Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Trend Micro Incorporated patents


Recent patent applications related to Trend Micro Incorporated. Trend Micro Incorporated is listed as an Agent/Assignee. Note: Trend Micro Incorporated may have other listings under different names/spellings. We're not affiliated with Trend Micro Incorporated, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "T" | Trend Micro Incorporated-related inventors


Randomized heap allocation

Examples relate to randomized heap allocation. One example enables creating a set of heaps for an application; allocating an array for the application, wherein the application comprises a set of object types, the array comprises a set of elements, and each element of the array is associated with a unique... Trend Micro Incorporated

Identifying algorithmically generated domains

Examples relate to identifying algorithmically generated domains. In one example, a computing device may: receive a query domain name; split the query domain name into an ordered plurality of portions of the query domain name, the ordered plurality of portions beginning with a first portion and ending with a last... Trend Micro Incorporated

Potential blocking impacts

Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a plurality of users. The network traffic data may comprise occurrences of a reputable entity. Some of the examples further enable determining, based on the network... Trend Micro Incorporated

Login failure sequence for detecting phishing

A login page of an online service is received in a user computer. False credentials, such as a false user identifier (ID) and a false password, are entered into the login page to login to the online service. The login page is classified as phishing when the online service does... Trend Micro Incorporated

Detecting malicious code in sections of computer files

A training data set for training a machine learning module is prepared by dividing normal files and malicious files into sections. Each section of a normal file is labeled as normal. Each section of a malicious file is labeled as malicious regardless of whether or not the section is malicious.... Trend Micro Incorporated

Hierarchical classifiers

Examples relate to providing hierarchical classifiers. In some examples, a superclass classifier of a hierarchy of classifiers is trained with a first type of prediction threshold, where the superclass classifier classifies data into one of a number of subclasses. At this stage, a subclass classifier is trained with a second... Trend Micro Incorporated

Organizing and storing network communications

Examples relate to organizing and storing network communications. In one example, a programmable hardware processor may: receive a first set of network packets; identify, for each network packet included in the first set, a network flow, each network flow including at least one related packet; store each network packet included... Trend Micro Incorporated

Extracting data from network communications

Examples relate to extracting data from network communications. In one example, a programmable hardware processor may: receive a first set of network packets; store each network packet included in the first set in a first storage device; identify, from each network packet included in a subset of the first set... Trend Micro Incorporated

Login failure sequence for detecting phishing

A login page of an online service is received in a user computer. False credentials, such as a false user identifier (ID) and a false password, are entered into the login page to login to the online service. The login page is classified as phishing when the online service does... Trend Micro Incorporated

Dynamic provisioning of protection software in a host intrusion prevention system

Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security manager supporting a respective subset of the computers, maintains protection software containing filters and rules for deploying each filter. A local server receives updated protection software... Trend Micro Incorporated

Phishing detection by login page census

A system for detecting phishing includes a phishing detection system that generates census of login pages received in different computers of different end users. An end user computer receives a login page and retrieves census information of the login page, such as from the phishing detection system. The census information... Trend Micro Incorporated

Security policy based on risk

In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned to a group associated with the security policy when the risk assessment achieves the risk level of the security policy.... Trend Micro Incorporated

Detection of advanced persistent threat attack on a private computer network

A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network.... Trend Micro Incorporated

Advanced persistent threat identification

Various apparatuses and methods are usable to identify an Advanced Persistent Threat (APT). Various network packets may be subjected to a suitable behavioral analysis to identify such APTs. Upon identifying an APT, a response is initiated which may include sending attack messages to various devices in the network.... Trend Micro Incorporated

Determining a load distribution for data units at a packet inspection device

A load distribution for data units received by a particular packet inspection device that is part of a collection of packet inspection devices is determined, where the packet inspection devices in the collection are to examine content of corresponding received data units. For corresponding data units received by the particular... Trend Micro Incorporated

Identification of an application based on packet size

Examples herein disclose packet size information collected over an encrypted tunnel. The examples identify an application communicated via the encrypted tunnel based on the packet size information.... Trend Micro Incorporated

Remediating ransomware

Methods and apparatus for ransonnware remediation are disclosed. Network traffic for at least one network user is monitored. A data signature is detected, indicating that one network user has been infected by a ransonnware application. An encryption key is extracted from the detected data signature. The encryption key is stored... Trend Micro Incorporated

Configurable network security

According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received... Trend Micro Incorporated

Conditional string search

A method and a system for efficient search of string patterns characterized by positional relationships in a character stream are disclosed. The method is based on grouping string patterns of a dictionary into at least two string sets and performing string search processes of a text of the character stream... Trend Micro Incorporated








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Trend Micro Incorporated in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Trend Micro Incorporated with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###