| 11470094 |
Bi-directional content replication logic for enterprise threat detection |
Thomas Kunz, Omar-Alexander Al-Hujaj, Jens Baumgart, Harish Mehta, Florian Chrosziel +1 more |
2022-10-11 |
| 11252168 |
System and user context in enterprise threat detection |
Harish Mehta, Hartwig Seifert, Thomas Kunz, Anne Jacobi, Florian Kraemer +2 more |
2022-02-15 |
| 11128651 |
Pattern creation in enterprise threat detection |
Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more |
2021-09-21 |
| 11012465 |
Realtime triggering framework |
Eugen Pritzkau, Kathrin Nos, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more |
2021-05-18 |
| 10986111 |
Displaying a series of events along a time axis in enterprise threat detection |
Wei-Guo Peng, Lin Luo, Hartwig Seifert, Nan Zhang, Harish Mehta +7 more |
2021-04-20 |
| 10681064 |
Analysis of complex relationships among information technology security-relevant entities using a network graph |
Wei-Guo Peng, Lin Luo, Eugen Pritzkau, Hartwig Seifert, Harish Mehta +7 more |
2020-06-09 |
| 10673879 |
Snapshot of a forensic investigation for enterprise threat detection |
Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel +8 more |
2020-06-02 |
| 10630705 |
Real-time push API for log events in enterprise threat detection |
Florian Chrosziel, Thomas Kunz, Kathrin Nos |
2020-04-21 |
| 10542016 |
Location enrichment in enterprise threat detection |
Harish Mehta, Hartwig Seifert, Thomas Kunz, Eugen Pritzkau, Wei-Guo Peng +5 more |
2020-01-21 |
| 10536476 |
Realtime triggering framework |
Eugen Pritzkau, Kathrin Nos, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more |
2020-01-14 |
| 10530794 |
Pattern creation in enterprise threat detection |
Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more |
2020-01-07 |
| 10482241 |
Visualization of data distributed in multiple dimensions |
Wei-Guo Peng, Eugen Pritzkau, Lin Luo, Hartwig Seifert, Thomas Kunz +8 more |
2019-11-19 |
| 10102379 |
Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes |
Hartwig Seifert, Nan Zhang, Harish Mehta, Florian Chrosziel, Hristina Dinkova +5 more |
2018-10-16 |
| 10075462 |
System and user context in enterprise threat detection |
Harish Mehta, Hartwig Seifert, Thomas Kunz, Anne Jacobi, Florian Kraemer +2 more |
2018-09-11 |
| 9396085 |
Data access logging |
Fritz Hoffmeister, Otto Boehrer, Frank Gales, Florian Chrosziel, Jona Hassforther +3 more |
2016-07-19 |
| 9037678 |
Distribution of messages in system landscapes |
Harish Mehta, Florian Chrosziel, Otto Boehrer, Joerg Kraemer, Rita Merkel +1 more |
2015-05-19 |
| 8775671 |
Managing information exchange between business entities |
Harish Mehta, Thomas Kunz, Florian Chrosziel, Otto Böhrer, Joerg Kraemer +1 more |
2014-07-08 |
| 7761396 |
Apparatus and product of manufacture for adaptive business transaction rule structures |
Matthias Weigt, Gregor Kempers |
2010-07-20 |
| 7756809 |
Apparatus and product of manufacture using execution points to select conditions and rules for business transaction processing |
Matthias Weigt, Gregor Kempers |
2010-07-13 |
| 7756808 |
Apparatus and product of manufacture for using condition data structures separately from rule data structures in business transactions |
Matthias Weigt, Gregor Kempers |
2010-07-13 |
| 7457792 |
Customizing transaction processing in a computer application by using pre-defined functions |
Matthias Weigt, Gregor Kempers |
2008-11-25 |
| 7457793 |
Investigating execution of a customized transaction process in a computer application |
Matthias Weigt, Gregor Kempers |
2008-11-25 |
| 7457794 |
Searching for customized processing rules for a computer application |
Matthias Weigt, Gregor Kempers |
2008-11-25 |