Trend Micro Incorporated

Japan


 
Total IP 622
Total IP incl. subs 622 (+ 0 for subs)
Total IP Rank # 2,022
IP Activity Score 3/5.0    168
IP Activity Rank # 4,118
Stock Symbol 47040 (tse)
ISIN JP3637300009
Market Cap. 828982772560.0  (JPY)
Industry Software—Infrastructure
Sector Technology
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

585 2
26 0
9 0
0
 
Last Patent 2024 - Random access of a member file i...
First Patent 1991 - Data processing virus protection...
Last Trademark 2001 - T
First Trademark 2001 - TRENDLABS

Subsidiaries

2 subsidiaries with IP (0 patents, 0 trademarks)

1 subsidiaries without IP

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2022 Invention Random access of a member file in a compressed tar archive. A cloud computing infrastructure host...
2021 Invention Graph-based anomaly detection for cybersecurity. Anomalous activities on a computer network are d...
Invention Systems and methods for preventing information leakage. A system for preventing information leaka...
Invention Detecting unauthorized access points in a network. Methods and apparatus for detecting, in a gate...
Invention Systems and methods for facilitating malicious site detection. A system for facilitating Internet...
Invention Internet access control based on external third-party data. Systems and methods for Internet acce...
Invention Secure video content transmission over a computer network. A computer network includes a camera n...
Invention Systems and methods for detecting network attacks. Network attacks are detected by a protocol eng...
Invention On-demand scanning of e-mail attachments. An attachment to an e-mail message received at an e-mai...
Invention Automated mitigation of cyber threats using a semantic cybersecurity database. Systems and method...
Invention Decryption of encrypted network traffic using an inline network traffic monitor. An inline networ...
Invention Protection of kernel extension in a computer. A method protects a daemon in an operating system o...
Invention Multiclass classification system with accumulator-based arbitration. A multiclass classifier gene...
2020 Invention Mitigation of cyberattacks on cellular devices. A pause command is sent to a Subscriber Identity ...
Invention Malicious code scanning of remotely-located files. A file is stored in a public cloud storage. A ...
Invention Detecting malware by pooled analysis of sample files in a sandbox. Systems and methods are presen...
Invention Detection of malicious mobile apps. A mobile app is in a form of a package file. A structural fea...
Invention Visual representation of sender domain information and e-mail routing. The system executes online...
Invention Robust whitelisting of legitimate files using similarity score and suspiciousness score. A locali...
Invention Detecting unsecure data flow in automation task programs. An automation task program is inspected...
Invention Malware families identification based upon hierarchical clustering. Behavior report generation mo...
Invention Malware detection using locality sensitive hashing of api call sequences. An agent on an endpoint...
Invention Stateful detection of cyberattacks. A system for stateful detection of cyberattacks includes an e...
2019 Invention False alarm reduction by novelty detection. Features of sample files that are known to be normal ...
Invention Password protection with independent virtual keyboard. A virtual keyboard rendered on a separate ...
Invention Prevention of credential phishing based upon login behavior analysis. A system is implemented in ...
Invention Systems and methods for detecting scam emails. A scam detection system includes a user computer t...
Invention Generation of file digests for detecting malicious executable files. A cybersecurity server recei...
Invention Detection of forged e-mail messages at e-mail gateway. An e-mail message is sent from a public e-...
Invention Inspection of network traffic on accelerated platforms. A network security device has a local are...
Invention Methods and system for combating cyber threats using a related object sequence hash. A cyber thre...
Invention System and method for detecting leakage of email addresses. A system for detecting leakage of ema...
Invention Methods and arrangement for preventing spam comments without application specific changes. A meth...
Invention Clustering of binary files using architecture-agnostic digests. A target binary file is clustered...
Invention Automatic charset and language detection with machine learning. Language-based machine learning a...
Invention Evaluation of files for cyber threats using a machine learning model. A system for evaluating fil...
Invention Computer network monitoring with event prediction. A cybersecurity system includes sensors that d...
Invention Evaluation of files for cybersecurity threats using global and local file information. A global l...
Invention Systems and methods for distributed digital rights management with decentralized key management. ...
Invention Systems and methods for data certificate notarization utilizing bridging from private blockchain ...
Invention Protected smart contracts for managing internet of things devices. A system includes Internet of ...
Invention Dynamic taint tracking on mobile devices. Taint is dynamically tracked on a mobile device. Taint ...
Invention Systems and methods for detecting and responding to anomalous messaging and compromised accounts....
Invention Replacement of e-mail attachment with url. An attachment to an e-mail message is replaced with a ...
Invention Frictionless authentication for logging on a computer service. A login authentication process to ...
Invention System and method for detecting malicious scripts. An endpoint system receives a target file for ...
2018 Invention Apparatus and method for cloud-based accelerated filtering and distributed available compute secu...
Invention Context-aware machine learning system. A machine learning system includes multiple machine learni...
2017 Invention Automatic identification of critical network assets of a private computer network. Critical netwo...
Invention Intrusion prevention system with machine learning model for real-time inspection of network traff...
2001 G/S COMPUTER ANTIVIRUS SOFTWARE; MALICIOUS CODE AND MALICIOUS CONTENT SCREENING SOFTWARE; COMPUTER SE...
G/S providing online computer databases in the fields of computers, computer security and computer sy...