Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Trend Micro Incorporated patents


Recent patent applications related to Trend Micro Incorporated. Trend Micro Incorporated is listed as an Agent/Assignee. Note: Trend Micro Incorporated may have other listings under different names/spellings. We're not affiliated with Trend Micro Incorporated, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "T" | Trend Micro Incorporated-related inventors


Domain classification

In one example in accordance with the present disclosure, a method for domain classification includes sorting a set of sample domains into leaves based on syntactical features of the domains. Each sample domain belongs to a family of domains. ... Trend Micro Incorporated

Intelligent logging

Examples relate to intelligent logging in a system. One example enables monitoring a set of critical processes of the system, responsive to a first process parameter of a first critical process exceeding a corresponding first parameter threshold, changing a first process log level associated with the critical process from a first log level to a second log level; and logging information related to the first critical process by: obtaining a second set of information associated with the second log level, wherein the second set of information is different from a first set of information associated with the first log level.. ... Trend Micro Incorporated

Network traffic pattern based machine readable instruction identification

According to an example, network traffic pattern based identification may include analyzing each packet of a plurality of packets that are outgoing from and/or incoming to an entity to respectively determine features within a sequence of outgoing packets and/or a sequence of incoming packets of the plurality of packets. Network traffic pattern based identification may further include analyzing the determined features by respectively using an outgoing packet classification model and/or an incoming packet classification model, and classifying, based on the analysis of the features.. ... Trend Micro Incorporated

Proxy-controlled compartmentalized database access

A technique includes controlling compartmentalized access to a database, including, in a proxy for the database, mapping a user to a set of available query resources based at least in part on at least one credential provided by the user. Controlling the compartmentalized access to the database also includes exposing the set of available query resources to the user for selection based at least in part on the mapping. ... Trend Micro Incorporated

Randomized heap allocation

Examples relate to randomized heap allocation. One example enables creating a set of heaps for an application; allocating an array for the application, wherein the application comprises a set of object types, the array comprises a set of elements, and each element of the array is associated with a unique object type of the set of object types; and initializing the array by: iterating over the array to associate each element of the array with a randomly chosen heap of the set of heaps.. ... Trend Micro Incorporated

Login failure sequence for detecting phishing

A login page of an online service is received in a user computer. False credentials, such as a false user identifier (id) and a false password, are entered into the login page to login to the online service. ... Trend Micro Incorporated

Potential blocking impacts

Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a plurality of users. ... Trend Micro Incorporated

Identifying algorithmically generated domains

Examples relate to identifying algorithmically generated domains. In one example, a computing device may: receive a query domain name; split the query domain name into an ordered plurality of portions of the query domain name, the ordered plurality of portions beginning with a first portion and ending with a last portion, the last portion including a top level domain of the query domain name; provide, in reverse order beginning with the last portion, the portions of the query domain name as input to a predictive model that has been trained to determine whether the query domain name is an algorithmically generated domain name, the determination being based on syntactic features of the query domain name; and receive, as output from the predictive model, data indicating whether the query domain name is algorithmically generated.. ... Trend Micro Incorporated

Detecting malicious code in sections of computer files

A training data set for training a machine learning module is prepared by dividing normal files and malicious files into sections. Each section of a normal file is labeled as normal. ... Trend Micro Incorporated

Extracting data from network communications

Examples relate to extracting data from network communications. In one example, a programmable hardware processor may: receive a first set of network packets; store each network packet included in the first set in a first storage device; identify, from each network packet included in a subset of the first set of network packets, data included in the network packet, the data meeting at least one condition defined by first programmable logic of the programmable hardware processor; and for each network packet included in the subset: extract, from the network packet, data of interest; and store, in a second storage device, i) the extracted data of interest, and ii) an identifier associated with the network packet.. ... Trend Micro Incorporated

Organizing and storing network communications

Examples relate to organizing and storing network communications. In one example, a programmable hardware processor may: receive a first set of network packets; identify, for each network packet included in the first set, a network flow, each network flow including at least one related packet; store each network packet included in a subset of the first set in a first data storage device; for each network packet included in the subset, organize the network packet according to the network flow identified for the network packet; identify, from the network flows, a set of network flows that each have at least one characteristic of interest; and store, in a second data storage device, each network packet included in each network flow of the set of network flows.. ... Trend Micro Incorporated

Hierarchical classifiers

Examples relate to providing hierarchical classifiers. In some examples, a superclass classifier of a hierarchy of classifiers is trained with a first type of prediction threshold, where the superclass classifier classifies data into one of a number of subclasses. ... Trend Micro Incorporated

Login failure sequence for detecting phishing

A login page of an online service is received in a user computer. False credentials, such as a false user identifier (id) and a false password, are entered into the login page to login to the online service. ... Trend Micro Incorporated

Dynamic provisioning of protection software in a host intrusion prevention system

Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security manager supporting a respective subset of the computers, maintains protection software containing filters and rules for deploying each filter. ... Trend Micro Incorporated

04/27/17 / #20170118243

Phishing detection by login page census

A system for detecting phishing includes a phishing detection system that generates census of login pages received in different computers of different end users. An end user computer receives a login page and retrieves census information of the login page, such as from the phishing detection system. ... Trend Micro Incorporated

04/13/17 / #20170104790

Security policy based on risk

In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned to a group associated with the security policy when the risk assessment achieves the risk level of the security policy.. . ... Trend Micro Incorporated

04/06/17 / #20170099306

Detection of advanced persistent threat attack on a private computer network

A system for detecting an advanced persistent threat (apt) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization. ... Trend Micro Incorporated

03/09/17 / #20170070518

Advanced persistent threat identification

Various apparatuses and methods are usable to identify an advanced persistent threat (apt). Various network packets may be subjected to a suitable behavioral analysis to identify such apts. ... Trend Micro Incorporated

02/16/17 / #20170048149

Determining a load distribution for data units at a packet inspection device

A load distribution for data units received by a particular packet inspection device that is part of a collection of packet inspection devices is determined, where the packet inspection devices in the collection are to examine content of corresponding received data units. For corresponding data units received by the particular packet inspection device, the determined load distribution favors keeping the corresponding data units at the particular packet inspection device. ... Trend Micro Incorporated

02/09/17 / #20170041136

Identification of an application based on packet size

Examples herein disclose packet size information collected over an encrypted tunnel. The examples identify an application communicated via the encrypted tunnel based on the packet size information.. ... Trend Micro Incorporated

02/02/17 / #20170034207

Configurable network security

According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. ... Trend Micro Incorporated

02/02/17 / #20170034189

Remediating ransomware

Methods and apparatus for ransonnware remediation are disclosed. Network traffic for at least one network user is monitored. ... Trend Micro Incorporated

01/26/17 / #20170024464

Conditional string search

A method and a system for efficient search of string patterns characterized by positional relationships in a character stream are disclosed. The method is based on grouping string patterns of a dictionary into at least two string sets and performing string search processes of a text of the character stream based on individual string sets with the outcome of a search process influencing a subsequent search process. ... Trend Micro Incorporated








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Trend Micro Incorporated in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Trend Micro Incorporated with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###