new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)





Similar
Filing Names

Fortinet Inc
Fortinet Inc A Delaware Corporation
Fortinet Inc_20131212
Fortinet Inc_20100114
  

Fortinet Inc patents

Recent patent applications related to Fortinet Inc. Fortinet Inc is listed as an Agent/Assignee. Note: Fortinet Inc may have other listings under different names/spellings. We're not affiliated with Fortinet Inc, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "F" | Fortinet Inc-related inventors




Date Fortinet Inc patents (updated weekly) - BOOKMARK this page
04/20/17 new patent  Examining and controlling ipv6 extension headers
04/20/17 new patent  System and software defined behavioral ddos attack mitigation
04/13/17Identifying nodes in a ring network
04/13/17Facilitating content accessibility via different communication formats
04/06/17Secure cloud storage distribution and aggregation
03/30/17Inline inspection of security protocols
03/30/17Tunnel interface for securing traffic over a network
03/30/17Centralized management and enforcement of online behavioral tracking policies
03/30/17Power saving in wi-fi devices utilizing bluetooth
03/23/17Directed station roaming in cloud managed wi-fi network
03/09/17Self-provisioning of a wireless communication network using coordination of data plane behavior to steer stations to preferred access points
03/09/17Steering connection requests for an access point to a best-serving access point
03/02/17Secure cloud storage distribution and aggregation
03/02/17Detection of fraudulent certificate authority certificates
03/02/17Data leak protection
03/02/17Interface groups for rule-based network security
03/02/17Firewall interface configuration to enable bi-directional voip traversal communications
03/02/17Metadata information based file processing
02/23/17Polarity recognition and swapping for dc powered devices
02/23/17Detecting network traffic content
02/16/17Security information and event management
02/09/17High-availability cluster architecture and protocol
02/09/17Context-aware pattern matching accelerator
02/09/17Cache management based on factors relating to replacement cost of data
02/02/17Providing security in a communication network
01/26/17Detection of fraudulent digital certificates
01/26/17Detection of fraudulent digital certificates
01/26/17Detection of spoof attacks on location broadcasting beacons
01/12/17Managing transfer of data in a data network
01/05/17Dynamic generation of per-station realm lists for hot spot connections
12/29/16Utm integrated hypervisor for virtual machines
12/29/16Systems and methods for detecting undesirable network traffic content
12/29/16Emulator-based malware learning and detection
12/29/16Updating content detection devices and systems
12/29/16Hardware based detection devices for detecting network traffic content and methods of using the same
12/29/16Protocol based detection of suspicious network traffic
12/29/16Increasing access point throughput by exceeding a-mpdu buffer size limitation in a 802.11 compliant station
12/22/16Flow management in a link aggregation group system
12/22/16Management of certificate authority (ca) certificates
12/22/16Human user verification of high-risk network access
12/22/16Automatically deployed wireless network
12/22/16Automatically deployed wireless network
12/15/16Network advertising system
12/15/16Cloud based logging service
12/15/16Network advertising system
12/08/16Load balancing among a cluster of firewall security devices
12/08/16Load balancing among a cluster of firewall security devices
12/01/16Managing transmission and storage of sensitive data
12/01/16Virtual memory protocol segmentation offloading
12/01/16Managing transmission and storage of sensitive data
11/24/16Content presentation based on access point location
11/24/16Inheritance based network management
11/24/16Firewall policy management
11/24/16Data leak protection in upper layer protocols
11/17/16Access point stream and video surveillance stream based object location detection and activity analysis
11/17/16Filtering hidden data embedded in media files
11/17/16Direct cache access for network input/output devices
11/03/16Web proxy
11/03/16Web proxy
11/03/16Deployment and configuration of access points
10/27/16Dhcp agent assisted routing and access control
10/20/16Heterogeneous media packet bridging
10/20/16Hardware-logic based flow collector for distributed denial of service (ddos) attack mitigation
10/13/16Calculating consecutive matches using parallel computing
10/13/16Virus co-processor instructions and methods for using such
Patent Packs
10/06/16Detecting and preventing flooding attacks in a network environment
10/06/16Load balancing in a network with session information
09/29/16Hardware-accelerated packet multicasting
09/29/16Calculating consecutive matches using parallel computing
09/29/16Http proxy
09/29/16Rule based cache processing in application delivery controller for load balancing
09/29/16Http proxy
09/22/16Application-based network packet forwarding
09/22/16Security threat detection
09/15/16Policy-based selection of remediation
09/15/16Hardware accelerator for packet classification
09/15/16Intelligent telephone call routing
09/15/16Intelligent telephone call routing
09/08/16Location-based network security
09/08/16Cloud-based security policy configuration
Patent Packs
09/08/16Soft token system
09/01/16Method and system for dedicating processors for desired tasks
09/01/16Secure system for allowing the execution of authorized computer program code
09/01/16Securing email communications
09/01/16Enforcing compliance with a policy on a client
08/18/16Management of wireless access points via virtualization
08/11/16Mobile malware detection and user notification
08/11/16Filtering hidden data embedded in media files
08/11/16Virtual memory protocol segmentation offloading
08/04/16Managing transmission and storage of sensitive data
08/04/16Scalable ip-services enabled multicast forwarding with efficient resource utilization
07/28/16Network advertising system
07/28/16Network advertising system
07/21/16Load balancing among a cluster of firewall security devices
07/14/16Centralized management of access points
07/07/16Service processing switch
07/07/16Service processing switch
07/07/16Mechanism for enabling layer two host addresses to be shielded from the switches in a network
07/07/16Heterogeneous media packet bridging
07/07/16Firewall policy management
07/07/16Policy-based configuration of internet protocol security for a virtual private network
07/07/16Application layer-based single sign on
06/30/16Dynamically optimized security policy management
06/30/16Cloud based logging service
06/30/16Facilitating content accessibility via different communication formats
06/23/16Abnormal behaviour and fraud detection based on electronic medical records
06/23/16Load balancing in a network with session information
06/23/16Location-based network security
06/16/16Presentation of threat history associated with network activity
06/16/16Management of certificate authority (ca) certificates
Social Network Patent Pack
06/09/16Examining and controlling ipv6 extension headers
06/09/16Rogue access point detection
06/09/16Near real-time detection of denial-of-service attacks
06/09/16Stand-by controller assisted failover
05/26/16Network address translation
05/26/16Application control
05/19/16Tunnel interface for securing traffic over a network
05/12/16Secure system for allowing the execution of authorized computer program code
05/12/16Virtual memory protocol segmentation offloading
05/05/16Computerized advanced network content processing
Patent Packs
04/21/16Load balancing among a cluster of firewall security devices
04/21/16Human user verification of high-risk network access
04/14/16Selecting among multiple concurrently active paths through a network
04/14/16Data leak protection in upper layer protocols
04/07/16Virus co-processor instructions and methods for using such
04/07/16Data leak protection
03/31/16Mobile hotspot managed by access controller
03/31/16Direct cache access for network input/output devices
03/31/16Mobile hotspot managed by access controller
03/24/16Load balancing in a network with session information
03/24/16Cache-based wireless client authentication
03/24/16Cache-based wireless client authentication
03/17/16Interface groups for rule-based network security
03/17/16Hardware-logic based flow collector for distributed denial of service (ddos) attack mitigation
03/17/16Wireless radio access point configuration
03/17/16Wireless radio access point configuration
03/03/16Cloud based logging service
02/11/16Automated configuration of endpoint security management
02/04/16Automated configuration of endpoint security management
02/04/16Dns-enabled communication between heterogeneous devices
01/28/16Financial information exchange (fix) protocol based load balancing
01/21/16Scalable ip-services enabled multicast forwarding with efficient resource utilization
01/21/16Tunnel interface for securing traffic over a network
01/14/16Systems and methods for passing network traffic content
01/14/16Integrated security switch
12/31/15Socket application program interface (api) for efficient data transactions
12/24/15Firewall policy management
12/17/15Secure cloud storage distribution and aggregation
12/17/15Secure cloud storage distribution and aggregation
12/10/15Identifying nodes in a ring network
Patent Packs
12/10/15Policy-based selection of remediation
12/03/15Content filtering of remote file-system access protocols
12/03/15Telecommunication terminal
11/26/15Automated configuration of endpoint security management
11/26/15Computerized deployment of management tunnels
11/26/15Scalable inline behavioral ddos attack mitigation
11/19/15Network interface card rate limiting
11/19/15Operation of a dual instruction pipe virus co-processor
11/19/15Accelerating data communication using tunnels
11/12/15Load balancing among a cluster of firewall security devices
11/12/15Context-aware pattern matching accelerator
11/12/15Detecting network traffic content
11/05/15Filtering hidden data embedded in media files
10/29/15Securing email communications
10/29/15Policy-based content filtering
10/29/15Soft token system
10/15/15Detection of undesired computer files using digital certificates
10/01/15Virtualization in a multi-host environment
10/01/15Scalable ip-services enabled multicast forwarding with efficient resource utilization
10/01/15Network flow analysis
Social Network Patent Pack
10/01/15Network policy assignment based on user reputation score
10/01/15Remote wireless adapter
09/24/15Efficient data transfer in a virus co-processing system
09/17/15Security information and event management
09/10/15Firewall interface configuration to enable bi-directional voip traversal communications
09/03/15Human user verification of high-risk network access
09/03/15Human user verification of high-risk network access
09/03/15Cloud-based security policy configuration
09/03/15Initial diagnostics of a network security device via a hand-held computing device
08/27/15Policy-based configuration of internet protocol security for a virtual private network
08/13/15Service processing switch
08/13/15Systems and methods for detecting and preventing flooding attacks in a network environment
07/23/15Inheritance based network management
07/09/15Secure system for allowing the execution of authorized computer program code
07/09/15Hardware-accelerated packet multicasting
07/09/15Redirection content requests
07/02/15Examining and controlling ipv6 extension headers
07/02/15Cloud based logging service
07/02/15Detecting malicious resources in a network based upon active client reputation monitoring
06/25/15Human user verification of high-risk network access
Social Network Patent Pack
06/25/15Logging attack context data
06/18/15Facilitating content accessibility via different communication formats
06/11/15Policy-based selection of remediation
06/04/15Secure cloud storage distribution and aggregation
06/04/15Scalable ip-services enabled multicast forwarding with efficient resource utilization
05/28/15Heterogeneous media packet bridging
05/28/15Detecting malicious resources in a network based upon active client reputation monitoring
05/28/15Content filtering of remote file-system access protocols
04/23/15Virtual memory protocol segmentation offloading
04/23/15Inline inspection of security protocols
04/23/15Computerized advanced network content processing
04/16/15Security information and event management
04/09/15Selecting among multiple concurrently active paths through a network
04/09/15Systems and methods for categorizing network traffic content
04/09/15Operation of a dual instruction pipe virus co-processor
04/02/15Directing clients based on communication format
04/02/15Tunnel interface for securing traffic over a network
04/02/15Method and system for dedicating processors for desired tasks
04/02/15System and software defined behavioral ddos attack mitigation
03/26/15Securing email communications
03/26/15Hardware based detection devices for detecting network traffic content and methods of using the same
02/26/15Context-aware pattern matching accelerator
02/26/15Cloud-based security policy configuration
02/19/15Computerized deployment of management tunnels
01/29/15Logging attack context data
01/29/15Logging attack context data
01/22/15Secure system for allowing the execution of authorized computer program code
01/22/15Remote wireless adapter
01/22/15Scalable inline behavioral ddos attack mitigation
01/15/15Tunnel interface for securing traffic over a network
Social Network Patent Pack
01/08/15Centralized management of access points
01/08/15Application layer-based single sign on
12/25/14Operation of a dual instruction pipe virus co-processor
11/27/14Policy-based content filtering
11/27/14Virus co-processor instructions and methods for using such
11/20/14Facilitating content accessibility via different communication formats
11/06/14Security system for physical or virtual environments
11/06/14Securing email communications
10/30/14Load balancing in a network with session information
10/09/14Routing client requests
10/09/14Policy-based selection of remediation
10/09/14Data leak protection
09/25/14System and integrated header, state, rate and content anomaly prevention for session initiation protocol
09/18/14Remote management system for configuring and/or controlling a computer network switch
09/18/14Soft token system
09/18/14Notifying users within a protected network regarding events and information
09/18/14Systems and methods for detecting and preventing flooding attacks in a network environment
09/11/14Systems and methods for categorizing network traffic content
09/11/14High-availability cluster architecture and protocol
09/11/14Method, apparatus, signals and medium for enforcing compliance with a policy on a client computer
09/11/14Systems and methods for detecting undesirable network traffic content
09/11/14Systems and methods for detecting undesirable network traffic content
09/11/14Systems and methods for detecting and preventing flooding attacks in a network environment
08/21/14Operation of a dual instruction pipe virus co-processor
08/07/14Cloud-based security policy configuration
08/07/14Firewall interface configuration to enable bi-directional voip traversal communications
06/26/14Performing rate limiting within a network
06/26/14Hardware-accelerated packet multicasting
06/26/14Secure system for allowing the execution of authorized computer program code







ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Fortinet Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Fortinet Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###




';