new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)


Dell Software Inc patents

Recent patent applications related to Dell Software Inc. Dell Software Inc is listed as an Agent/Assignee. Note: Dell Software Inc may have other listings under different names/spellings. We're not affiliated with Dell Software Inc, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "D" | Dell Software Inc-related inventors

Date Dell Software Inc patents (updated weekly) - BOOKMARK this page
05/25/17 new patent  Efficient string search
05/18/17Continuous data backup using real time delta storage
05/18/17Identification of content by metadata
05/18/17Method to enable deep packet inspection (dpi) in openflow-based software defined network (sdn)
05/18/17Cloud-based gateway security scanning
05/11/17Method and an apparatus to perform multiple packet payloads analysis
05/11/17Firewall informed by web server security policy identifying authorized resources and hosts
05/11/17Document link migration
05/11/17Platform for administration of personal health information
05/04/17Image based spam blocking
04/27/17Packet processing on a multi-core processor
04/27/17Secure neighbor discovery (send) using pre-shared key
04/27/17Securing internet of things communications across multiple vendors
04/27/17Query interface to policy server
04/27/17Email and identity migration based on multifactor relationship data provided by users and systems
04/13/17Using distinguishing properties to classify messages
04/13/17Managing persistent cookies on a corporate web portal
04/13/17Identity authentication using multiple devices
04/06/17Single login authentication for users with multiple ipv4/ipv6 addresses
04/06/17Collecting and transmitting diagnostics information from problematic devices
04/06/17Folders that employ dynamic user training rules to organize content
03/30/17Notification for reassembly-free file scanning
03/30/17Combining a set of risk factors to produce a total risk score within a risk engine
03/09/17Automatically applying data loss prevention rules during migration
03/09/17Providing controlled access to admin credentials during a migration
03/09/17Governance policy framework for cloud resources
03/02/17Optimized and consistent replication of file overwrites
03/02/17During an email migration, converting distribution list messages into single-instanced content within a collaboration platform group
02/16/17Method for performing in-database distributed advanced predictive analytics modeling via common queries
02/09/17Adaptive core grouping
02/09/17Unified source user checking of tcp data packets for network data leakage prevention
02/09/17Read-ahead on signed connections with unsigning, inline, transparent proxies
02/02/17Social media login and interaction management
12/22/16Account-based software upgrades in a multi-tenant ecosystem
12/15/16Dynamically optimizing data access patterns using predictive crowdsourcing
12/08/16Migrate nickname cache for email systems and devices
12/08/16Determine confidence of mail archive ownership from senders in "sent items" folder
12/08/16Selectively suppress or throttle migration of data across wan connections
12/08/16Migration enhanced by presence, instant messaging, and last log-on time
12/01/16Reducing transmission pathway lengths within a distributed network
12/01/16Data fingerprint strengthening
12/01/16Method and apparatus to extrapolate sarcasm and irony using multi-dimensional machine learning based linguistic analysis
12/01/16Content-based encryption keys
11/24/16Method for determining predictive response time across enterprise communication systems
11/24/16Processing unknown or unexpected properties encountered during migration or archiving operations
11/17/16Method and apparatus to perform native distributed analytics using metadata encoded decision engine in real time
11/10/16Two stage memory allocation using a cache
11/10/16Method of optimizing complex sql statements using a region divided preferential sql rewrite operation
11/03/16Method and centralized policy programming and distributive policy enforcement
11/03/16Requesting web pages and content rating information
11/03/16Access to disparate cloud services
10/27/16Partitioning target data to improve data replication performance
10/27/16Sql join plan representation
10/27/16Detecting shared or compromised credentials through analysis of simultaneous actions
10/27/16Detecting unauthorized, risky, or inefficient usage of privileged credentials through analysis of remote shell protocol bandwidth
10/20/16Graph theory and network analytics and diagnostics for process optimization in manufacturing
10/20/16Method and system to enhance social engagement accuracy by developing a virtual hierarchy of target organization
10/20/16Enhanced management of migration and archiving operations
10/13/16Device control using a secure decentralized transactional ledger
10/13/16Usage and symptom oriented sql statement optimization
09/29/16Statistical message classifier
09/29/16Automatic optimization of continuous processes
09/29/16Adaptive sampling via adaptive optimal experimental designs to extract maximum information from large data repositories
09/22/16Message distribution control
09/15/16Method and system for destroying sensitive enterprise data on portable devices
Patent Packs
09/15/16Automated large file processing with embedded visual cues
09/01/16Virtual private network dead peer detection
08/25/16File and move data to shrink datafiles
08/11/16Time zero classification of messages
08/04/16Message recommendation using word isolation and clustering
08/04/16Logical level predictive caching in relational databases
07/28/16Dynamic bypass of tls connections matching exclusion list in dpi-ssl in a nat deployment
07/28/16Dynamically partitioning a mailing list based on a-priori categories and contextual analysis
07/21/16Message challenge response
07/14/16Signature generation using message summaries
07/07/16Milestone based dynamic multiple watchdog timeouts and early failure detection
07/07/16Optimizing transfer of fragmented packetized data
06/30/16Secure neighbor discovery (send) using pre-shared key
06/23/16Method and multimedia content filtering
05/12/16Automated large attachment processing during migration
Patent Packs
05/05/16Managing infectious forwarded messages
04/28/16Identification of content by metadata
04/07/16Efficient use of resources in message classification
04/07/16Reputation-based threat protection
03/31/16Method to enable deep packet inspection (dpi) in openflow-based software defined network (sdn)
03/17/16Using distinguishing properties to classify messages
03/17/16Net- based email filtering
02/18/16Cloud-based gateway security scanning
01/28/16Packet processing on a multi-core processor
01/28/16Real-time network updates for malicious content
12/24/15Method and resource locator identifier rewrite
12/17/15Method and an apparatus to perform multi-connection traffic analysis and management
12/10/15On-the-fly pattern recognition with configurable bounds
12/03/15Method and an apparatus to perform multiple packet payloads analysis
11/26/15Processing a message based on a boundary ip address and decay variable
11/26/15Probability based whitelist
11/19/15Centralized wireless lan load balancing
10/15/15Method and apparatus to perform multiple packet payloads analysis
12/25/14Systems and methods for managing policies on a computer
04/03/14Data metric resolution ranking system and method
04/03/14Data metric resolution prediction system and method
02/06/14System for provisioning, allocating, and managing virtual and physical desktop computers in a network computing environment
01/09/14Systems and methods for managing policies on a computer

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Dell Software Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Dell Software Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by