Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
METHOD FOR GENERATING, SHARING AND ENFORCING NETWORK PROFILES FOR IoT DEVICES 2023-2-02 2023-6-08
Unified workload runtime protection 2022-1-10 2023-7-13
Methods and system for packet control and inspection in containers and meshed … 2021-12-30 2022-4-21
On-device protected DNS 2021-8-31 2022-11-01 2022-11-01
System and method to detect and prevent Phishing attacks 2021-4-11 2021-7-29
Systems and methods for the efficient detection of improperly redacted … 2021-3-16 2022-9-22
Method and system to determine device vulnerabilities by scanner analysis 2021-1-26 2021-7-29
Method For Detection Of Malicious Applications 2020-10-27 2022-4-28
System and method for performing automated security reviews 2020-9-18 2022-3-24
Methods and systems for identifying malware enabled by automatically generated … 2020-6-09 2023-3-14 2023-3-14
System and method for determining permission profiles for computer executable … 2020-5-18 2020-11-19
Method and system for detecting malicious or suspicious activity by baselining … 2020-4-27 2021-10-28
Method and system for detecting kernel corruption exploits 2019-9-16 2020-1-09
Method and system for modeling all operations and executions of an attack and … 2019-9-15 2021-4-06 2021-4-06
Web application security methods and systems 2019-4-29 2019-10-31
Method and system for detecting and classifying malware based on families 2019-4-18 2020-10-22
Method and system for reducing false positives in web application firewalls 2019-2-28 2021-7-27 2021-7-27
Method for performing tls/ssl inspection based on verified subject name 2018-12-20 2020-6-25
Method and system for cooperative inspection of encrypted sessions 2018-11-29 2020-6-04
Cloud security assessment system using near-natural language compliance rules 2018-11-19 2019-6-20
Method and system for detecting and remediating polymorphic attacks across an … 2018-11-06 2019-3-07
Network host provided security system for local networks 2017-11-22 2018-6-07
Method to identify users behind a shared vpn tunnel 2017-10-19 2019-4-25
Method to avoid inspection bypass due to dns poisoning or http host header … 2017-8-31 2019-2-28
Elastic policy tuning based upon crowd and cyber threat intelligence 2017-5-25 2018-11-29
Method and system for destroying browser-based memory corruption … 2017-5-15 2018-8-14 2018-8-14
Key exchange and mutual authentication in low performance devices 2017-3-30 2019-3-26 2019-3-26
Account take over prevention 2017-3-28 2020-5-05 2020-5-05
Method and system for real time telemonitoring of cardiac activity 2017-2-20 2019-1-02
Methods, circuits, apparatus, systems and associated software applications for … 2016-12-14 2017-6-08
System and method for determining summary events of an attack 2016-12-08 2017-6-15
Method and system for identifying uncorrelated suspicious events during an … 2016-10-13 2019-10-29 2019-10-29
Method and system for injecting javascript into a web page 2016-9-22 2020-7-28 2020-7-28
Push Based Encryption 2016-6-30 2018-1-04
Server and gateway for filtering push notifications according to user … 2016-6-21 2016-10-13
Method and system for creating and receiving neutralized data items 2016-6-09 2019-8-13 2019-8-13
On-demand authorization of access to protected resources 2016-5-26 2017-5-25
Method and system for mitigating the effects of ransomware 2016-5-03 2018-2-06 2018-2-06
Anti-malware detection and removal systems and methods 2016-1-20 2019-3-12 2019-3-12
Method and system for transparently manipulating downloaded files 2015-12-28 2020-2-18 2020-2-18
Method and System for Determining Initial Execution of an Attack 2015-12-09 2017-6-15
Web injection protection method and system 2015-10-13 2017-4-13
Automatic content inspection system for exploit detection 2015-8-27 2017-11-28 2017-11-28
Proxy for mitigation of attacks exploiting misconfigured or compromised web … 2015-6-28 2016-12-29
Protection of communication on a vehicular network via a remote security … 2015-6-15 2017-6-20 2017-6-20
Detection of potentially malicious web content by emulating user behavior and … 2015-5-10 2016-11-10
Method and system for modifying HTTP request headers without terminating the … 2015-4-01 2018-8-21 2018-8-21
Method for protection of automotive components in intravehicle communication … 2015-3-31 2017-5-23 2017-5-23
Method for mitigation of unauthorized data transfer over domain name service ( … 2015-2-26 2016-9-01
Method for file scrubbing in a security gateway for threat prevention 2014-12-29 2016-6-30
Optimization of data locks for improved write lock performance and CPU cache … 2014-10-07 2017-2-14 2017-2-14
Duplicate-free item creation using EWS by a single client 2014-9-30 2018-4-03 2018-4-03
Predictive synchronization for clustered devices 2014-6-05 2014-11-27
EWS Optimized Paged Item Loading 2014-2-06 2015-8-06
Mobile communicator network routing decision system and method 2013-10-16 2015-4-16
Securing an Encryption Key of a User Device While Preserving Simplified User … 2013-6-27 2015-1-01
Method for synchronized bgp and vrrp failover of a network device in a network 2013-6-10 2014-12-11
Method of defending a computer from malware 2013-5-26 2014-11-27
Filtering of applications for access to an enterprise network 2013-5-26 2015-12-08 2015-12-08
Location-aware rate-limiting method for mitigation of denial-of-service attacks 2013-5-23 2014-11-27
Simultaneous screening of untrusted digital files 2013-2-17 2014-8-21
Natural language processing interface for network security administration 2012-12-06 2014-6-12
Methods for detecting malicious programs using a multilayered heuristics … 2012-11-26 2013-5-09
Penalty box for mitigation of denial-of-service attacks 2012-11-21 2014-5-22
Security device used together with commodity 2012-10-19 2013-9-18 2013-9-18
Approach for managing access to messages using encryption key management … 2012-7-19 2013-8-20 2013-8-20
Reducing false positives in data validation using statistical heuristics 2012-5-10 2015-2-17 2015-2-17
Network security smart load balancing 2012-3-28 2014-5-13 2014-5-13
Methods for inspecting security certificates by network security devices to … 2012-3-04 2014-9-30 2014-9-30
Detection of account hijacking in a social network 2011-5-18 2012-11-22
Security assembly for attachment to an object 2011-4-29 2011-11-03
Methods for intelligent NIC bonding and load-balancing 2011-3-31 2014-2-04 2014-2-04
System used for displaying a plurality of commodities 2011-3-25 2013-7-10 2013-7-10
Safety device 2011-3-10 2013-10-30 2013-10-30
System, method, and apparatus for triggering alarm 2010-9-28 2013-8-14
Scripting language processing engine in data leak prevention application 2010-7-26 2012-1-26
Methods and systems for using a vault server in conjunction with a client-side … 2009-10-20 2013-12-11
Methods for effective network-security inspection in virtualized environments 2009-7-23 2010-10-21
Methods for document-to-template matching for data-leak prevention 2009-4-02 2012-8-28 2012-8-28
Methods and device for enforcing network access control utilizing secure packet … 2009-3-19 2009-9-30
Methods and devices for packet tagging using ip indexing via dynamic-length … 2009-1-22 2010-7-22
Methods for user profiling for detecting insider threats based on internet … 2008-12-25 2010-7-01
Methods for automatic categorization of internal and external communication for … 2008-12-22 2011-11-01 2011-11-01
Methods for encrypted-traffic url filtering using address-mapping interception 2008-12-03 2010-6-03
Methods for protecting against cookie-poisoning attacks in networked- … 2008-10-28 2012-5-08 2012-5-08
System and methods providing secure workspace sessions 2008-7-17 2009-1-29
Methods for hooking applications to monitor and prevent execution of security- … 2008-7-02 2010-1-07
Methods for automatically generating natural-language news items from log files … 2008-5-20 2009-11-26
Devices and methods for providing network access control utilizing traffic- … 2008-5-04 2009-11-05
Syslog parser 2007-10-22 2016-11-01 2016-11-01
Network Security Smart Load Balancing Using A Multiple Processor Device 2007-3-29 2007-8-02
Selective passive address resolution learning 2006-12-15 2008-6-19
Address resolution request mirroring 2006-12-15 2008-6-19
Application Cluster In Security Gateway For High Availability And Load Sharing 2006-7-11 2008-1-17
Universal worm catcher 2006-4-28 2007-4-19
System and Methodology Protecting Against Key Logger Spyware 2006-3-30 2007-10-11
Scan by data direction 2006-2-24 2006-9-07
System and Methodology Providing Secure Workspace Environment 2005-10-14 2007-5-03
Intrusion management system and method for providing dynamically scaled … 2005-7-12 2006-2-16
Component selector 2005-6-27 2006-12-28