Webroot Inc.

United States of America

Back to Profile

1-43 of 43 for Webroot Inc. and 1 subsidiary Sort by
Query
Aggregations
IP Type
        Trademark 26
        Patent 17
Jurisdiction
        World 20
        Canada 11
        United States 9
        Europe 3
Owner / Subsidiary
[Owner] Webroot Inc. 41
Prevx Limited 2
Date
2024 1
2023 1
2021 1
2020 1
Before 2020 39
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 7
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 6
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 3
G06F 11/00 - Error detectionError correctionMonitoring 2
G06F 17/30 - Information retrieval; Database structures therefor 2
See more
NICE Class
09 - Scientific and electric apparatus and instruments 19
42 - Scientific, technological and industrial services, research and design 16
35 - Advertising and business services 6
38 - Telecommunications services 6
45 - Legal and security services; personal services for individuals. 1
Status
Pending 2
Registered / In Force 41

1.

SECURITY EVENT TRANSFORMATION AND LOGGING SYSTEMS AND METHODS

      
Application Number 18071349
Status Pending
Filing Date 2022-11-29
First Publication Date 2024-05-30
Owner WEBROOT INC. (USA)
Inventor
  • Goknel, Niyazi Eray
  • Fellner, Paul
  • Mayr, Johannes
  • Ahmed, Aqil

Abstract

Embodiments provide systems and methods for logging events. A computer-implemented method comprises receiving input for selecting one or more event types to receive from an event collector, receiving, based on the one or more event types, a plurality of security events from the event collector, transforming each of the plurality of security events to a standard format to generate a plurality of formatted security events and transmitting the plurality of formatted security events to a security information and event management (SIEM) server.

IPC Classes  ?

2.

SYSTEM AND METHOD FOR DNS TUNNELING PROTECTION

      
Application Number 18174382
Status Pending
Filing Date 2023-02-24
First Publication Date 2023-09-14
Owner WEBROOT INC. (USA)
Inventor Barnett, Jonathan Alexander Thorold

Abstract

Embodiments of systems and methods for DNS leak prevention and protection, including protection against DNS tunneling attacks, are disclosed herein. In particular, certain embodiments include a local DNS protection agent installed on a system and an associated trusted external DNS protection server. The DNS protection agent prevents DNS leaks from applications on the system such that all DNS requests from the system are confined to requests from the DNS protection agent to the associated DNS protection server. As the DNS leak prevention provided by the DNS protection agent stops applications on the system from circumventing the DNS protection server, all DNS requests originating from the system remain under the control of the DNS protection server and thus desired DNS protection (e.g., as implemented on the DNS protection server) may be maintained. Certain embodiments prevent applications from using certain DNS security protocols, such as DoH and DoT, without going through the DNS protection agent. Embodiments are also capable of detecting and addressing DNS tunneling attacks.

IPC Classes  ?

3.

SYSTEM AND METHOD FOR LEAK PREVENTION FOR DOMAIN NAME SYSTEM REQUESTS

      
Application Number US2021036779
Publication Number 2021/252742
Status In Force
Filing Date 2021-06-10
Publication Date 2021-12-16
Owner WEBROOT, INC. (USA)
Inventor Barnett, Jonathan Alexander Thorold

Abstract

Embodiments of systems and methods for DNS leak prevention and protection are disclosed herein. In particular, certain embodiments include a local DNS protection agent installed on a system and an associated trusted external DNS protection server. The DNS protection agent prevents DNS leaks from applications on the system such that all DNS requests from the system are confined to requests from the DNS protection agent to the associated DNS protection server. As the DNS leak prevention provided by the DNS protection agent stops applications on the system from circumventing the DNS protection server, all DNS requests originating from the system remain under the control of the DNS protection server and thus desired DNS protection (e.g., as implemented on the DNS protection server) may be maintained. Certain embodiments prevent applications from using certain DNS security protocols, such as DoH and DoT, without going through the DNS protection agent.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • G06F 17/22 - Manipulating or registering by use of codes, e.g. in sequence of text characters
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 21/60 - Protecting data

4.

BRIGHTCLOUD

      
Application Number 018214612
Status Registered
Filing Date 2020-03-24
Registration Date 2020-08-05
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software for providing access to a cloud computing system for protecting and securing the integrity of electronic devices and computing devices configurable to connect to the internet against viruses, malware and other threats; downloadable software for facilitating the provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to electronic devices and computing devices configurable to connect to the internet; downloadable software for classification and categorization of websites, URLs, and other internet communication objects; downloadable software for scanning, identifying, and blocking threats in electronic messages; downloadable software for analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; downloadable software for data back-up services, electronic storage and retrieval of data and information, recovery and restoration of data; downloadable software for providing on demand computing back-up services, on-line back-up services; downloadable software for providing file reputation identification and management, internet protocol reputation identification and management, real-time indication of anti-phishing services, and threat intelligence; downloadable software for the provision of mobile security, malware detection, network analysis, and incident investigation; downloadable software for providing restoration of computing devices; downloadable software for providing administrative services related to security policy; downloadable software for providing privacy protection. Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; telecommunications disaster recovery services; telecommunication system emergency response and recovery services. Software as a service for providing access to a cloud computing system for protecting and securing the integrity of electronic devices and computing devices configurable to connect to the internet against viruses, malware and other threats; software as a service as a service for facilitating the provision of secure web browsers; software as a service for restricting access to and from undesired computers networks and websites by and to electronic devices and computing devices configurable to connect to the internet; software as a service for classification and categorization of websites, URLs, and other internet communication objects; software as a service for scanning, identifying, and blocking threats in electronic messages; software as a service for analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; software as a service for data back-up services, electronic storage and retrieval of data and information, recovery and restoration of data; software as a service for providing on demand computing back-up services, on-line back-up services; software as a service for providing file reputation identification and management, internet protocol reputation identification and management, real-time indication of anti-phishing services, and threat intelligence; software as a service for the provision of mobile security, malware detection, network analysis, and incident investigation; software as a service for providing restoration of computing devices; software as a service for providing administrative services related to security policy; software as a service for providing privacy protection.

5.

DYNAMIC SENSORS

      
Application Number US2017043143
Publication Number 2018/017872
Status In Force
Filing Date 2017-07-20
Publication Date 2018-01-25
Owner WEBROOT INC. (USA)
Inventor
  • Dufour, David
  • Lonas, Hal

Abstract

Examples of the present disclosure describe systems and methods for generating dynamic sensors. In aspects, a device may be detected on a network. If the device is not recognized by the network, a generic container may be created. If the device is recognized by the network, a device-specific container may be created, and device-specific threat protection and/or a device-specific machine model may be loaded into the container. In either case, a threat intelligence model and/or an ecosystem-specific machine model may also be loaded into the container. The container may then be deployed to one or more networks. In aspects, the container may be used to analyze network traffic to sense potential threats for ecosystems comprising varying devices and topologies.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04W 12/12 - Detection or prevention of fraud

6.

AUTOMATIC INLINE DETECTION BASED ON STATIC DATA

      
Application Number US2017040711
Publication Number 2018/009537
Status In Force
Filing Date 2017-07-05
Publication Date 2018-01-11
Owner WEBROOT INC. (USA)
Inventor
  • Schmidtler, Mauritius
  • Yoosoofmiya, Reza M.
  • Theroux, Kristina

Abstract

Examples of the present disclosure describe systems and methods of automatic inline detection based on static data. In aspects, a file being received by a recipient device may be analyzed using an inline parser. The inline parser may identify sections of the file and feature vectors may be created for the identified sections. The feature vectors may be used to calculate a score corresponding to the malicious status of the file as the information is being analyzed. If a score is determined to exceed a predetermined threshold, the file download process may be terminated. In aspects, the received files, file fragments, feature vectors and/or additional data may be collected and analyzed to build a probabilistic model used to identify potentially malicious files.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

7.

REAL-TIME SCANNING OF IP ADDRESSES

      
Application Number US2016066897
Publication Number 2017/106477
Status In Force
Filing Date 2016-12-15
Publication Date 2017-06-22
Owner WEBROOT INC. (USA)
Inventor
  • Ho, Huy Dang
  • Lonas, Hal
  • Tran, Trung

Abstract

Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

8.

BINOCULAR FUSION ANALYTICS SECURITY

      
Application Number US2016062841
Publication Number 2017/087840
Status In Force
Filing Date 2016-11-18
Publication Date 2017-05-26
Owner WEBROOT INC. (USA)
Inventor
  • Wright, William
  • Kellerman, George D.

Abstract

Examples of the present disclosure describe systems and methods for identifying anomalous network behavior. In aspects, a network event may be observed network sensors. One or more characteristics may be extracted from the network event and used to construct an evidence vector. The evidence vector may be compared to a mapping of previously-identified events and/or event characteristics. The mapping may be represented as one or more clusters of expected behaviors and anomalous behaviors. The mapping may be modeled using analytic models for direction detection and magnitude detection. One or more centroids may be identified for each of the clusters. A "best fit" may be determined and scored for each of the analytic models. The scores may be fused into single binocular score and used to determine whether the evidence vector is likely to represent an anomaly.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

9.

AUTOMATIC THREAT DETECTION OF EXECUTABLE FILES BASED ON STATIC DATA ANALYSIS

      
Application Number US2016032090
Publication Number 2016/183316
Status In Force
Filing Date 2016-05-12
Publication Date 2016-11-17
Owner WEBROOT INC. (USA)
Inventor
  • Schmidtler, Mauritius
  • Dalal, Gaurav
  • Yoosoofmiya, Reza

Abstract

Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

10.

BRIGHTCLOUD

      
Application Number 1282752
Status Registered
Filing Date 2015-09-08
Registration Date 2015-09-08
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software, namely, providing access to a cloud computing system for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; downloadable software, for facilitating provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; downloadable software for providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; downloadable software for providing administrative services over policy and updates; downloadable software for providing privacy protection; downloadable computer software for providing privacy protection. Network management services; network optimisation services; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services; optimisation of information technology applications. Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; transmission of data; telecommunications disaster recovery services; telecommunication system emergency response and recovery services; advisory and consultancy services relating to telecommunications; advisory services relating to providing remote computer hardware access; advisory services relating to providing remote computer software access; advisory, information and consultancy services relating to all the aforesaid services; providing access to a cloud computing system for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats. Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; computer services, namely facilitating provision of secure web browsers; computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; computer security services, namely, providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; computer services, namely, provision of administrative services over policy and updates; computer services, namely, providing privacy protection; computer services, namely, analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; computer services, namely, analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; data storage; data back-up services; electronic storage and retrieval of data and information; recovery and restoration of data; providing on demand computing services; on-line back-up services.

11.

NETWORK THREAT PREDICTION AND BLOCKING

      
Application Number US2015036973
Publication Number 2015/200211
Status In Force
Filing Date 2015-06-22
Publication Date 2015-12-30
Owner WEBROOT INC. (USA)
Inventor
  • Lonas, Hal
  • Dufour, David
  • Witt, Chip

Abstract

A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

12.

WEBROOT

      
Application Number 1280423
Status Registered
Filing Date 2015-09-08
Registration Date 2015-09-08
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software, namely, providing access to a cloud computing system for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; downloadable software, for facilitating provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; downloadable software for providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; downloadable software for providing administrative services over policy and updates; downloadable software for providing privacy protection; downloadable computer software for providing privacy protection. Network management services; network optimisation services; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services; optimisation of information technology applications. Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; transmission of data; telecommunications disaster recovery services; telecommunication system emergency response and recovery services; advisory and consultancy services relating to telecommunications; advisory services relating to providing remote computer hardware access; advisory services relating to providing remote computer software access; advisory, information and consultancy services relating to all the aforesaid services; providing access to a cloud computing system for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats. Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; computer services, namely facilitating provision of secure web browsers; computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; computer security services, namely, providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, gps systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; computer services, namely, provision of administrative services over policy and updates; computer services, namely, providing privacy protection; computer services, namely, analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; computer services, namely, analyzing and classifying information including data, applications, and networks to provide threat, security, contextual, and privacy information; data storage; data back-up services; electronic storage and retrieval of data and information; recovery and restoration of data; providing on demand computing services; on-line back-up services.

13.

SMART CACHING BASED ON REPUTATION INFORMATION

      
Application Number US2015027805
Publication Number 2015/168024
Status In Force
Filing Date 2015-04-27
Publication Date 2015-11-05
Owner WEBROOT INC. (USA)
Inventor
  • Lonas, Hal
  • Helvey, Thomas, W.

Abstract

Embodiments disclosed herein relate to systems and methods for providing a smart cache. In embodiments, a variable time to live (TTL) may be calculated and associated with data as it is stored in a cache. The variable TTL may be calculated based upon reputation and/or category information related to the source of the data. The reputation and/or category information may include TTL modifiers for adjusting the TTL for data from a particular data source that is stored in the cache. In further embodiments, a feedback method may be employed to update reputation and/or category information for a particular data source.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

14.

WEBROOT

      
Application Number 174509300
Status Registered
Filing Date 2015-09-08
Registration Date 2019-07-05
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable software to provide access to a cloud computing system for protecting and securing the integrity of computing devices, namely mobile phones, tablets, gaming consoles, network systems, namely smart home electronic computer network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet against viruses, malware and other threats; Downloadable software, for facilitating provision of secure web browsers; Downloadable software for restricting access to and from undesired computers networks and websites by and to computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet; Downloadable software for providing restoration of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet to a prior state; Downloadable software for providing administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software. (1) Management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; Online data processing services, namely updating, input, collection and systemization of computerized data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations; database management; advisory, information and consultancy services relating to all the aforesaid services in the field of computerized data storage and retrieval. (2) Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data for others via computer terminals over telecommunications networks; advisory, information and consultancy services relating to all the aforesaid services in the field of computerized data storage and retrieval. (3) Computer services, namely, providing a virtual cloud computing system through cloud computing for others comprising virtual application servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet against viruses, malware and other threats; Computer services, namely facilitating provision of secure web browsers; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, namely smart home electronic computer network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players configurable to connect to the internet to a prior state. (4) Computer services, namely, provision of administrative services over policy and updates namely, providing computer system analysis and updating of computer software; Computer services, namely, protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; computer services, namely, analyzing and classifying computerized data, software applications, and computer networks to provide threat, security, contextual and privacy information. (5) Computer network management services; computer network optimisation services; Online data processing services, namely updating, input, collection and systemization of computerized data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations; database management; providing data storage space on virtual storage media; data back-up services; electronic storage and retrieval of computer data and information; advisory, information and consultancy services in the field of computerized data storage and retrieval. (6) Providing access to computer networks; providing access between computers and computer networks; providing access between computer networks and servers; providing access between computers and servers; telecommunications services between computer networks; transmission of data for others via computer terminals; telecommunications disaster recovery services in the field of electronic data and computer systems networks; recovery and restoration of computer hard drive data; optimisation of information technology applications; advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; on-line back-up services, namely, remote storage service for archiving databases, images and other electronic data, remote back-up services for computer hard drive data and remote back-up services for computer networks; advisory services in the field of remote access of computer hardware; advisory services in the field of remote access of computer software; advisory, information and consultancy services in the field of computerized data storage and retrieval. (7) Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet against viruses, malware and other threats; Computer services, namely facilitating provision of secure web browsers; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact disk players and digital video players, configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, namely phones, cellular phones, smartphones, tablets, computers, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices, namely tablet computers, laptop computers, smart phones and digital media players, namely digital audiotape players, digital music players, digital compact players and digital video players; Computer network management services; computer network optimisation services; advisory, information and consultancy services in the field of computerized data storage and retrieval; telecommunications disaster recovery services in the field of electronic data and computer systems networks; recovery and restoration of computer hard drive data; management of computer networks, including optimising use of computer hardware, computer software, information technology applications, and computer networks; advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; advisory services in the field of remote access to computer hardware; advisory services in the field of remote access of computer software; advisory, information and consultancy services in the field of computerized data storage and retrieval; Computer services, namely, provision of administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Computer services, namely, protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances, namely refrigerators, freezers, dishwashers, clothes washers, clothes dryers, air purifiers, humidifiers, dehumidifiers, air conditioners, fans, radiant heaters and portable heaters and vacuums that can be monitored and controlled by mobile devices, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart refrigerators, portable media players, namely smart phones, electronic book readers, tablet computers, DVD players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; protection; computer services, namely, analyzing and classifying computerized data, software applications, and computer networks to provide threat, security, contextual, and privacy information configurable to connect to the internet to a prior state.

15.

BRIGHTCLOUD

      
Application Number 174510800
Status Registered
Filing Date 2015-09-08
Registration Date 2023-10-17
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable software to provide access to a cloud computing system for protecting and securing the integrity of computing devices namely mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software, for facilitating provision of secure web browsers; downloadable software for restricting access to and from undesired computers networks and websites by and to computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet; Downloadable software for providing restoration of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet to a prior state; Downloadable software for providing administrative services over policy and updates, namely, providing computer system analysis and updating of computer software; Downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software; downloadable computer software for use in protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet, namely encryption, monitoring, and access restriction software (1) Database management; Online data processing services, namely updating, input, collection and systemisation of computerised data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, and calculations; (2) Providing access to a global computer network; Telecommunications services, namely transmission of data in the nature of suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, between local area computer networks, global computer networks and wireless local area networks; Electronic transmission for others of data, namely suspected security threats, suspected security attacks, firewall data, and data relating to the overall health and security of the computer network, via computer terminals over telecommunications networks; Advisory services in the field of remote access of computer hardware; Advisory services in the field of remote access of computer software; (3) Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Consultancy services in the field of security for computers and computer networks; Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the internet; Computer network security services; Computer security services, namely, restricting and controlling access of users of computing resources for computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; Computer security services, namely, providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems to a prior state, smart watches, smart cars, smart household appliances, GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet Computer services, namely, provision of administrative services over policy and updates, namely providing computer system analysis and updating of computer software; computer services namely, analyzing and classifying data, software applications, and computer networks to provide threat, security, contextual and privacy information; Management of computer networks for others; Computer network optimisation services, namely, monitoring, managing, and improving network performance; Advisory, information and consultancy services in the field of computerised data storage and retrieval, computer data security, computer network security, computer network configuration, computer network management and computer network optimisation; Providing data storage space on virtual storage media; Data backup services; Electronic storage of data, namely, archiving business documents, personal documents and corporate documents and cloud computing provider services for general storage of data; Software as a service (saas) services featuring non-downloadable data retrieval software; Advisory, information and consultancy services in the field of data storage and retrieval; Telecommunications disaster recovery services in the field of electronic data and computer systems networks; Recovery and restoration of computer hard drive data; Management of computer networks, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; Advisory and consultancy services in the field of computer network management services and protecting the privacy and security of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the Internet, namely encryption, monitoring, and access restriction software; Online backup services, namely remote storage service for archiving databases, images and other electronic data, remote back-up services for computer hard drive data and remote back-up services for computer networks; Computer security services, namely protecting the privacy and security enforcing, restricting and controlling access privileges of users of personal computers, mobile phones, tablets, gaming consoles, communication network systems, smart watches, smart cars, smart household appliances (namely household appliances that can be monitored and controlled by mobile devices), GPS systems, in-home security systems, thermostats, smart washers, smart dryers, smart dishwashers, smart refrigerators, portable media players and digital cameras configurable to connect to the Internet, namely, encryption, monitoring; Software as a service (saas) services featuring non-downloadable software for computer network security; Administration of user rights in computer networks; Controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Providing temporary use of on-line non downloadable operating software for accessing and using a cloud computing network; Cloud computing services, namely computing services to enable network integrating computer hardware and software for dynamic provisioning of computer resources;

16.

BRIGHTCLOUD

      
Serial Number 86981816
Status Registered
Filing Date 2015-09-04
Registration Date 2017-10-17
Owner Webroot Inc. ()
NICE Classes  ?
  • 38 - Telecommunications services
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data over telecommunications networks; advisory and consultancy services relating to communications between computers over telecommunications networks; advisory services relating to providing remote access of computer hardware over telecommunications networks; advisory services relating to providing remote access of computer software over telecommunication networks; advisory, information and consultancy services relating to all the aforesaid services Downloadable computer software for providing privacy protection management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services Computer services, namely, providing privacy protection by identifying and blocking threats to privacy by restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities Computer services, namely, monitoring of computer systems and computer networks for security purposes that involves analyzing and classifying IT information including data, applications, and networks all being part of the process of monitoring of computer systems for security purposes; Computer services, namely, facilitating provision of secure web browsers by monitoring and analyzing threats for security purposes

17.

BRIGHTCLOUD

      
Serial Number 86748197
Status Registered
Filing Date 2015-09-04
Registration Date 2019-06-11
Owner Webroot Inc. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software, namely, for providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet Computer services, namely, providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems. and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet

18.

DETECTING AND PREVENTING EXECUTION OF SOFTWARE EXPLOITS

      
Application Number US2015013111
Publication Number 2015/113052
Status In Force
Filing Date 2015-01-27
Publication Date 2015-07-30
Owner WEBROOT INC. (USA)
Inventor
  • Giuliani, Marco
  • Bizzarri, Marco
  • Voltattorni, Benedetto
  • Mayr, Johannes

Abstract

In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk processing is executed upon invocation of one of the functions in the monitored memory space. During execution of the stack walk processing, at least one memory check is performed to detect suspicious behavior. An alert of suspicious behavior is triggered when the performing of the memory check detects at least one of: code execution attempted from non-executable memory, identification of an invalid base pointer, identification of an invalid stack return address, attempted execution of a return-oriented programming technique, the base pointer is outside a current thread stack, and a return address is detected as being inside a virtual memory area. If an alert of suspicious behavior is triggered, execution of a payload is prevented for the invoked function.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

19.

METHOD AND APPARATUS FOR PROVIDING FORENSIC VISIBILITY INTO SYSTEMS AND NETWORKS

      
Application Number US2014036832
Publication Number 2014/179805
Status In Force
Filing Date 2014-05-05
Publication Date 2014-11-06
Owner WEBROOT INC. (USA)
Inventor
  • Jaroch, Joseph, A.
  • Erasmus, Jacques, Etienne
  • Barnes, Paul
  • Mayr, Johannes
  • Leidesdorff, Michael
  • Giuliani, Marco
  • Williams, Christopher, John
  • Bacher, Chad, Edward

Abstract

Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

20.

MANAGED EXECUTION AND EXPIRATION OF AGENT COMMANDS

      
Application Number US2014010701
Publication Number 2014/110146
Status In Force
Filing Date 2014-01-08
Publication Date 2014-07-17
Owner WEBROOT INC. (USA)
Inventor
  • Jaroch, Joseph
  • Morris, Melvyn

Abstract

Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring

21.

SYSTEM AND METHOD TO PROVIDE AUTOMATIC CLASSIFICATION OF PHISHING SITES

      
Application Number US2013051821
Publication Number 2014/018630
Status In Force
Filing Date 2013-07-24
Publication Date 2014-01-30
Owner WEBROOT INC. (USA)
Inventor Schmidtler, Mauritius, A.R.

Abstract

A phishing classification model that detects a phishing website based on one or more feature vectors for the website is provided. The phishing classification model may operate on a server and may further select a website, generate a feature vector for a landing page of the website, create a feature vector for every iframe that is a descendent of the landing page, and derive a final feature vector from the feature vectors of the landing page and the descendent iframe pages. Further, machine learning techniques may be applied to generate, or train, a classification model based upon one or more known phishing websites. Based on the feature vector, the classification modeler may classify a website as either a phishing website or as a non-phishing website. Feedback in the form of human verification may further be incorporated.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

22.

WEBROOT

      
Application Number 164754000
Status Registered
Filing Date 2013-10-11
Registration Date 2015-07-27
Owner Webroot Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer security services, namely, restricting access to and from undesired computers, networks and websites by and to computers, networks and mobile electronic devices; Computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks and mobile electronic devices; Computer virus, malware and spyware protection services; Computer security services, namely scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; Computer services, namely providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; Computer services, namely providing online non-downloadable software to facilitate the management and reporting of data collected from computers, networks and mobile electronic devices; Remote online backup of computer data; Technical support services, namely, troubleshooting of computer software and network problems.

23.

SECUREANYWHERE

      
Application Number 164438200
Status Registered
Filing Date 2013-09-20
Registration Date 2015-06-10
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Software for protecting and securing the integrity of computing devices, mobile phones and network systems (1) Computer services, namely providing a cloud computer system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats.

24.

METHODS AND APPARATUS FOR DEALING WITH MALWARE

      
Application Number EP2012052497
Publication Number 2012/110501
Status In Force
Filing Date 2012-02-14
Publication Date 2012-08-23
Owner PREVX LIMITED (United Kingdom)
Inventor
  • Morris, Melvyn
  • Jaroch, Joseph

Abstract

In one aspect, a method of classifying a computer object as malware includes at a base computer (3), receiving data about a computer object from each of plural remote computers (2) on which the object or similar objects are stored and or processed. The base computer (3) comprises plural threat servers (62) arranged to receive said data from the plural remote computers (2) and apply rules and or heuristics against that data in real time to determine whether or not said object is malware and to communicate said determination to the remote computers (2). The base computer (3) comprises at least one central server (74) in communication with the threat servers (62) and arranged to receive said data about objects from the threat servers (62) to maintain a master database (71, 72, 73) of data received about objects from all of the threat servers (62).

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

25.

WEBROOT SECUREANYWHERE

      
Application Number 010638708
Status Registered
Filing Date 2012-02-13
Registration Date 2012-07-09
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software for protecting and securing the integrity of computing devices and network systems. Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.

26.

WEBROOT SECUREANYWHERE

      
Application Number 010638682
Status Registered
Filing Date 2012-02-13
Registration Date 2012-07-09
Owner Webroot Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software for protecting and securing the integrity of computing devices and network systems. Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.

27.

WEBROOT SECUREANYWHERE

      
Application Number 156356100
Status Registered
Filing Date 2012-02-10
Registration Date 2014-06-11
Owner Webroot Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.

28.

WEBROOT SECUREANYWHERE

      
Application Number 156356900
Status Registered
Filing Date 2012-02-10
Registration Date 2014-07-24
Owner Webroot Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems.

29.

WEBROOT SECUREANYWHERE

      
Application Number 156356000
Status Registered
Filing Date 2012-02-10
Registration Date 2014-06-11
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software for protecting and securing the integrity of computing devices and network systems.

30.

WEBROOT SECUREANYWHERE

      
Application Number 156356400
Status Registered
Filing Date 2012-02-10
Registration Date 2014-07-24
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software for protecting and securing the integrity of computing devices and network systems.

31.

Concurrent and delayed processing of malware with reduced I/O interference

      
Application Number 12731537
Grant Number 08943590
Status In Force
Filing Date 2010-03-25
First Publication Date 2011-09-29
Grant Date 2015-01-27
Owner Webroot Inc. (USA)
Inventor Burtscher, Michael

Abstract

Systems, methods and non-transitory, tangible computer readable storage mediums encoded with processor readable instructions to scan files for malware are disclosed. An exemplary method includes writing, via a communication pathway, a first file to a storage medium that is utilized by the computer, requesting access to the first file so as to enable the first file to be scanned for malware, and delaying, when the first file resides on the storage medium, access to the first file while there is at least one I/O operation relative to the storage medium that has a higher priority level than a priority level of the request to access the first file. In addition, except to enable the first file to be scanned for malware, access to the first file is prevented until the first file has been scanned for malware.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

32.

WEBROOT SECUREANYWHERE

      
Serial Number 85395413
Status Registered
Filing Date 2011-08-11
Registration Date 2013-02-26
Owner WEBROOT INC. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems

33.

WEBROOT SECUREANYWHERE

      
Serial Number 85395835
Status Registered
Filing Date 2011-08-11
Registration Date 2013-02-26
Owner WEBROOT INC. ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

computer software for protecting and securing the integrity of computing devices and network systems

34.

BrightCloud

      
Application Number 1016978
Status Registered
Filing Date 2009-10-02
Registration Date 2009-10-02
Owner Webroot Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services, namely web filtering services.

35.

BRIGHTCLOUD

      
Serial Number 77706936
Status Registered
Filing Date 2009-04-04
Registration Date 2010-05-25
Owner WEBROOT INC. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services, namely, web filtering services

36.

CHANNEL EDGE

      
Serial Number 77391135
Status Registered
Filing Date 2008-02-07
Registration Date 2009-10-06
Owner WEBROOT INC. ()
NICE Classes  ? 35 - Advertising and business services

Goods & Services

Business services, namely, distributorship services in the field of computer software, telephone order-taking services for others, business lead generation services, order fulfillment, business sales projections consultation, supply chain management, work-in-process management, inventory management, strategic planning management, sales promotions, customer service in the field of computer software, return management, namely, management of returned merchandise, credit card registration, accounting and managing telecommunications networks for others, namely, managing telephone service for other carriers, all of the aforementioned services for distributors, resellers, partners, suppliers, intermediaries, third-party service providers, and customers

37.

THE BEST SECURITY IN AN UNSECURED WORLD

      
Application Number 945606
Status Registered
Filing Date 2007-10-26
Registration Date 2007-10-26
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer software for monitoring the activities of a computer user, preventing the execution of unauthorized programs, and deterring access to offensive content on the Internet; computer software in the field of security to enable monitoring, securing and protection of computer networks, namely software that scans for online threats to monitor, secure and protect computer networks and applications by restricting access to and by computer networks to and of undesired viruses, threats, spyware downloads and communication, phishing, worms and other potentially threatening computer code; computer software for providing security features to detect, identify, block and delete Trojan horse programs, adware programs, system monitor and other spyware programs; computer software designed to remove by-products inherently created from 'surfing' the Internet; anti-virus software.

38.

METHODS AND APPARATUS FOR DEALING WITH MALWARE

      
Application Number GB2006002439
Publication Number 2007/003916
Status In Force
Filing Date 2006-06-30
Publication Date 2007-01-11
Owner PREVX LIMITED (United Kingdom)
Inventor
  • Morris, Melvyn
  • Stubbs, Paul
  • Hartwig, Markus
  • Harter, Darren

Abstract

In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of : executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

39.

Miscellaneous Design

      
Application Number 858210
Status Registered
Filing Date 2005-04-08
Registration Date 2005-04-08
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer software, namely, computer software for providing security features to detect, identify, block and delete Trojan horse programs, adware programs, system monitor and other spyware programs.

40.

WEBROOT

      
Application Number 858220
Status Registered
Filing Date 2005-04-08
Registration Date 2005-04-08
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer software for use in protecting the privacy and security of personal computers, namely encryption, monitoring, and access restriction software, and computer software for use in enhancing the use of a global computer network, namely modem connection acceleration and file management software.

41.

WEBROOT

      
Application Number 125346100
Status Registered
Filing Date 2005-04-08
Registration Date 2006-03-24
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software for use in protecting the privacy and security of personal computers, namely encryption, monitoring, and access restriction software, and computer software for use in enhancing the use of a global computer network, namely modem connection acceleration and file management software.

42.

SPY SWEEPER Design

      
Application Number 125346600
Status Registered
Filing Date 2005-04-08
Registration Date 2006-02-08
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software, namely computer software for providing security features to detect, identify, block and delete Trojan horse programs, adware programs, system monitor and other spyware programs.

43.

SPY SWEEPER

      
Application Number 122779400
Status Registered
Filing Date 2004-08-20
Registration Date 2005-05-26
Owner Webroot Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software that detects, identifies, analyzes, manages, blocks and/or removes other computer software from a computer or computer network.