CHECK POINT SOFTWARE TECHNOLOGIES, INC.

Patent Owner

Compare

Stats

Details

Technologies

Intl Class Technology # of Patents Rank
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 21307
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 8168
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION150
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 1163

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2013/0003,978 Approach For Managing Access To Messages Using Encryption Key Management PoliciesJul 19, 12Jan 03, 13[H04L]
2011/0007,902 Approach for managing access to messages using encryption key management policiesSep 13, 10Jan 13, 11[H04L]
2010/0024,036 System and Methods Providing Secure Workspace SessionsJul 20, 07Jan 28, 10[G06F]
2008/0144,532 Address resolution request mirroringDec 15, 06Jun 19, 08[H04L]
2008/0144,634 Selective passive address resolution learningDec 15, 06Jun 19, 08[H04L]
2007/0240,212 System and Methodology Protecting Against Key Logger SpywareMar 30, 06Oct 11, 07[G06F]
2007/0101,435 System and Methodology Providing Secure Workspace EnvironmentOct 14, 05May 03, 07[H04N, H04K, H04L, G06F, H03M, G08B, G06K]
2006/0168,014 Highly extendable message filtering daemon for a network applianceNov 30, 04Jul 27, 06[G06F]
2006/0143,700 Security System Providing Methodology for Cooperative Enforcement of Security Policies During SSL SessionsApr 25, 05Jun 29, 06[G06F]
2006/0059,370 Architecture for routing and IPSec integrationSep 15, 04Mar 16, 06[G06F]

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,515,081 Approach for managing access to messages using encryption key management policiesJul 19, 12Aug 20, 13[H04L, G06F]
8,281,114 Security system with methodology for defending against security breaches of peripheral devicesDec 23, 03Oct 02, 12[H04N, G06F]
8,230,223 Approach for managing access to messages using encryption key management policiesSep 13, 10Jul 24, 12[H04L]
8,200,818 System providing internet access management with router-based policy enforcementAug 30, 01Jun 12, 12[G06F]
8,136,149 Security system with methodology providing verified secured individual end pointsMar 29, 05Mar 13, 12[H04L]
8,136,155 Security system with methodology for interprocess communication controlSep 12, 03Mar 13, 12[H04L]
8,074,277 System and methodology for intrusion detection and preventionMar 29, 05Dec 06, 11[G06F, G08B]
7,885,180 Address resolution request mirroringDec 15, 06Feb 08, 11[G06F]
7,788,726 System and methodology providing information lockboxOct 15, 03Aug 31, 10[H04L, G06F]
7,769,862 Method and system for efficiently failing over interfaces in a networkDec 19, 03Aug 03, 10[G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
2008/0144,634 Selective passive address resolution learningDec 15, 06Jun 19, 08[H04L]
2007/0240,212 System and Methodology Protecting Against Key Logger SpywareMar 30, 06Oct 11, 07[G06F]
2006/0168,014 Highly extendable message filtering daemon for a network applianceNov 30, 04Jul 27, 06[G06F]
2006/0013,242 Cluster control marker data structureJun 30, 04Jan 19, 06[H04L]
2006/0002,393 Primary control marker data structureJun 30, 04Jan 05, 06[H04L]
2005/0268,151 System and method for maximizing connectivity during network failures in a cluster systemApr 28, 04Dec 01, 05[G06F]
2005/0144,144 System and method for authenticating a terminal based upon at least one characteristic of the terminal located at a position within an organizationDec 30, 03Jun 30, 05[G06F]
2004/0266,420 System and method for secure mobile connectivityJun 24, 03Dec 30, 04[H04M, H04L, H04Q]
2004/0267,910 Single-point management system for devices in a clusterJun 24, 03Dec 30, 04[G06F]
2004/0215,578 Controlling usage of system resources by a network managerApr 09, 03Oct 28, 04[H04L, G06F]
2004/0210,892 Dynamic routing on networksDec 18, 03Oct 21, 04[G06F]
2004/0172,622 Systems, methods and computer program products for performing a task in a software applicationFeb 28, 03Sep 02, 04[G06F]
2004/0107,360 System and Methodology for Policy EnforcementMar 13, 03Jun 03, 04[H04L]

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!