new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)





Similar
Filing Names

Check Point Software Technologies Ltd
Check Point Software Technologies Ltd t
Check Point Software Technologies Ltd_20100107
  

Check Point Software Technologies Ltd patents

Recent patent applications related to Check Point Software Technologies Ltd. Check Point Software Technologies Ltd is listed as an Agent/Assignee. Note: Check Point Software Technologies Ltd may have other listings under different names/spellings. We're not affiliated with Check Point Software Technologies Ltd, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Check Point Software Technologies Ltd-related inventors




Date Check Point Software Technologies Ltd patents (updated weekly) - BOOKMARK this page
04/13/17Web injection protection method and system
12/29/16Proxy for mitigation of attacks exploiting misconfigured or compromised web servers
12/15/16Protection of communication on a vehicular network via a remote security service
10/13/16Server and gateway for filtering push notifications according to user preferences
10/06/16Method for protection of automotive components in intravehicle communication system
10/06/16Method and system for modifying http request headers without terminating the connection
09/01/16Method for mitigation of unauthorized data transfer over domain name service (dns)
07/14/16Method and system for destroying browser-based memory corruption vulnerabilities
06/30/16Method for file scrubbing in a security gateway for threat prevention
04/07/16Optimization of data locks for improved write lock performance and cpu cache usage in mulit core architectures
03/31/16Duplicate-free item creation using ews by a single client
08/06/15Ews optimized paged item loading
07/02/15Server and gateway for filtering push notifications according to user preferences
01/15/15Network host provided security system for local networks
01/01/15Securing an encryption key of a user device while preserving simplified user experience
11/27/14Location-aware rate-limiting mitigation of denial-of-service attacks
08/21/14Simultaneous screening of untrusted digital files
06/12/14Natural language processing interface for network security administration
05/22/14Penalty box for mitigation of denial-of-service attacks
05/01/14Filtering of applications for access to an enterprise network
11/14/13Reducing false positives in data validation using statistical heuristics
06/20/13Predictive synchronization for clustered devices
05/09/13Methods for detecting malicious programs using a multilayered heuristics approach
11/22/12Detection of account hijacking in a social network
11/22/12Network security smart load balancing
06/28/12Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
03/08/12Predictive synchronization for clustered devices
01/26/12Scripting language processing engine in data leak prevention application
07/21/11Methods for intelligent nic bonding and load-balancing
12/30/10Methods for detecting malicious programs using a multilayered heuristics approach
10/21/10Methods for effective network-security inspection in virtualized environments
10/07/10Methods for document-to-template matching for data-leak prevention
07/22/10Methods and devices for packet tagging using ip indexing via dynamic-length prefix code
07/22/10Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
07/01/10Methods for user profiling for detecting insider threats based on internet search patterns and forensics of search keywords
06/24/10Methods for automatic categorization of internal and external communication for preventing data loss
06/03/10Methods for encrypted-traffic url filtering using address-mapping interception
05/20/10Methods and systems for using a vault server in conjunction with a client-side restricted-execution vault-mail environment
04/29/10Methods for protecting against cookie-poisoning attacks in networked-communication applications
02/25/10Methods for intelligent nic bonding and load-balancing
01/07/10Methods for hooking applications to monitor and prevent execution of security-sensitive operations
11/26/09Methods for automatically generating natural-language news items from log files and status traces
11/05/09Devices and methods for providing network access control utilizing traffic-regulation hardware
10/01/09Methods and devices for enforcing network access control utilizing secure packet tagging
05/07/09Syslog parser
01/07/10Methods for hooking applications to monitor and prevent execution of security-sensitive operations
07/02/15Server and gateway for filtering push notifications according to user preferences







ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Check Point Software Technologies Ltd in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Check Point Software Technologies Ltd with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###




';