CHECK POINT SOFTWARE TECHNOLOGIES, INC.
Patent Owner
Stats
- 34 US PATENTS IN FORCE
- 0 US APPLICATIONS PENDING
- Jul 01, 2014 most recent publication
Details
- 34 Issued Patents
- 0 Issued in last 3 years
- 0 Published in last 3 years
- 7,433 Total Citation Count
- May 06, 1997 Earliest Filing
- 13 Expired/Abandoned/Withdrawn Patents
Patent Activity in the Last 10 Years
Technologies
Intl Class
Technology
Matters
Rank in Class
Top Patents (by citation)
Upgrade to the Professional Level to View Top Patents for this Owner. Learn More |
Recent Publications
- No Recent Publications to Display
Recent Patents
Patent #
Title
Filing Date
Issue Date
Intl Class
8515081 Approach for managing access to messages using encryption key management policiesJul 19, 12Aug 20, 13[H04L, G06F]
8281114 Security system with methodology for defending against security breaches of peripheral devicesDec 23, 03Oct 02, 12[H04N, G06F]
8230223 Approach for managing access to messages using encryption key management policiesSep 13, 10Jul 24, 12[H04L]
8200818 System providing internet access management with router-based policy enforcementAug 30, 01Jun 12, 12[G06F]
8136149 Security system with methodology providing verified secured individual end pointsMar 29, 05Mar 13, 12[H04L]
8136155 Security system with methodology for interprocess communication controlSep 12, 03Mar 13, 12[H04L]
8074277 System and methodology for intrusion detection and preventionMar 29, 05Dec 06, 11[G08B, G06F]
7796760 Approach for managing access to messages using encryption key management policiesFeb 19, 08Sep 14, 10[H04L, G06F]
Expired/Abandoned/Withdrawn Patents
Patent #
Title
Status
Filing Date
Issue/Pub Date
Intl Class
2007/0240,212 System and Methodology Protecting Against Key Logger SpywareAbandonedMar 30, 06Oct 11, 07[G06F]
2006/0168,014 Highly extendable message filtering daemon for a network applianceAbandonedNov 30, 04Jul 27, 06[G06F]
2005/0268,151 System and method for maximizing connectivity during network failures in a cluster systemAbandonedApr 28, 04Dec 01, 05[G06F]
2005/0144,144 System and method for authenticating a terminal based upon at least one characteristic of the terminal located at a position within an organizationAbandonedDec 30, 03Jun 30, 05[G06F]
2004/0266,420 System and method for secure mobile connectivityAbandonedJun 24, 03Dec 30, 04[H04M, H04L, H04Q]
2004/0267,910 Single-point management system for devices in a clusterAbandonedJun 24, 03Dec 30, 04[G06F]
2004/0215,578 Controlling usage of system resources by a network managerAbandonedApr 09, 03Oct 28, 04[H04L, G06F]
2004/0172,622 Systems, methods and computer program products for performing a task in a software applicationAbandonedFeb 28, 03Sep 02, 04[G06F]
Top Inventors for This Owner
Upgrade to the Professional Level to View Top Inventors for this Owner. Learn More |
We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!
We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.