Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11470094 | Bi-directional content replication logic for enterprise threat detection | Thomas Kunz, Omar-Alexander Al-Hujaj, Jens Baumgart, Harish Mehta, Florian Chrosziel +1 more | 2022-10-11 |
| 11252168 | System and user context in enterprise threat detection | Harish Mehta, Hartwig Seifert, Thomas Kunz, Anne Jacobi, Florian Kraemer +2 more | 2022-02-15 |
| 11128651 | Pattern creation in enterprise threat detection | Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more | 2021-09-21 |
| 11012465 | Realtime triggering framework | Eugen Pritzkau, Kathrin Nos, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more | 2021-05-18 |
| 10986111 | Displaying a series of events along a time axis in enterprise threat detection | Wei-Guo Peng, Lin Luo, Hartwig Seifert, Nan Zhang, Harish Mehta +7 more | 2021-04-20 |
| 10681064 | Analysis of complex relationships among information technology security-relevant entities using a network graph | Wei-Guo Peng, Lin Luo, Eugen Pritzkau, Hartwig Seifert, Harish Mehta +7 more | 2020-06-09 |
| 10673879 | Snapshot of a forensic investigation for enterprise threat detection | Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel +8 more | 2020-06-02 |
| 10630705 | Real-time push API for log events in enterprise threat detection | Florian Chrosziel, Thomas Kunz, Kathrin Nos | 2020-04-21 |
| 10542016 | Location enrichment in enterprise threat detection | Harish Mehta, Hartwig Seifert, Thomas Kunz, Eugen Pritzkau, Wei-Guo Peng +5 more | 2020-01-21 |
| 10536476 | Realtime triggering framework | Eugen Pritzkau, Kathrin Nos, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more | 2020-01-14 |
| 10530794 | Pattern creation in enterprise threat detection | Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more | 2020-01-07 |
| 10482241 | Visualization of data distributed in multiple dimensions | Wei-Guo Peng, Eugen Pritzkau, Lin Luo, Hartwig Seifert, Thomas Kunz +8 more | 2019-11-19 |
| 10102379 | Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes | Hartwig Seifert, Nan Zhang, Harish Mehta, Florian Chrosziel, Hristina Dinkova +5 more | 2018-10-16 |
| 10075462 | System and user context in enterprise threat detection | Harish Mehta, Hartwig Seifert, Thomas Kunz, Anne Jacobi, Florian Kraemer +2 more | 2018-09-11 |
| 9396085 | Data access logging | Fritz Hoffmeister, Otto Boehrer, Frank Gales, Florian Chrosziel, Jona Hassforther +3 more | 2016-07-19 |
| 9037678 | Distribution of messages in system landscapes | Harish Mehta, Florian Chrosziel, Otto Boehrer, Joerg Kraemer, Rita Merkel +1 more | 2015-05-19 |
| 8775671 | Managing information exchange between business entities | Harish Mehta, Thomas Kunz, Florian Chrosziel, Otto Böhrer, Joerg Kraemer +1 more | 2014-07-08 |
| 7761396 | Apparatus and product of manufacture for adaptive business transaction rule structures | Matthias Weigt, Gregor Kempers | 2010-07-20 |
| 7756809 | Apparatus and product of manufacture using execution points to select conditions and rules for business transaction processing | Matthias Weigt, Gregor Kempers | 2010-07-13 |
| 7756808 | Apparatus and product of manufacture for using condition data structures separately from rule data structures in business transactions | Matthias Weigt, Gregor Kempers | 2010-07-13 |
| 7457792 | Customizing transaction processing in a computer application by using pre-defined functions | Matthias Weigt, Gregor Kempers | 2008-11-25 |
| 7457793 | Investigating execution of a customized transaction process in a computer application | Matthias Weigt, Gregor Kempers | 2008-11-25 |
| 7457794 | Searching for customized processing rules for a computer application | Matthias Weigt, Gregor Kempers | 2008-11-25 |