 10942395 12495420 14219584 ...and 4016 more |
Application Identification And Control In A Network Device Identifying Trojanized Applications For Mobile Environments Methods, Apparatuses And Systems Facilitating Concurrent Classification ... Systems And Methods For Applying Data-loss-prevention Policies Measuring Catastrophic Failure Rates In Updates Enhancements To Push-pull Algorithm For Optimization Of Disk Volumes Wit... Systems And Methods For Estimating Ages Of Network Devices File Infection Removal by Differential Copy Dual Axis Raid System For Enhanced Bandwidth And Reliability Establishing Tunnels Between Selective Endpoint Devices Along Communicat... Method And Apparatus For Providing A Utility-based Model For Security So... Efficient Scanning Of Stream Based Data Automated Separation Of Corporate And Private Data For Backup And Archiv... Systems And Methods For Preventing Subversion Of Address Space Layout Ra... Return-to-libc Attack Blocking System And Method Discovery And Classification Of Enterprise Assets Via Host Characteristi... Method And Apparatus For Managing Calls For Call-related Calendar Entrie... Protecting Administrative Privileges Systems And Methods For Classifying Package Files As Trojans Enforcing Good Network Hygiene Using Reputation-based Automatic Remediat... File System Based Risk Profile Transfer Apparatus and Method for Network Traffic Classification and Policy Enfor... Systems and Methods for Creating Dataless Storage Systems for Testing So... System And Method For Monitoring Memory Usage Systems And Methods For Anonymizing Log Entries Systems and Methods for Creating Customized Confidence Bands for Use in ... Method And Apparatus For Detecting Hidden Network Communication Channels... ...and 4016 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4018 more |
13777893 09750835 11961895 15938377 12967833 11271656 11133498 14687944 11019501 12534772 10677730 12343363 14138136 13914599 10109406 12055261 13493619 13360084 15468636 15292766 12956911 15154152 11243824 12797301 14674604 12511885 12338877 ...and 4018 more |
Method And Apparatus For Managing Components In An It System Vulnerability Assessment Of Disk Images Systems And Methods For Secure Hybrid Third-party Data Storage Systems And Methods For Providing Adaptive Views Of Domain Name System R... Network Traffic Synchronization And Data Compression In Redundant Networ... Systems And Methods For Protecting Services Systems and Methods for Reducing False Positives Produced by Heuristics Portable Memory Storage Devices Containing Public Context Application La... Detect Encrypted Program Based On Cpu Statistics Systems and Methods for Sharing the Results of Computing Operations Amon... Enhanced Qos Solution For Thin Client Or Remote Access Sessions Techniques For Classifying And Labeling Data Systems And Methods For Protecting Against Unauthorized Access Of Encryp... Method And Apparatus For Detecting Hidden Rootkits Systems And Methods For Classifying Files Network Intrusion Detection Apparatus Endpoint Management Using Trust Rating Data Systems And Methods For Securing Computing Devices That Are Not In Users... Systems And Methods For Preserving Network Settings For Use In A Pre-boo... Method And Apparatus For Host Authentication In A Network Implementing N... Systems And Methods For Identifying Suspicious Controller Area Network M... Providing Installer Package Information To A User Data Submission For Anti-fraud Context Evaluation Systems And Methods For Split Network Tunneling Based On Traffic Inspect... Systems And Methods For Protecting Platform-as-a-service Platforms Systems And Methods For Identifying External Functions Called By Untrust... Boot Failure Recovery ...and 4018 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4020 more |
11325762 12881864 12718758 11049607 14569163 12471433 14316635 12395229 13838613 13631646 11863032 15384999 13006705 11324446 12858085 14986362 11171250 12705867 14748268 11042641 12553010 10872832 14176265 12256838 12131702 13794513 09134883 ...and 4020 more |
Systems And Methods For Mapping Internet Protocol Addresses For An Organ... Systems And Methods For Workload Security In Virtual Data Centers Categorizing Web Sites Based On Content-temporal Locality Hitch Cover Method And Device For Alternative Status Notification Method And System For Automated Authentication Of A Device To A Manageme... Method For Back Tracing Program Execution Application Service Level Mediation And Method Of Using The Same Detecting Fraudulent Web Sites Through An Obfuscated Reporting Mechanism Network Application Association Finer Granted Data Organization Using Data Sublayers Method And Apparatus For Providing Secure Web Transactions Using A Secur... Heuristic Detection And Termination Of Fast Spreading Network Worm Attac... Systems And Methods For Managing Network Communication Network Address Translation Gateway For Local Area Networks Using Local ... Method Of, And System For, Heuristically Detecting Viruses In Executable... Quantifying The Risks Of Applications For Mobile Devices Systems And Methods For Recording Behavioral Information Of An Unverifie... Risk Profiling Systems And Methods For Generating Repair Scripts That Facilitate Remedi... Application Service Level Mediation And Method Of Using Same System And Method For Monitoring Events In A Computing Environment Outlier Detection In Databases Using Metadata In Security Tokens To Prevent Coordinated Gaming In A Rep... Detecting Return-to-libc Buffer Overflows Via Dynamic Disassembly Of Off... Automated Classification Of Applications For Mobile Devices Enhanced Random Early Discard for Networked Devices ...and 4020 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4024 more |
11478786 15231692 14991730 10892615 10754318 14184581 10459213 13800305 09794094 13599830 16018340 13249108 15608769 12844738 11153892 12699183 14732811 11030390 12549689 14527499 10864109 10718375 12363696 13779550 15940589 11844649 11413455 ...and 4024 more |
Systems And Methods For Using Property Tables To Perform Non-iterative M... Method And Apparatus For Mitigating Performance Impact Of Background Pro... Method For Determining Program Control Flow Systems And Methods For Transparent Data Loss Prevention Classifications Methods And Systems For Protecting Active Copies Of Data Methods, Apparatuses And Systems Enabling A Network Services Provider To... Enforcing Policy-based Compliance Of Virtual Machine Image Configuration... Distributed Application Virtualization Preventing E-mail Propagation Of Malicious Computer Code Detecting Malware Through Package Behavior Virtual Machine File System Restriction System And Method System And Method For Secure Electronic Communication In A Partially Key... Systems And Methods For Preventing False Positive Malware Identification Selective Removal Of Protected Content From Web Requests Sent To An Inte... Method And System For Detecting Changes In Computer Files And Settings A... Selective Removal Of Protected Content From Web Requests Sent To An Inte... Capture And Regeneration Of A Network Data Using A Virtual Software Swit... Cache Scanning System And Method Systems And Methods For Identifying Malware Systems And Methods For End-user Initiated Data-loss-prevention Content ... Virtual Endpoint Systems And Methods For Determining That Files Found On Client Devices C... Method And System For Identification Of Data Owner In An Unstructured Da... Filtering Training Data For Machine Learning Systems And Methods For Automated Generation Of Generic Signatures Used ... Detecting Malware Signed with Multiple Credentials Authenticated Communication Using A Shared Unpredictable Secret ...and 4024 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4026 more |
13048784 11396070 12967411 11271327 11121556 14675611 14486424 10841840 12414226 12340968 12210243 13908880 12127595 13749667 09630654 11951101 11541318 13047338 15148019 14876804 11094648 10994171 10826468 12411628 14065394 10349155 12188239 ...and 4026 more |
Data Access Security Methods And Systems For Inserting Software Applications Into Images Systems And Methods For Synchronizing Microservice Data Stores Method And Apparatus For Periodically Removing Invalid Public Keys From ... System And Method For Estimating Typicality Of Names And Textual Data Detecting And Blocking Unauthorized Downloads Method For Routing A Request Over A Network To A Content Source That Can... Authentication Of Pki Credential By Use Of A One Time Password And Pin Network Risk Analysis Networked Computer Environment Assurance System And Method Systems And Methods For Blocking Flanking Attacks On Computing Systems Systems And Methods For Storing And Accessing Data Stored In A Data Arra... Collaborative File Update System Systems And Methods For Providing Targeted Data Loss Prevention On Unman... Systems And Methods For Using Reputation Data To Detect Shared-object-ba... Verification Of Desired End-state Using A Virtual Machine Environment Systems And Methods For Preventing Data Loss Over Virtualized Networks Systems And Methods For Preventing Data Loss From Files Sent From Endpoi... Portable Memory Storage Devices With Application Layers Systems And Methods For Filtering Log Files Systems And Methods For Identifying Spam Mailing Lists Scaled Scanning Parameterization Systems And Methods For Facilitating Eye Contact During Video Conference... Systems and Methods for Restoring Applications Application Service Level Mediation And Method Of Using The Same System And Method For Dynamic Detection Of Command And Control Malware Method And System For Injecting Function Calls Into A Virtual Machine ...and 4026 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4028 more |
15265314 11375923 12916089 15070468 12763593 14864931 11082194 12571121 12494792 14450179 14214376 12329033 10305651 12164983 09990354 12059973 09396592 13452719 29159439 11864948 13326194 15419756 11348854 15056588 14836991 12559976 10927295 ...and 4028 more |
Method And System For Establishing A Dlp-compliant Environment Dynamic Detection Of Computer Worms Unified Access Controls For Cloud Services Method And Apparatus For Identifying An Optimal Configuration Of A Resou... Method And System For Distributing And Maintaining Software Across A Com... Method And System To Audit Physical Copy Data Leakage High-accuracy Confidential Data Detection Method And Apparatus For Managing Components In An It System Dynamically Populating An Identity-correlation Data Store User-assisted Security System Method Of And System For, Processing Email Systems And Methods For Identifying Uniform Resource Locators That Link ... Methods and Systems for Enabling Community-Tested Security Features for ... Computer Code Intrusion Detection System Based On Acceptable Retrievals Systems And Methods For Protecting Virtual Machine Program Code System And Method For Identity Consolidation Methods, Apparatuses And Systems Facilitating Remote, Automated Deployme... Uploading Signatures to Gateway Level Unified Threat Management Devices ... Systems And Methods For Improving The Effectiveness Of Decision Trees Update Protection System And Method Systems And Methods For Performing Application Container Introspection Systems And Methods For Classifying An Unclassified Process As A Potenti... Method And Apparatus For Generating Readable, Unique Identifiers Automated Construction Of Network Whitelists Using Host-based Security C... Systems And Methods For Detecting Data-stealing Malware Fast System Call Hooking On X86-64 Bit Windows Xp Platforms Systems And Methods For Detecting Suspicious Internet Addresses ...and 4028 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4032 more |
14018760 10280665 09964272 12059785 09306678 11864768 15238534 11340948 11181221 12558930 10914962 12471437 12265157 12142549 09896887 12059665 13633846 09210138 12004865 11477505 11171251 15793730 15465157 12463318 14305580 10741423 12371501 ...and 4032 more |
Systems And Methods For Restoring An Image To A Software Encrypted Disk ... Systems And Methods For Enabling Safe Memory De-duplication In Shared-co... Alternated Update System And Method Systems And Methods For Automatically Applying Firewall Policies Within ... System And Method For Locating A Memory Page In A Guest Virtual Machine Webpage Rendering Using A Remotely Generated Layout Node Tree Detecting Anomalous Network Activity Through Transformation Of Terrain Method And Apparatus For Detecting Security Anomalies In A Public Cloud ... Systems And Methods For Detecting Incorrect Translations Of Terms In A C... Using Run Length Encoding To Detect Target Images Systems And Methods For Detecting Anomalies That Are Potentially Indicat... Systems and Methods for Identifying Unique Malware Variants Post-signing Modification Of Software Systems And Methods For Detecting Gadgets On Computing Devices Techniques For Reducing Executable Code Vulnerability Scanning Application Binaries To Identify Database Queries System And Method For Managing Data Loss Due To Policy Violations In Tem... Extended Format For Initialization Files Systems And Methods For Identifying Security Risks In Downloads Method And Apparatus For Accelerating Load-point Scanning Systems And Methods For Identifying Malware Threat Vectors Management Of Network Quality Of Service Method And Apparatus For Reconstituting An Encryption Key Based On Multi... Malware Detection Driven User Authentication And Transaction Authorizati... Virtualized Application Cooperative Prefetching Multicast Delivery Systems And Methods Systems And Methods For Detecting Client Types ...and 4032 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4036 more |
13038232 15265346 11376770 12916267 15072589 12768157 14866634 12579093 12495111 14450181 14214581 12329671 10320015 12165003 13872623 12060244 09402815 12032571 13453214 29171598 11864951 11738220 13168926 13025109 15256391 11356906 15056864 ...and 4036 more |
Integrated Tabbed Note And Clip Context Based Conditional Access For Cloud Services Method And Apparatus For Evaluating Internet Resources Using A Computer ... Thwarting Malicious Registry Mapping Modifications And Map-loaded Module... Identifying Primarily Monosemous Keywords To Include In Keyword Lists Fo... Method And Apparatus For Automatically Correlating Related Incidents Of ... Volume-based Network Management Scheme Systems And Methods For Trust Propagation Of Signed Files Across Devices Dynamic Partitioning Of Network Resources Method Of And System For, Processing Email Method And System For Metadata Driven Testing Of Malware Signatures Methods And Systems For Enabling Community-tested Security Features For ... Host-based Detection And Prevention Of Malicious Code Propagation Systems And Methods For Trusting Digitally Signed Files In The Absence O... Method And Apparatus For Securing Transactions Using Verified Resource L... Cost-aware, Bandwidth Management Systems Adaptive To Network Conditions Systems And Methods For Handling Fraudulent Uses Of Brands Method And Apparatus For Detecting Malware On A Computer System System And Method For Computer Security Using Multiple Cages Dynamic Workspace Modification Data Loss Detection Method For Handling Fuzziness In Sensitive Keywords System And Methods For Cross-tier Transaction Tracing Automated Construction Of Network Whitelists Using Host-based Security C... Systems And Methods For Analyzing Malware Automatically Estimating Correlation Between Hardware Or Software Change... Using Tunable Metrics for Iterative Discovery of Groups of Alert Types I... Systems And Methods For Identifying Potential Malware ...and 4036 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4040 more |
15365507 15185104 12831004 14952410 12687071 12414478 14266518 12128490 13754810 11956172 15842095 11809419 13227151 11565494 13048336 11391979 14938874 11096310 11000534 10833538 12412232 14252706 10646416 14089560 13903953 09569576 11901436 ...and 4040 more |
System And Method Of Traffic Inspection And Stateful Connection Forwardi... Systems, Apparatus, And Methods For Online Purchasing Adaptive Active Cache Refresh System And Method For Data Loss Prevention In A Virtualized Environment Multi-language Text Fragment Transcoding And Featurization System For Supporting Secured Log-in Of Multiple Users Into A Plurality ... Knowledge-based Authentication Based On Tracked Credential Usage Scoring Applications For Green Computing Scenarios Method And Apparatus For Controlling Data Transmission Volume Using Expl... Rule-based Virtualization Graduated Enforcement of Restrictions According to an Application's Repu... In Memory Heuristic System And Method For Detecting Viruses Systems And Methods For Multicast Streaming Analysis Systems And Methods For Evaluating The Performance Of Remote Computing S... Vulnerability Assessment Of Disk Images Systems And Methods For Secure Hybrid Third-party Data Storage Systems And Methods For Providing Adaptive Views Of Domain Name System R... Network Traffic Synchronization And Data Compression In Redundant Networ... Systems And Methods For Blocking Push Authentication Spam Systems And Methods For Using Reputation Data To Detect Packed Malware Adaptive Correlation Of Service Level Agreement And Network Application ... Protecting User Identity At A Cloud Using A Distributed User Identity Sy... Systems and Methods for Sharing the Results of Computing Operations Amon... Enhanced Qos Solution For Thin Client Or Remote Access Sessions Techniques For Classifying And Labeling Data Systems and Methods for Merging Virtual Layers System And Method For Efficiently Forwarding Client Requests In A Tcp/ip... ...and 4038 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4042 more |
11479852 15234766 11325762 12881864 12718758 11049607 14569163 12471433 14316635 12395229 13838613 13631646 11863032 15384999 13006705 11324446 12858085 14986362 11171250 12705867 14748268 11042641 12553010 10872832 14176265 12256838 12131702 ...and 4042 more |
Method And Device For Alternative Status Notification Method And System For Automated Authentication Of A Device To A Manageme... Method For Back Tracing Program Execution Application Service Level Mediation And Method Of Using The Same Detecting Fraudulent Web Sites Through An Obfuscated Reporting Mechanism Network Application Association Finer Granted Data Organization Using Data Sublayers Method And Apparatus For Providing Secure Web Transactions Using A Secur... Heuristic Detection And Termination Of Fast Spreading Network Worm Attac... Systems And Methods For Managing Network Communication Network Address Translation Gateway For Local Area Networks Using Local ... Method Of, And System For, Heuristically Detecting Viruses In Executable... Quantifying The Risks Of Applications For Mobile Devices Systems And Methods For Recording Behavioral Information Of An Unverifie... Risk Profiling Systems And Methods For Generating Repair Scripts That Facilitate Remedi... Application Service Level Mediation And Method Of Using Same System And Method For Monitoring Events In A Computing Environment Outlier Detection In Databases Using Metadata In Security Tokens To Prevent Coordinated Gaming In A Rep... Detecting Return-to-libc Buffer Overflows Via Dynamic Disassembly Of Off... Automated Classification Of Applications For Mobile Devices Enhanced Random Early Discard for Networked Devices Detection Of Sysenter/syscall Hijacking System And Method For Identifying An Invalid Packet On A Controller Area... Systems and Methods for Associating Installed Software Components with S... Virtual Partition For Recording And Restoring Computer Data Files ...and 4041 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4056 more |
12891258 11213289 12751904 11064712 10782396 12397009 12269173 13967963 12147761 13291716 15391495 11479270 13017028 11324573 12881258 11176590 12710324 14822927 11048033 14567440 12470213 14315312 10757742 12393957 14190430 10459870 12141440 ...and 4056 more |
Confidence Level Threshold Selection Assistance For A Data Loss Preventi... Method And Apparatus For Aggregating Notices And Alerts Into An Aggregat... Secure Quarantine Of Potentially Malicious Content System And Method For Tokenization Of Data For Storage In A Cloud Method For Implementing Ejection-safe Api Interception Method For Real Time Protocol Media Recording Language Detection To Improve Efficiency Of Content Scanning Engine In D... Simulating Pxe Booting For Virtualized Machines Streaming Media Bitrate Switching Methods And Apparatus Using Bit Arrays In Incremental Scanning Of Content For Sensitive Data Calculating Domain Registrar Reputation by Analysis of Hosted Domains Enforcement Of Compliance With Network Security Policies Systems And Methods For Performing Customized Large-scale Data Analytics Detecting Man-in-the-middle Attacks Via Security Transitions Personal computing device -based mechanism to detect preselected data Systems And Methods For Obscuring Network Services Filtering Malware Related Content Empirical Database Access Adjustment Mobile Push User Authentication For Native Client Based Logon Method And Apparatus For Detecting Malicious Software Activity Based On ... Classification And Management Of Network Traffic Based On Attributes Ort... Match Signature Recognition For Detecting False Positive Incidents And I... Method And System For Employing User Input For Website Classification Intrustion Protection System Utilizing Layers Regulating Undesirable Webpage Code Datastore for Storing File Access Event Data Instant Messaging (im) Comforting In Antivirus Filtering System And Meth... ...and 4054 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4058 more |
15041040 11177775 12558356 10902690 10459936 12264101 13945373 10255566 12141736 12059513 09198090 12004205 13423930 16018340 13285481 15619571 11690669 13085786 11477501 15224501 14541001 12436630 14301985 10738764 12369512 10435131 13931426 ...and 4058 more |
Systems And Methods For Workload Security In Virtual Data Centers System And Method For Controlling Distribution Of Network Communications Systems And Methods For Executing Decision Trees Method And Device For Alternative Status Notification Method And System For Automated Authentication Of A Device To A Manageme... Internet Over Satellite Method Systems And Methods For Modifying Security Based On Reputation Informati... Application streaming and network file system optimization via integrati... Method For Measuring Network Delay Using Gap Time Systems And Methods For Determining Membership Of An Element Within A Se... Method And Apparatus For Providing Secure Web Transactions Using A Secur... Selective Detection Of Malicious Computer Code Systems And Methods For Managing Network Communication Network Address Translation Gateway For Local Area Networks Using Local ... Method Of And System For Heuristically Detecting Viruses In Executable C... Quantifying The Risks Of Applications For Mobile Devices Systems And Methods For Recording Behavioral Information Of An Unverifie... Risk Profiling In-line Filtering Of Insecure Or Unwanted Mobile Device Software Compone... Methods And Systems For Evaluating The Health Of Computing Systems Based... A System And Method For Correlating Network Traffic And Corresponding Fi... Systems And Methods For Monitoring Virtual Networks Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Rep... Detecting Return-to-libc Buffer Overflows Via Dynamic Disassembly Of Off... Systems And Methods For Improving The Classification Accuracy Of Trustwo... Enhanced Random Early Discard for Networked Devices Detection Of Sysenter/syscall Hijacking ...and 4057 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4065 more |
15231714 11324572 12880581 15018758 12709432 14817936 11047471 12557424 14560988 10892982 14314033 12393684 14185249 12141022 13827467 09810874 13605448 09165532 13421757 15381140 15199700 11303804 14972001 12432923 14293660 12367388 14163071 ...and 4065 more |
Image Quality Optimization During Remote Isolated Sessions Techniques For Directory Server Integration Method And System For Authentication Among Peer Appliances Within A Comp... Software-implemented Method For Identifying Nodes On A Network Systems And Methods For Evaluating Application Trustworthiness Methods And Systems For Providing Resource-access Information Electronic Mail File Access System Techniques For Predicting And Protecting Spearphishing Targets Systems And Methods For Controlling Access To Data Through Application V... Heuristic Detection Of Malicious Computer Code By Page Tracking Systems And Methods For Responding To Security Breaches Method And Apparatus To Define The Scope Of A Search For Information Fro... System For And Method Of Detecting Malware In Macros And Executable Scri... Edge Server Selection For Enhanced Services Network Method And Apparatus For Encrypted Communications To A Secure Server Behavior Blocking Utilizing Positive Behavior System And Method Detecting and Remediating Malware Dropped by Files Behavioral Engine For Identifying Patterns Of Confidential Data Use Dynamic Security Deputization Systems And Methods For Anticipating File-security Queries Automated Generation Of Application Data For Application Distribution Aggregate Network Resource Utilization Control Scheme Systems And Methods For Time-shifted Detection Of Security Threats Use Of Physical Location And Application State Information In Routing Pr... Kernel Validation Layer Systems And Methods For Establishing A Reputation For Related Program Fi... Evaluating Relying Parties ...and 4064 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4067 more |
12058490 13533114 11960706 13405293 11834576 13240469 15470717 11617539 15359076 15179528 14951800 12649829 11016535 12534171 14262422 10676383 14135096 10370936 10099629 12054501 13490250 13358501 15811713 11780123 15279142 11391017 12950785 ...and 4067 more |
Systems And Methods For Managing Coordinate Geometry For A User Interfac... Collaborative File Update System Systems And Methods For Providing Targeted Data Loss Prevention On Unman... Communication-based Host Reputation System Verification Of Desired End-state Using A Virtual Machine Environment Potential Attack Detection Based On Dummy Network Traffic Using Confidence About User Intent In A Reputation System Dynamic Demultiplexing Of Network Traffic Systems And Methods For Filtering Log Files Content Associative Caching Method For Web Applications Scaled Scanning Parameterization Systems And Methods For Preventing Vulnerable Files From Being Opened Systems and Methods for Restoring Applications Application Service Level Mediation And Method Of Using The Same Heuristics-based Protocol Labeling For Industrial Control Systems Automatic Electronic Payments Via Mobile Communication Device With Imagi... Systems and Methods for Protocol Detection in a Proxy System And Method For Creating Custom Sequence Detectors Detecting and Repairing Master Boot Record Infections Method and apparatus for collaborative claim verification Systems And Methods For Updating Locked States Of Computing Systems Personal Computing Device-based Mechanism To Detect Preselected Data Software Publisher Trust Extension Application Deception Service For Email Attacks Systems And Methods For User-directed Malware Remediation Application Data Synchronization Methods And Apparatuses For Tracking The Active Window Of A Host Compute... ...and 4066 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4069 more |
11478276 14990815 14551925 10744268 12381937 14184353 10458819 13796109 13588360 15994951 13249045 11672497 12844496 14732809 11030139 12548159 14525030 12362352 14150639 13777893 09750835 11961895 12967833 11271656 11133498 14687944 11019501 ...and 4069 more |
Systems And Methods For Secure Third-party Data Storage Method And Apparatus For Identifying Web Attacks Method For Data Rate Control For Heterogenous Or Peer Internetworking Exchange Of Digital Certificates In A Client-proxy-server Network Config... Virtual Machine File System Content Protection System And Method Cryptographic System With Methods For User-controlled Message Recovery Enforcing Policy-based Compliance Of Virtual Machine Image Configuration... Method And Apparatus For Automatically Classifying An Unknown Site To Im... Preventing E-mail Propagation Of Malicious Computer Code Systems And Methods For Securing Email In Mobile Devices Systems and Methods for Using Alternate Power Sources to Manage the Powe... System And Method For Secure Electronic Communication In A Partially Key... Systems And Methods For Providing Secure Access To Local Network Devices Data Loss Prevention In The Event Of Malware Detection Return-to-libc Attack Detection Using Branch Trace Records System And Me... Systems And Methods For Detecting Suspicious Internet Addresses Presentation Of An Extracted Artifact Based On An Indexing Technique Portable firewall adapter Systems And Methods For Protecting Purpose-built Appliances On Local Net... Systems And Methods For Translating Non-comparable Values Into Comparabl... Securely Hooking Installations For Compatibility With Other Applications Systems And Methods For Detecting Man-in-the-middle Attacks Method And System For Identification Of Data Owner In An Unstructured Da... Automatically Deriving Order Of Initialization For Computing Services Ac... Systems And Methods For Automated Generation Of Generic Signatures Used ... Systems And Methods For Contextual Evaluation Of Files For Use In File R... Client Compliancy With Self-policing Clients ...and 4068 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4071 more |
12956541 15151734 11242213 12790939 14922952 14673902 12510967 14245994 12338618 10350172 12195370 10076952 12109253 13476508 11901327 13341205 13191201 15452883 11537020 15270733 12941939 11233195 12583097 14644230 10942395 12495420 14219584 ...and 4071 more |
Application Identification And Control In A Network Device Identifying Trojanized Applications For Mobile Environments Methods, Apparatuses And Systems Facilitating Concurrent Classification ... Hitch Cover Systems And Methods For Applying Data-loss-prevention Policies Measuring Catastrophic Failure Rates In Updates Enhancements To Push-pull Algorithm For Optimization Of Disk Volumes Wit... Systems And Methods For Estimating Ages Of Network Devices File Infection Removal by Differential Copy Dual Axis Raid System For Enhanced Bandwidth And Reliability Establishing Tunnels Between Selective Endpoint Devices Along Communicat... Method And Apparatus For Providing A Utility-based Model For Security So... Efficient Scanning Of Stream Based Data Automated Separation Of Corporate And Private Data For Backup And Archiv... Systems And Methods For Preventing Subversion Of Address Space Layout Ra... Return-to-libc Attack Blocking System And Method Discovery And Classification Of Enterprise Assets Via Host Characteristi... Method And Apparatus For Managing Calls For Call-related Calendar Entrie... Protecting Administrative Privileges Systems And Methods For Classifying Package Files As Trojans Enforcing Good Network Hygiene Using Reputation-based Automatic Remediat... File System Based Risk Profile Transfer Apparatus and Method for Network Traffic Classification and Policy Enfor... Systems and Methods for Creating Dataless Storage Systems for Testing So... System And Method For Monitoring Memory Usage Systems And Methods For Anonymizing Log Entries Systems and Methods for Creating Customized Confidence Bands for Use in ... ...and 4070 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4091 more |
13838929 13430607 11863101 13285922 11691317 15385952 13006853 11324496 12862092 14988393 12706368 14750342 11043649 12554247 14541007 10881194 14178727 12259212 13938615 12135713 29269499 09149527 11967570 13420569 15587762 15376968 11427938 ...and 4091 more |
Software Update Checking Method Proactive Prevention Of Polymorphic Smtp Worms Systems And Methods For Identifying Variants Of Samples Based On Similar... Systems and Methods for Locating Malware Selective File And Folder Snapshot Image Creation Systems And Methods For Protecting Automated Execution Environments Agai... Enabling Efficient Review Of Media Objects Associated With A Client Devi... Automatic Local Deployment Of Site Associated Cues For Antiphishing Purp... Systems And Methods For Detecting Unknown Vulnerabilities In Computing P... Detecting Network Devices And Mapping Topology Using Network Introspecti... Effective Aggregation And Presentation Of Database Intrusion Incidents Systems And Methods For Facilitating Single Sign-on For Multiple Devices Techniques For Virtual Environment-based Web Client Management Weighted Prioritizing Layered Computing System Systems And Methods For Data Visualization Facilitating Secure 24x7 On-demand Service Availability While Minimizing... Traffic Synchronization Across Multiple Devices In Wide Area Network Top... Indirect Access Control Establishing Tunnels Between Selective Endpoint Devices Along Communicat... Spam Honeypot Domain Identification Systems And Methods For Identifying Malicious Computer Files Systems and Methods for Monitoring the Activity of Devices Within an Org... Method And Apparatus To Enable Confidential Browser Referrals Handling Computer Security Incidents Through A Unified Conversational Ag... Systems And Methods To Protect Against A Vulnerability Event Automatic Virtualization Based On User-defined Criteria Self Moderated Virtual Communities ...and 4090 more |
|
|
|
11/21/2019 |
Symantec Corporation |
Assignor |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 4095 more |
13869921 13663269 12032162 15654425 11731071 13151141 11499283 13020436 15254748 12890425 11199759 14587048 14331151 10781207 10500953 12268256 13963845 10266365 12147744 11863578 13291426 15388886 15231714 11324572 12880581 15018758 12709432 ...and 4095 more |
System And Method For Managing Data Loss Due To Policy Violations In Tem... Method For Real Time Protocol Media Recording Systems And Methods For Dynamically Configuring Computing System Group A... Secure Authentication Token Management Method And Apparatus For Allowing Sharing Of Streamable Applications Systems And Methods For Scalable Network Monitoring In Virtual Data Cent... Mobile Application Sampling For Performance And Network Behavior Profili... Detecting Unsanctioned Network Servers Techniques For Emulating Microprocessor Instructions Malware Detection Efficacy By Identifying Installation And Uninstallatio... System And Method For Dynamically Identifying Internal Hosts In A Hetero... Print Interface Technology Agnostic Data Loss Prevention Through Print O... Systems And Methods For Identifying Polymorphic Malware Preventing Network Micro-congestion Using Send Pacing Based On End-to-en... Systems And Methods For Detecting Malicious Processes On Computing Devic... Systems And Methods For Revoking Digital Signatures File-system-independent Malicious Content Detection Systems And Methods For Detecting Low-density Training Regions Of Machin... Lightweight Directory Access Protocol (ldap) Proxy End-to-end Transactional Protection For Requests In A Web Application Systems And Methods For Providing Two-factor Authentication With An Ente... Techniques For Identifying Potential Malware Domain Names Dynamic Detection Of Computer Worms Systems And Methods For Detecting Anomalous Behavior Within Computing Se... Unified Access Controls For Cloud Services Method And Apparatus For Identifying An Optimal Configuration Of A Resou... Network Computer System ...and 4093 more |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Trademark |
6018153 |
|
|
|
|
2/20/2023 |
Em Training, LLC |
Assignor |
Application |
88592328 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78329139 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3309758 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
78885741 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
4486898 |
|
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Application |
85355876 |
 |
|
|
|
7/12/2022 |
Appneta, Inc. |
Assignor |
Trademark |
3294596 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
86441858 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4273070 |
|
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Application |
85428609 |
 |
|
|
|
11/5/2021 |
Perforce Software, Inc. |
Assignee |
Trademark |
4759918 |
|
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Application |
73471191 |
 |
|
|
|
3/18/2021 |
Sterling Software, Inc. |
Assignor |
Trademark |
1355047 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Trademark |
4759918 |
|
|
|
|
12/4/2020 |
Runscope, Inc. |
Assignor |
Application |
86441858 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86697834 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76077730 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86354568 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86141424 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76358837 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85918617 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456898 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
78424526 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85144826 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982041 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86456903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3953936 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2460389 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2638737 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
3461082 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5099925 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1914615 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2383995 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5268716 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
1654777 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
5206150 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
4527953 |
|
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85079904 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75797459 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
76247818 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
77293710 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
87015542 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
74467812 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
75550401 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86681257 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
73815903 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
86982040 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Application |
85863409 |
 |
|
|
|
9/18/2020 |
Nortonlifelock Inc. |
Assignor |
Trademark |
2508404 |
|
|
|
Incoming Payments
Outgoing Payments
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/16/2008 |
Republican Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
9/4/2008 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
4/2/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
3/30/2007 |
Democratic Governors Association |
Donation |
Cash |
$375.00 |
|
|
|
10/2/2006 |
Democratic Governors Association |
Donation |
Cash |
$50,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
6/27/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
|
5/19/2006 |
Democratic Governors Association |
Donation |
Cash |
$25,000.00 |
|
|
| Total |
|
|
|
$250,750.00 |
|
|
|