US7073198B1
(en)
*
|
1999-08-26 |
2006-07-04 |
Ncircle Network Security, Inc. |
Method and system for detecting a vulnerability in a network
|
US6957348B1
(en)
|
2000-01-10 |
2005-10-18 |
Ncircle Network Security, Inc. |
Interoperability of vulnerability and intrusion detection systems
|
EP1269286B1
(de)
*
|
2000-03-03 |
2008-11-19 |
International Business Machines Corporation |
System zur bestimmung von schwächen von web-anwendungen
|
US7000230B1
(en)
*
|
2000-06-21 |
2006-02-14 |
Microsoft Corporation |
Network-based software extensions
|
US6948135B1
(en)
*
|
2000-06-21 |
2005-09-20 |
Microsoft Corporation |
Method and systems of providing information to computer users
|
US7155667B1
(en)
*
|
2000-06-21 |
2006-12-26 |
Microsoft Corporation |
User interface for integrated spreadsheets and word processing tables
|
US6883168B1
(en)
*
|
2000-06-21 |
2005-04-19 |
Microsoft Corporation |
Methods, systems, architectures and data structures for delivering software via a network
|
US7191394B1
(en)
*
|
2000-06-21 |
2007-03-13 |
Microsoft Corporation |
Authoring arbitrary XML documents using DHTML and XSLT
|
US7346848B1
(en)
*
|
2000-06-21 |
2008-03-18 |
Microsoft Corporation |
Single window navigation methods and systems
|
US7249369B2
(en)
*
|
2000-07-10 |
2007-07-24 |
Oracle International Corporation |
Post data processing
|
US7194764B2
(en)
*
|
2000-07-10 |
2007-03-20 |
Oracle International Corporation |
User authentication
|
US7124203B2
(en)
*
|
2000-07-10 |
2006-10-17 |
Oracle International Corporation |
Selective cache flushing in identity and access management systems
|
US9038170B2
(en)
|
2000-07-10 |
2015-05-19 |
Oracle International Corporation |
Logging access system events
|
US8661539B2
(en)
*
|
2000-07-10 |
2014-02-25 |
Oracle International Corporation |
Intrusion threat detection
|
US7181769B1
(en)
|
2000-08-25 |
2007-02-20 |
Ncircle Network Security, Inc. |
Network security system having a device profiler communicatively coupled to a traffic monitor
|
US9280667B1
(en)
|
2000-08-25 |
2016-03-08 |
Tripwire, Inc. |
Persistent host determination
|
JP2002093831A
(ja)
*
|
2000-09-14 |
2002-03-29 |
Shinko Electric Ind Co Ltd |
半導体装置およびその製造方法
|
US8996698B1
(en)
*
|
2000-11-03 |
2015-03-31 |
Truphone Limited |
Cooperative network for mobile internet access
|
US6996845B1
(en)
*
|
2000-11-28 |
2006-02-07 |
S.P.I. Dynamics Incorporated |
Internet security analysis system and process
|
US7284274B1
(en)
*
|
2001-01-18 |
2007-10-16 |
Cigital, Inc. |
System and method for identifying and eliminating vulnerabilities in computer software applications
|
US20020147620A1
(en)
*
|
2001-01-31 |
2002-10-10 |
Walsh Thomas J. |
Software quality assurance management system
|
US7185364B2
(en)
*
|
2001-03-21 |
2007-02-27 |
Oracle International Corporation |
Access system interface
|
US7185232B1
(en)
*
|
2001-02-28 |
2007-02-27 |
Cenzic, Inc. |
Fault injection methods and apparatus
|
US7882555B2
(en)
*
|
2001-03-16 |
2011-02-01 |
Kavado, Inc. |
Application layer security method and system
|
US7313822B2
(en)
*
|
2001-03-16 |
2007-12-25 |
Protegrity Corporation |
Application-layer security method and system
|
CA2342578A1
(en)
*
|
2001-03-29 |
2002-09-29 |
Ibm Canada Limited-Ibm Canada Limitee |
Method and apparatus for security of a network server
|
CA2343491A1
(en)
*
|
2001-04-03 |
2002-10-03 |
Ibm Canada Limited-Ibm Canada Limitee |
Method to reduce input parameter interface error and inconsistency for servlets
|
US20030135749A1
(en)
*
|
2001-10-31 |
2003-07-17 |
Gales George S. |
System and method of defining the security vulnerabilities of a computer system
|
US7225256B2
(en)
|
2001-11-30 |
2007-05-29 |
Oracle International Corporation |
Impersonation in an access system
|
US7664845B2
(en)
|
2002-01-15 |
2010-02-16 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7257630B2
(en)
*
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7243148B2
(en)
*
|
2002-01-15 |
2007-07-10 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7543056B2
(en)
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7975296B2
(en)
|
2002-02-07 |
2011-07-05 |
Oracle International Corporation |
Automated security threat testing of web pages
|
US8527495B2
(en)
*
|
2002-02-19 |
2013-09-03 |
International Business Machines Corporation |
Plug-in parsers for configuring search engine crawler
|
US7841007B2
(en)
*
|
2002-03-29 |
2010-11-23 |
Scanalert |
Method and apparatus for real-time security verification of on-line services
|
US20030188194A1
(en)
*
|
2002-03-29 |
2003-10-02 |
David Currie |
Method and apparatus for real-time security verification of on-line services
|
US7299382B2
(en)
*
|
2002-04-29 |
2007-11-20 |
Sun Microsystems, Inc. |
System and method for automatic test case generation
|
IL149583A0
(en)
*
|
2002-05-09 |
2003-07-06 |
Kavado Israel Ltd |
Method for automatic setting and updating of a security policy
|
US7509675B2
(en)
*
|
2002-05-29 |
2009-03-24 |
At&T Intellectual Property I, L.P. |
Non-invasive monitoring of the effectiveness of electronic security services
|
US7263721B2
(en)
*
|
2002-08-09 |
2007-08-28 |
International Business Machines Corporation |
Password protection
|
US7331062B2
(en)
*
|
2002-08-30 |
2008-02-12 |
Symantec Corporation |
Method, computer software, and system for providing end to end security protection of an online transaction
|
US20040073811A1
(en)
*
|
2002-10-15 |
2004-04-15 |
Aleksey Sanin |
Web service security filter
|
US7542471B2
(en)
|
2002-10-30 |
2009-06-02 |
Citrix Systems, Inc. |
Method of determining path maximum transmission unit
|
US8233392B2
(en)
|
2003-07-29 |
2012-07-31 |
Citrix Systems, Inc. |
Transaction boundary detection for reduction in timeout penalties
|
US7630305B2
(en)
|
2003-07-29 |
2009-12-08 |
Orbital Data Corporation |
TCP selective acknowledgements for communicating delivered and missed data packets
|
US8270423B2
(en)
|
2003-07-29 |
2012-09-18 |
Citrix Systems, Inc. |
Systems and methods of using packet boundaries for reduction in timeout prevention
|
US7616638B2
(en)
|
2003-07-29 |
2009-11-10 |
Orbital Data Corporation |
Wavefront detection and disambiguation of acknowledgments
|
US7343626B1
(en)
*
|
2002-11-12 |
2008-03-11 |
Microsoft Corporation |
Automated detection of cross site scripting vulnerabilities
|
JP2006518080A
(ja)
|
2003-02-14 |
2006-08-03 |
プリベンシス,インコーポレイティド |
ネットワーク監査及びポリシー保証システム
|
US7275216B2
(en)
|
2003-03-24 |
2007-09-25 |
Microsoft Corporation |
System and method for designing electronic forms and hierarchical schemas
|
US7415672B1
(en)
|
2003-03-24 |
2008-08-19 |
Microsoft Corporation |
System and method for designing electronic forms
|
US7370066B1
(en)
*
|
2003-03-24 |
2008-05-06 |
Microsoft Corporation |
System and method for offline editing of data files
|
US6908058B2
(en)
*
|
2003-03-28 |
2005-06-21 |
Suncast Corporation |
Hose reel cart with elevated crank handle
|
US7913159B2
(en)
|
2003-03-28 |
2011-03-22 |
Microsoft Corporation |
System and method for real-time validation of structured data files
|
US7296017B2
(en)
*
|
2003-03-28 |
2007-11-13 |
Microsoft Corporation |
Validation of XML data files
|
US7516145B2
(en)
*
|
2003-03-31 |
2009-04-07 |
Microsoft Corporation |
System and method for incrementally transforming and rendering hierarchical data files
|
US20040221176A1
(en)
*
|
2003-04-29 |
2004-11-04 |
Cole Eric B. |
Methodology, system and computer readable medium for rating computer system vulnerabilities
|
US20040243852A1
(en)
*
|
2003-05-28 |
2004-12-02 |
Rosenstein Adam H. |
Method, system and software for state signing of internet resources
|
US7760729B2
(en)
|
2003-05-28 |
2010-07-20 |
Citrix Systems, Inc. |
Policy based network address translation
|
US20040268139A1
(en)
*
|
2003-06-25 |
2004-12-30 |
Microsoft Corporation |
Systems and methods for declarative client input security screening
|
US7406714B1
(en)
|
2003-07-01 |
2008-07-29 |
Symantec Corporation |
Computer code intrusion detection system based on acceptable retrievals
|
US7568229B1
(en)
|
2003-07-01 |
2009-07-28 |
Symantec Corporation |
Real-time training for a computer code intrusion detection system
|
US7386883B2
(en)
*
|
2003-07-22 |
2008-06-10 |
International Business Machines Corporation |
Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system
|
US7463590B2
(en)
*
|
2003-07-25 |
2008-12-09 |
Reflex Security, Inc. |
System and method for threat detection and response
|
US7656799B2
(en)
|
2003-07-29 |
2010-02-02 |
Citrix Systems, Inc. |
Flow control system architecture
|
US8432800B2
(en)
|
2003-07-29 |
2013-04-30 |
Citrix Systems, Inc. |
Systems and methods for stochastic-based quality of service
|
US8437284B2
(en)
|
2003-07-29 |
2013-05-07 |
Citrix Systems, Inc. |
Systems and methods for additional retransmissions of dropped packets
|
US7698453B2
(en)
*
|
2003-07-29 |
2010-04-13 |
Oribital Data Corporation |
Early generation of acknowledgements for flow control
|
US8238241B2
(en)
|
2003-07-29 |
2012-08-07 |
Citrix Systems, Inc. |
Automatic detection and window virtualization for flow control
|
US7406660B1
(en)
|
2003-08-01 |
2008-07-29 |
Microsoft Corporation |
Mapping between structured data and a visual surface
|
US7334187B1
(en)
*
|
2003-08-06 |
2008-02-19 |
Microsoft Corporation |
Electronic form aggregation
|
US20050049924A1
(en)
*
|
2003-08-27 |
2005-03-03 |
Debettencourt Jason |
Techniques for use with application monitoring to obtain transaction data
|
US7882132B2
(en)
|
2003-10-09 |
2011-02-01 |
Oracle International Corporation |
Support for RDBMS in LDAP system
|
US7904487B2
(en)
|
2003-10-09 |
2011-03-08 |
Oracle International Corporation |
Translating data access requests
|
US7594018B2
(en)
*
|
2003-10-10 |
2009-09-22 |
Citrix Systems, Inc. |
Methods and apparatus for providing access to persistent application sessions
|
US20050138426A1
(en)
*
|
2003-11-07 |
2005-06-23 |
Brian Styslinger |
Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests
|
US7978716B2
(en)
|
2003-11-24 |
2011-07-12 |
Citrix Systems, Inc. |
Systems and methods for providing a VPN solution
|
US20050114658A1
(en)
*
|
2003-11-20 |
2005-05-26 |
Dye Matthew J. |
Remote web site security system
|
US7743420B2
(en)
*
|
2003-12-02 |
2010-06-22 |
Imperva, Inc. |
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
|
US7647631B2
(en)
*
|
2003-12-10 |
2010-01-12 |
Hewlett-Packard Development Company |
Automated user interaction in application assessment
|
US8819072B1
(en)
|
2004-02-02 |
2014-08-26 |
Microsoft Corporation |
Promoting data from structured data files
|
US7765597B2
(en)
*
|
2004-02-11 |
2010-07-27 |
Hewlett-Packard Development Company, L.P. |
Integrated crawling and auditing of web applications and web content
|
CA2553552A1
(en)
*
|
2004-02-11 |
2005-08-25 |
Spi Dynamics, Inc. |
System and method for testing web applications with recursive discovery and analysis
|
US20060282494A1
(en)
*
|
2004-02-11 |
2006-12-14 |
Caleb Sima |
Interactive web crawling
|
US7430711B2
(en)
*
|
2004-02-17 |
2008-09-30 |
Microsoft Corporation |
Systems and methods for editing XML documents
|
US7617531B1
(en)
*
|
2004-02-18 |
2009-11-10 |
Citrix Systems, Inc. |
Inferencing data types of message components
|
US7890996B1
(en)
*
|
2004-02-18 |
2011-02-15 |
Teros, Inc. |
Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways
|
US7774834B1
(en)
|
2004-02-18 |
2010-08-10 |
Citrix Systems, Inc. |
Rule generalization for web application entry point modeling
|
US7584382B2
(en)
|
2004-02-19 |
2009-09-01 |
Microsoft Corporation |
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
|
US7392295B2
(en)
|
2004-02-19 |
2008-06-24 |
Microsoft Corporation |
Method and system for collecting information from computer systems based on a trusted relationship
|
US7694022B2
(en)
|
2004-02-24 |
2010-04-06 |
Microsoft Corporation |
Method and system for filtering communications to prevent exploitation of a software vulnerability
|
US7603714B2
(en)
*
|
2004-03-08 |
2009-10-13 |
International Business Machines Corporation |
Method, system and computer program product for computer system vulnerability analysis and fortification
|
WO2005091107A1
(en)
*
|
2004-03-16 |
2005-09-29 |
Netcraft Limited |
Security component for use with an internet browser application and method and apparatus associated therewith
|
US8266177B1
(en)
|
2004-03-16 |
2012-09-11 |
Symantec Corporation |
Empirical database access adjustment
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US7519954B1
(en)
|
2004-04-08 |
2009-04-14 |
Mcafee, Inc. |
System and method of operating system identification
|
US7680885B2
(en)
|
2004-04-15 |
2010-03-16 |
Citrix Systems, Inc. |
Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner
|
US7827139B2
(en)
|
2004-04-15 |
2010-11-02 |
Citrix Systems, Inc. |
Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner
|
US20050262063A1
(en)
*
|
2004-04-26 |
2005-11-24 |
Watchfire Corporation |
Method and system for website analysis
|
US20070107053A1
(en)
*
|
2004-05-02 |
2007-05-10 |
Markmonitor, Inc. |
Enhanced responses to online fraud
|
US7665063B1
(en)
*
|
2004-05-26 |
2010-02-16 |
Pegasystems, Inc. |
Integration of declarative rule-based processing with procedural programming
|
US7774620B1
(en)
|
2004-05-27 |
2010-08-10 |
Microsoft Corporation |
Executing applications at appropriate trust levels
|
US8074277B2
(en)
*
|
2004-06-07 |
2011-12-06 |
Check Point Software Technologies, Inc. |
System and methodology for intrusion detection and prevention
|
US8353028B2
(en)
|
2004-06-21 |
2013-01-08 |
Ebay Inc. |
Render engine, and method of using the same, to verify data for access and/or publication via a computer system
|
US7971245B2
(en)
*
|
2004-06-21 |
2011-06-28 |
Ebay Inc. |
Method and system to detect externally-referenced malicious data for access and/or publication via a computer system
|
US7526810B2
(en)
|
2004-06-21 |
2009-04-28 |
Ebay Inc. |
Method and system to verify data received, at a server system, for access and/or publication via the server system
|
US7757074B2
(en)
|
2004-06-30 |
2010-07-13 |
Citrix Application Networking, Llc |
System and method for establishing a virtual private network
|
US8495305B2
(en)
*
|
2004-06-30 |
2013-07-23 |
Citrix Systems, Inc. |
Method and device for performing caching of dynamically generated objects in a data communication network
|
US8739274B2
(en)
|
2004-06-30 |
2014-05-27 |
Citrix Systems, Inc. |
Method and device for performing integrated caching in a data communication network
|
US7978714B2
(en)
|
2004-07-23 |
2011-07-12 |
Citrix Systems, Inc. |
Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices
|
AU2005266943C1
(en)
|
2004-07-23 |
2011-01-06 |
Citrix Systems, Inc. |
Systems and methods for optimizing communications between network nodes
|
US7711120B2
(en)
*
|
2004-07-29 |
2010-05-04 |
Infoassure, Inc. |
Cryptographic key management
|
JP4350001B2
(ja)
|
2004-08-17 |
2009-10-21 |
富士通株式会社 |
ページ情報収集プログラム、ページ情報収集方法、及びページ情報収集装置
|
US20060064740A1
(en)
*
|
2004-09-22 |
2006-03-23 |
International Business Machines Corporation |
Network threat risk assessment tool
|
US20060069671A1
(en)
*
|
2004-09-29 |
2006-03-30 |
Conley James W |
Methodology, system and computer readable medium for analyzing target web-based applications
|
US7711835B2
(en)
|
2004-09-30 |
2010-05-04 |
Citrix Systems, Inc. |
Method and apparatus for reducing disclosure of proprietary data in a networked environment
|
US7748032B2
(en)
|
2004-09-30 |
2010-06-29 |
Citrix Systems, Inc. |
Method and apparatus for associating tickets in a ticket hierarchy
|
US7692636B2
(en)
|
2004-09-30 |
2010-04-06 |
Microsoft Corporation |
Systems and methods for handwriting to a screen
|
US20060074933A1
(en)
*
|
2004-09-30 |
2006-04-06 |
Microsoft Corporation |
Workflow interaction
|
US8613048B2
(en)
|
2004-09-30 |
2013-12-17 |
Citrix Systems, Inc. |
Method and apparatus for providing authorized remote access to application sessions
|
US7478429B2
(en)
*
|
2004-10-01 |
2009-01-13 |
Prolexic Technologies, Inc. |
Network overload detection and mitigation system and method
|
US20060085852A1
(en)
*
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US8487879B2
(en)
*
|
2004-10-29 |
2013-07-16 |
Microsoft Corporation |
Systems and methods for interacting with a computer through handwriting to a screen
|
JP4688472B2
(ja)
*
|
2004-11-01 |
2011-05-25 |
株式会社エヌ・ティ・ティ・ドコモ |
端末制御装置及び端末制御方法
|
US7712022B2
(en)
*
|
2004-11-15 |
2010-05-04 |
Microsoft Corporation |
Mutually exclusive options in electronic forms
|
US20060107224A1
(en)
*
|
2004-11-15 |
2006-05-18 |
Microsoft Corporation |
Building a dynamic action for an electronic form
|
US7584417B2
(en)
*
|
2004-11-15 |
2009-09-01 |
Microsoft Corporation |
Role-dependent action for an electronic form
|
US8706877B2
(en)
|
2004-12-30 |
2014-04-22 |
Citrix Systems, Inc. |
Systems and methods for providing client-side dynamic redirection to bypass an intermediary
|
US8700695B2
(en)
|
2004-12-30 |
2014-04-15 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP pooling
|
US8549149B2
(en)
|
2004-12-30 |
2013-10-01 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
|
US8954595B2
(en)
|
2004-12-30 |
2015-02-10 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
|
US7810089B2
(en)
*
|
2004-12-30 |
2010-10-05 |
Citrix Systems, Inc. |
Systems and methods for automatic installation and execution of a client-side acceleration program
|
US8145777B2
(en)
|
2005-01-14 |
2012-03-27 |
Citrix Systems, Inc. |
Method and system for real-time seeking during playback of remote presentation protocols
|
US8340130B2
(en)
|
2005-01-14 |
2012-12-25 |
Citrix Systems, Inc. |
Methods and systems for generating playback instructions for rendering of a recorded computer session
|
US8200828B2
(en)
|
2005-01-14 |
2012-06-12 |
Citrix Systems, Inc. |
Systems and methods for single stack shadowing
|
US8935316B2
(en)
*
|
2005-01-14 |
2015-01-13 |
Citrix Systems, Inc. |
Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data
|
US8296441B2
(en)
|
2005-01-14 |
2012-10-23 |
Citrix Systems, Inc. |
Methods and systems for joining a real-time session of presentation layer protocol data
|
US7831728B2
(en)
|
2005-01-14 |
2010-11-09 |
Citrix Systems, Inc. |
Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream
|
US20060159432A1
(en)
|
2005-01-14 |
2006-07-20 |
Citrix Systems, Inc. |
System and methods for automatic time-warped playback in rendering a recorded computer session
|
US8230096B2
(en)
|
2005-01-14 |
2012-07-24 |
Citrix Systems, Inc. |
Methods and systems for generating playback instructions for playback of a recorded computer session
|
US7937651B2
(en)
*
|
2005-01-14 |
2011-05-03 |
Microsoft Corporation |
Structural editing operations for network forms
|
US8255456B2
(en)
|
2005-12-30 |
2012-08-28 |
Citrix Systems, Inc. |
System and method for performing flash caching of dynamically generated objects in a data communication network
|
US8281401B2
(en)
*
|
2005-01-25 |
2012-10-02 |
Whitehat Security, Inc. |
System for detecting vulnerabilities in web applications using client-side application interfaces
|
US8335704B2
(en)
|
2005-01-28 |
2012-12-18 |
Pegasystems Inc. |
Methods and apparatus for work management and routing
|
US8024568B2
(en)
|
2005-01-28 |
2011-09-20 |
Citrix Systems, Inc. |
Method and system for verification of an endpoint security scan
|
US20060185018A1
(en)
*
|
2005-02-17 |
2006-08-17 |
Microsoft Corporation |
Systems and methods for shielding an identified vulnerability
|
WO2006092826A1
(ja)
*
|
2005-02-28 |
2006-09-08 |
Fujitsu Limited |
サービス制御システム、サービス制御方法およびサービス制御プログラム
|
US7444331B1
(en)
|
2005-03-02 |
2008-10-28 |
Symantec Corporation |
Detecting code injection attacks against databases
|
US7725834B2
(en)
*
|
2005-03-04 |
2010-05-25 |
Microsoft Corporation |
Designer-created aspect for an electronic form template
|
WO2006092785A2
(en)
*
|
2005-03-04 |
2006-09-08 |
Beefense Ltd |
Method and apparatus for the dynamic defensive masquerading of computing resources
|
US8095983B2
(en)
*
|
2005-03-15 |
2012-01-10 |
Mu Dynamics, Inc. |
Platform for analyzing the security of communication protocols and channels
|
US8095982B1
(en)
|
2005-03-15 |
2012-01-10 |
Mu Dynamics, Inc. |
Analyzing the security of communication protocols and channels for a pass-through device
|
US7673228B2
(en)
*
|
2005-03-30 |
2010-03-02 |
Microsoft Corporation |
Data-driven actions for network forms
|
US8010515B2
(en)
*
|
2005-04-15 |
2011-08-30 |
Microsoft Corporation |
Query to an electronic form
|
GB2425679A
(en)
*
|
2005-04-27 |
2006-11-01 |
Hewlett Packard Development Co |
Scanning computing entities for vulnerabilities
|
US8046374B1
(en)
|
2005-05-06 |
2011-10-25 |
Symantec Corporation |
Automatic training of a database intrusion detection system
|
US8266700B2
(en)
*
|
2005-05-16 |
2012-09-11 |
Hewlett-Packard Development Company, L. P. |
Secure web application development environment
|
US7558796B1
(en)
|
2005-05-19 |
2009-07-07 |
Symantec Corporation |
Determining origins of queries for a database intrusion detection system
|
US8443040B2
(en)
|
2005-05-26 |
2013-05-14 |
Citrix Systems Inc. |
Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes
|
US9692725B2
(en)
|
2005-05-26 |
2017-06-27 |
Citrix Systems, Inc. |
Systems and methods for using an HTTP-aware client agent
|
US7756826B2
(en)
*
|
2006-06-30 |
2010-07-13 |
Citrix Systems, Inc. |
Method and systems for efficient delivery of previously stored content
|
US9621666B2
(en)
|
2005-05-26 |
2017-04-11 |
Citrix Systems, Inc. |
Systems and methods for enhanced delta compression
|
US8943304B2
(en)
*
|
2006-08-03 |
2015-01-27 |
Citrix Systems, Inc. |
Systems and methods for using an HTTP-aware client agent
|
US9407608B2
(en)
|
2005-05-26 |
2016-08-02 |
Citrix Systems, Inc. |
Systems and methods for enhanced client side policy
|
JP4619867B2
(ja)
*
|
2005-06-01 |
2011-01-26 |
三菱電機株式会社 |
サーバ診断装置及びサーバ監視装置及びサーバ診断プログラム
|
US7849448B2
(en)
*
|
2005-06-01 |
2010-12-07 |
Crosscheck Networks |
Technique for determining web services vulnerabilities and compliance
|
US8078740B2
(en)
*
|
2005-06-03 |
2011-12-13 |
Microsoft Corporation |
Running internet applications with low rights
|
US8051484B2
(en)
|
2005-06-14 |
2011-11-01 |
Imperva, Inc. |
Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
|
US20070011665A1
(en)
*
|
2005-06-21 |
2007-01-11 |
Microsoft Corporation |
Content syndication platform
|
US7877803B2
(en)
*
|
2005-06-27 |
2011-01-25 |
Hewlett-Packard Development Company, L.P. |
Automated immune response for a computer
|
US7543228B2
(en)
*
|
2005-06-27 |
2009-06-02 |
Microsoft Corporation |
Template for rendering an electronic form
|
US8200975B2
(en)
*
|
2005-06-29 |
2012-06-12 |
Microsoft Corporation |
Digital signatures for network forms
|
US7930740B2
(en)
*
|
2005-07-07 |
2011-04-19 |
International Business Machines Corporation |
System and method for detection and mitigation of distributed denial of service attacks
|
US7774361B1
(en)
*
|
2005-07-08 |
2010-08-10 |
Symantec Corporation |
Effective aggregation and presentation of database intrusion incidents
|
US7805419B2
(en)
*
|
2005-07-11 |
2010-09-28 |
Application Security, Inc. |
System for tracking and analyzing the integrity of an application
|
US7690037B1
(en)
|
2005-07-13 |
2010-03-30 |
Symantec Corporation |
Filtering training data for machine learning
|
US8225392B2
(en)
*
|
2005-07-15 |
2012-07-17 |
Microsoft Corporation |
Immunizing HTML browsers and extensions from known vulnerabilities
|
US8239939B2
(en)
*
|
2005-07-15 |
2012-08-07 |
Microsoft Corporation |
Browser protection module
|
US20070016960A1
(en)
*
|
2005-07-18 |
2007-01-18 |
Nt Objectives, Inc. |
NTO input validation technique
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US7613996B2
(en)
*
|
2005-08-15 |
2009-11-03 |
Microsoft Corporation |
Enabling selection of an inferred schema part
|
US20070036433A1
(en)
*
|
2005-08-15 |
2007-02-15 |
Microsoft Corporation |
Recognizing data conforming to a rule
|
US20070061467A1
(en)
*
|
2005-09-15 |
2007-03-15 |
Microsoft Corporation |
Sessions and session states
|
US8191008B2
(en)
|
2005-10-03 |
2012-05-29 |
Citrix Systems, Inc. |
Simulating multi-monitor functionality in a single monitor environment
|
US20070094735A1
(en)
*
|
2005-10-26 |
2007-04-26 |
Cohen Matthew L |
Method to consolidate and prioritize web application vulnerabilities
|
US8001459B2
(en)
*
|
2005-12-05 |
2011-08-16 |
Microsoft Corporation |
Enabling electronic documents for limited-capability computing devices
|
US20070136809A1
(en)
*
|
2005-12-08 |
2007-06-14 |
Kim Hwan K |
Apparatus and method for blocking attack against Web application
|
US7640235B2
(en)
*
|
2005-12-12 |
2009-12-29 |
Imperva, Inc. |
System and method for correlating between HTTP requests and SQL queries
|
US7661136B1
(en)
|
2005-12-13 |
2010-02-09 |
At&T Intellectual Property Ii, L.P. |
Detecting anomalous web proxy activity
|
US7743123B2
(en)
|
2005-12-19 |
2010-06-22 |
Microsoft Corporation |
Aggregating information from a cluster of peers
|
US20070143849A1
(en)
*
|
2005-12-19 |
2007-06-21 |
Eyal Adar |
Method and a software system for end-to-end security assessment for security and CIP professionals
|
US7584182B2
(en)
|
2005-12-19 |
2009-09-01 |
Microsoft Corporation |
Determining cardinality of a parameter using hash values
|
US8392999B2
(en)
*
|
2005-12-19 |
2013-03-05 |
White Cyber Knight Ltd. |
Apparatus and methods for assessing and maintaining security of a computerized system under development
|
US7856100B2
(en)
|
2005-12-19 |
2010-12-21 |
Microsoft Corporation |
Privacy-preserving data aggregation using homomorphic encryption
|
US20070157311A1
(en)
*
|
2005-12-29 |
2007-07-05 |
Microsoft Corporation |
Security modeling and the application life cycle
|
US7890315B2
(en)
*
|
2005-12-29 |
2011-02-15 |
Microsoft Corporation |
Performance engineering and the application life cycle
|
US8301839B2
(en)
|
2005-12-30 |
2012-10-30 |
Citrix Systems, Inc. |
System and method for performing granular invalidation of cached dynamically generated objects in a data communication network
|
US7577963B2
(en)
*
|
2005-12-30 |
2009-08-18 |
Public Display, Inc. |
Event data translation system
|
US7921184B2
(en)
|
2005-12-30 |
2011-04-05 |
Citrix Systems, Inc. |
System and method for performing flash crowd caching of dynamically generated objects in a data communication network
|
US7783985B2
(en)
*
|
2006-01-04 |
2010-08-24 |
Citrix Systems, Inc. |
Systems and methods for transferring data between computing devices
|
JP2007183838A
(ja)
*
|
2006-01-06 |
2007-07-19 |
Fujitsu Ltd |
クエリーパラメーター出力ページ発見プログラム、クエリーパラメーター出力ページ発見方法およびクエリーパラメーター出力ページ発見装置
|
US8688813B2
(en)
|
2006-01-11 |
2014-04-01 |
Oracle International Corporation |
Using identity/resource profile and directory enablers to support identity management
|
US7818788B2
(en)
*
|
2006-02-14 |
2010-10-19 |
Microsoft Corporation |
Web application security frame
|
US8448241B1
(en)
*
|
2006-02-16 |
2013-05-21 |
Oracle America, Inc. |
Browser extension for checking website susceptibility to cross site scripting
|
US7712137B2
(en)
*
|
2006-02-27 |
2010-05-04 |
Microsoft Corporation |
Configuring and organizing server security information
|
US20070203973A1
(en)
*
|
2006-02-28 |
2007-08-30 |
Microsoft Corporation |
Fuzzing Requests And Responses Using A Proxy
|
US8924335B1
(en)
|
2006-03-30 |
2014-12-30 |
Pegasystems Inc. |
Rule-based user interface conformance methods
|
US20070233902A1
(en)
*
|
2006-03-30 |
2007-10-04 |
Alan Trefler |
User interface methods and apparatus for rules processing
|
US20080208785A1
(en)
*
|
2006-03-30 |
2008-08-28 |
Pegasystems, Inc. |
User interface methods and apparatus for rules processing
|
US20070240225A1
(en)
*
|
2006-04-10 |
2007-10-11 |
Shrader Theodore J L |
Architecture for automatic HTTPS boundary identification
|
US8528093B1
(en)
*
|
2006-04-12 |
2013-09-03 |
Hewlett-Packard Development Company, L.P. |
Apparatus and method for performing dynamic security testing using static analysis data
|
US8140618B2
(en)
|
2006-05-04 |
2012-03-20 |
Citrix Online Llc |
Methods and systems for bandwidth adaptive N-to-N communication in a distributed system
|
US7540766B2
(en)
*
|
2006-06-14 |
2009-06-02 |
Itron, Inc. |
Printed circuit board connector for utility meters
|
US8185737B2
(en)
|
2006-06-23 |
2012-05-22 |
Microsoft Corporation |
Communication across domains
|
US8392977B2
(en)
*
|
2006-08-03 |
2013-03-05 |
Citrix Systems, Inc. |
Systems and methods for using a client agent to manage HTTP authentication cookies
|
US7953889B2
(en)
*
|
2006-08-03 |
2011-05-31 |
Citrix Systems, Inc. |
Systems and methods for routing VPN traffic around network disruption
|
US8244883B2
(en)
|
2006-08-03 |
2012-08-14 |
Citrix Systems, Inc. |
Systems and methods of for providing multi-mode transport layer compression
|
US7720954B2
(en)
|
2006-08-03 |
2010-05-18 |
Citrix Systems, Inc. |
Method and appliance for using a dynamic response time to determine responsiveness of network services
|
US8677007B2
(en)
*
|
2006-08-03 |
2014-03-18 |
Citrix Systems, Inc. |
Systems and methods for bypassing an appliance
|
US8561155B2
(en)
|
2006-08-03 |
2013-10-15 |
Citrix Systems, Inc. |
Systems and methods for using a client agent to manage HTTP authentication cookies
|
US8141164B2
(en)
|
2006-08-21 |
2012-03-20 |
Citrix Systems, Inc. |
Systems and methods for dynamic decentralized load balancing across multiple sites
|
US9172611B2
(en)
|
2006-09-01 |
2015-10-27 |
Spirent Communications, Inc. |
System and method for discovering assets and functional relationships in a network
|
US7954161B1
(en)
|
2007-06-08 |
2011-05-31 |
Mu Dynamics, Inc. |
Mechanism for characterizing soft failures in systems under attack
|
US7958230B2
(en)
|
2008-09-19 |
2011-06-07 |
Mu Dynamics, Inc. |
Test driven deployment and monitoring of heterogeneous network systems
|
US8316447B2
(en)
*
|
2006-09-01 |
2012-11-20 |
Mu Dynamics, Inc. |
Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
|
US8078972B2
(en)
|
2006-09-15 |
2011-12-13 |
Citrix Systems, Inc. |
Methods and interfaces for displaying performance data related to a current remote access session
|
US7978617B2
(en)
*
|
2006-09-15 |
2011-07-12 |
Citrix Systems, Inc. |
Methods for providing performance improvement recommendations
|
US8087088B1
(en)
*
|
2006-09-28 |
2011-12-27 |
Whitehat Security, Inc. |
Using fuzzy classification models to perform matching operations in a web application security scanner
|
US8370929B1
(en)
*
|
2006-09-28 |
2013-02-05 |
Whitehat Security, Inc. |
Automatic response culling for web application security scan spidering process
|
JP4908131B2
(ja)
*
|
2006-09-28 |
2012-04-04 |
富士通株式会社 |
非即時処理存在可能性の表示処理プログラム,装置,および方法
|
US8789187B1
(en)
*
|
2006-09-28 |
2014-07-22 |
Whitehat Security, Inc. |
Pattern tracking and capturing human insight in a web application security scanner
|
US8533846B2
(en)
|
2006-11-08 |
2013-09-10 |
Citrix Systems, Inc. |
Method and system for dynamically associating access rights with a resource
|
US8656495B2
(en)
*
|
2006-11-17 |
2014-02-18 |
Hewlett-Packard Development Company, L.P. |
Web application assessment based on intelligent generation of attack strings
|
US7788198B2
(en)
|
2006-12-14 |
2010-08-31 |
Microsoft Corporation |
Method for detecting anomalies in server behavior using operational performance and failure mode monitoring counters
|
US8959647B2
(en)
*
|
2007-02-27 |
2015-02-17 |
Microsoft Corporation |
Runtime security and exception handler protection
|
US8250525B2
(en)
|
2007-03-02 |
2012-08-21 |
Pegasystems Inc. |
Proactive performance management for multi-user enterprise software systems
|
EP2132675B1
(de)
*
|
2007-03-06 |
2019-09-11 |
Help/Systems, LLC |
System und verfahren für penetrationstests bei anwendungen
|
US7809818B2
(en)
|
2007-03-12 |
2010-10-05 |
Citrix Systems, Inc. |
Systems and method of using HTTP head command for prefetching
|
US7853678B2
(en)
*
|
2007-03-12 |
2010-12-14 |
Citrix Systems, Inc. |
Systems and methods for configuring flow control of policy expressions
|
US7720936B2
(en)
|
2007-03-12 |
2010-05-18 |
Citrix Systems, Inc. |
Systems and methods of freshening and prefreshening a DNS cache
|
US7584294B2
(en)
|
2007-03-12 |
2009-09-01 |
Citrix Systems, Inc. |
Systems and methods for prefetching objects for caching using QOS
|
US8103783B2
(en)
*
|
2007-03-12 |
2012-01-24 |
Citrix Systems, Inc. |
Systems and methods of providing security and reliability to proxy caches
|
US7870277B2
(en)
*
|
2007-03-12 |
2011-01-11 |
Citrix Systems, Inc. |
Systems and methods for using object oriented expressions to configure application security policies
|
US7865585B2
(en)
*
|
2007-03-12 |
2011-01-04 |
Citrix Systems, Inc. |
Systems and methods for providing dynamic ad hoc proxy-cache hierarchies
|
US7853679B2
(en)
*
|
2007-03-12 |
2010-12-14 |
Citrix Systems, Inc. |
Systems and methods for configuring handling of undefined policy events
|
US8074028B2
(en)
*
|
2007-03-12 |
2011-12-06 |
Citrix Systems, Inc. |
Systems and methods of providing a multi-tier cache
|
US8255570B2
(en)
|
2007-03-12 |
2012-08-28 |
Citrix Systems, Inc. |
Systems and methods of compression history expiration and synchronization
|
US8037126B2
(en)
|
2007-03-12 |
2011-10-11 |
Citrix Systems, Inc. |
Systems and methods of dynamically checking freshness of cached objects based on link status
|
US7619545B2
(en)
*
|
2007-03-12 |
2009-11-17 |
Citrix Systems, Inc. |
Systems and methods of using application and protocol specific parsing for compression
|
US20080228864A1
(en)
*
|
2007-03-12 |
2008-09-18 |
Robert Plamondon |
Systems and methods for prefetching non-cacheable content for compression history
|
US8490148B2
(en)
|
2007-03-12 |
2013-07-16 |
Citrix Systems, Inc |
Systems and methods for managing application security profiles
|
US8701010B2
(en)
|
2007-03-12 |
2014-04-15 |
Citrix Systems, Inc. |
Systems and methods of using the refresh button to determine freshness policy
|
US7783757B2
(en)
|
2007-03-12 |
2010-08-24 |
Citrix Systems, Inc. |
Systems and methods of revalidating cached objects in parallel with request for object
|
US8504775B2
(en)
*
|
2007-03-12 |
2013-08-06 |
Citrix Systems, Inc |
Systems and methods of prefreshening cached objects based on user's current web page
|
US8631147B2
(en)
|
2007-03-12 |
2014-01-14 |
Citrix Systems, Inc. |
Systems and methods for configuring policy bank invocations
|
US7460038B2
(en)
*
|
2007-03-12 |
2008-12-02 |
Citrix Systems, Inc. |
Systems and methods of clustered sharing of compression histories
|
US7865589B2
(en)
|
2007-03-12 |
2011-01-04 |
Citrix Systems, Inc. |
Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
|
US7532134B2
(en)
*
|
2007-03-12 |
2009-05-12 |
Citrix Systems, Inc. |
Systems and methods for sharing compression histories between multiple devices
|
US7827237B2
(en)
*
|
2007-03-12 |
2010-11-02 |
Citrix Systems, Inc. |
Systems and methods for identifying long matches of data in a compression history
|
ES2446944T3
(es)
*
|
2007-04-12 |
2014-03-10 |
Core Sdi, Incorporated |
Sistema, método y medio legible por ordenador para proporcionar pruebas de penetración de red
|
US7743281B2
(en)
*
|
2007-04-13 |
2010-06-22 |
Microsoft Corporation |
Distributed file fuzzing
|
US8336102B2
(en)
*
|
2007-06-01 |
2012-12-18 |
Microsoft Corporation |
Delivering malformed data for fuzz testing to software applications
|
US10019570B2
(en)
*
|
2007-06-14 |
2018-07-10 |
Microsoft Technology Licensing, Llc |
Protection and communication abstractions for web browsers
|
US20090006618A1
(en)
*
|
2007-06-28 |
2009-01-01 |
Richard Hayton |
Methods and systems for access routing and resource mapping using filters
|
US8561148B2
(en)
|
2008-06-26 |
2013-10-15 |
Citrix Systems, Inc. |
Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies
|
US8775944B2
(en)
*
|
2008-06-26 |
2014-07-08 |
Citrix Systems, Inc. |
Methods and systems for interactive evaluation of policies
|
US20090007021A1
(en)
*
|
2007-06-28 |
2009-01-01 |
Richard Hayton |
Methods and systems for dynamic generation of filters using a graphical user interface
|
US7774637B1
(en)
|
2007-09-05 |
2010-08-10 |
Mu Dynamics, Inc. |
Meta-instrumentation for security analysis
|
US8871096B2
(en)
*
|
2007-09-10 |
2014-10-28 |
Res Usa, Llc |
Magnetic separation combined with dynamic settling for fischer-tropsch processes
|
US8250658B2
(en)
*
|
2007-09-20 |
2012-08-21 |
Mu Dynamics, Inc. |
Syntax-based security analysis using dynamically generated test cases
|
US7925694B2
(en)
*
|
2007-10-19 |
2011-04-12 |
Citrix Systems, Inc. |
Systems and methods for managing cookies via HTTP content layer
|
US8190707B2
(en)
|
2007-10-20 |
2012-05-29 |
Citrix Systems, Inc. |
System and method for transferring data among computing environments
|
US8316448B2
(en)
|
2007-10-26 |
2012-11-20 |
Microsoft Corporation |
Automatic filter generation and generalization
|
US8122436B2
(en)
*
|
2007-11-16 |
2012-02-21 |
Microsoft Corporation |
Privacy enhanced error reports
|
US8677141B2
(en)
*
|
2007-11-23 |
2014-03-18 |
Microsoft Corporation |
Enhanced security and performance of web applications
|
US8613096B2
(en)
*
|
2007-11-30 |
2013-12-17 |
Microsoft Corporation |
Automatic data patch generation for unknown vulnerabilities
|
US8769660B2
(en)
|
2008-01-26 |
2014-07-01 |
Citrix Systems, Inc. |
Systems and methods for proxying cookies for SSL VPN clientless sessions
|
KR101001132B1
(ko)
*
|
2008-02-22 |
2010-12-15 |
엔에이치엔비즈니스플랫폼 주식회사 |
웹 어플리케이션의 취약성 판단 방법 및 시스템
|
US8601586B1
(en)
*
|
2008-03-24 |
2013-12-03 |
Google Inc. |
Method and system for detecting web application vulnerabilities
|
KR20090121579A
(ko)
*
|
2008-05-22 |
2009-11-26 |
주식회사 이베이지마켓 |
서버의 취약점을 점검하기 위한 시스템 및 그 방법
|
US9264443B2
(en)
*
|
2008-08-25 |
2016-02-16 |
International Business Machines Corporation |
Browser based method of assessing web application vulnerability
|
US9235704B2
(en)
*
|
2008-10-21 |
2016-01-12 |
Lookout, Inc. |
System and method for a scanning API
|
US8533844B2
(en)
|
2008-10-21 |
2013-09-10 |
Lookout, Inc. |
System and method for security data collection and analysis
|
US9781148B2
(en)
|
2008-10-21 |
2017-10-03 |
Lookout, Inc. |
Methods and systems for sharing risk responses between collections of mobile communications devices
|
US8464318B1
(en)
*
|
2008-11-24 |
2013-06-11 |
Renen Hallak |
System and method for protecting web clients and web-based applications
|
US8843435B1
(en)
|
2009-03-12 |
2014-09-23 |
Pegasystems Inc. |
Techniques for dynamic data processing
|
US8468492B1
(en)
|
2009-03-30 |
2013-06-18 |
Pegasystems, Inc. |
System and method for creation and modification of software applications
|
US20100293618A1
(en)
*
|
2009-05-12 |
2010-11-18 |
Microsoft Corporation |
Runtime analysis of software privacy issues
|
US8365290B2
(en)
*
|
2009-05-15 |
2013-01-29 |
Frederick Young |
Web application vulnerability scanner
|
CN101964025B
(zh)
*
|
2009-07-23 |
2016-02-03 |
北京神州绿盟信息安全科技股份有限公司 |
Xss检测方法和设备
|
US8756684B2
(en)
|
2010-03-01 |
2014-06-17 |
Emc Corporation |
System and method for network security including detection of attacks through partner websites
|
CA2791566C
(en)
*
|
2010-03-01 |
2018-09-18 |
Andreas Wittenstein |
System and method for network security including detection of attacks through partner websites
|
US8463860B1
(en)
|
2010-05-05 |
2013-06-11 |
Spirent Communications, Inc. |
Scenario based scale testing
|
US8547974B1
(en)
|
2010-05-05 |
2013-10-01 |
Mu Dynamics |
Generating communication protocol test cases based on network traffic
|
US9098333B1
(en)
|
2010-05-07 |
2015-08-04 |
Ziften Technologies, Inc. |
Monitoring computer process resource usage
|
CN103392320B
(zh)
|
2010-12-29 |
2016-08-31 |
思杰系统有限公司 |
对加密项目进行多层标记以提供额外的安全和有效的加密项目确定的系统和方法
|
US9106514B1
(en)
|
2010-12-30 |
2015-08-11 |
Spirent Communications, Inc. |
Hybrid network software provision
|
US10043011B2
(en)
*
|
2011-01-19 |
2018-08-07 |
Rapid7, Llc |
Methods and systems for providing recommendations to address security vulnerabilities in a network of computing systems
|
US10048854B2
(en)
|
2011-01-31 |
2018-08-14 |
Oracle International Corporation |
Drag and drop interaction between components of a web application
|
US8572505B2
(en)
*
|
2011-01-31 |
2013-10-29 |
Oracle International Corporation |
Automatically testing a web application that has independent display trees
|
US8880487B1
(en)
|
2011-02-18 |
2014-11-04 |
Pegasystems Inc. |
Systems and methods for distributed rules processing
|
US8464219B1
(en)
|
2011-04-27 |
2013-06-11 |
Spirent Communications, Inc. |
Scalable control system for test execution and monitoring utilizing multiple processors
|
US9135405B2
(en)
*
|
2011-05-26 |
2015-09-15 |
Carnegie Mellon University |
Automated exploit generation
|
WO2012166120A1
(en)
*
|
2011-05-31 |
2012-12-06 |
Hewlett-Packard Development Company, L.P. |
Application security testing
|
US9501650B2
(en)
|
2011-05-31 |
2016-11-22 |
Hewlett Packard Enterprise Development Lp |
Application security testing
|
US8615159B2
(en)
|
2011-09-20 |
2013-12-24 |
Citrix Systems, Inc. |
Methods and systems for cataloging text in a recorded session
|
US8572750B2
(en)
|
2011-09-30 |
2013-10-29 |
International Business Machines Corporation |
Web application exploit mitigation in an information technology environment
|
US10586049B2
(en)
*
|
2011-12-22 |
2020-03-10 |
International Business Machines Corporation |
Detection of second order vulnerabilities in web services
|
US9195936B1
(en)
|
2011-12-30 |
2015-11-24 |
Pegasystems Inc. |
System and method for updating or modifying an application without manual coding
|
CN104077353B
(zh)
*
|
2011-12-30 |
2017-08-25 |
北京奇虎科技有限公司 |
一种黑链检测的方法及装置
|
US20130185623A1
(en)
*
|
2012-01-12 |
2013-07-18 |
International Business Machines Corporation |
Instructing web clients to ignore scripts in specified portions of web pages
|
WO2013106947A1
(en)
*
|
2012-01-18 |
2013-07-25 |
Metrologic Instruments, Inc. |
Web-based scan-task enabled system. and method of and apparatus for developing and deploying the same on a client-server network
|
US9213832B2
(en)
*
|
2012-01-24 |
2015-12-15 |
International Business Machines Corporation |
Dynamically scanning a web application through use of web traffic information
|
US8997235B2
(en)
*
|
2012-02-07 |
2015-03-31 |
Microsoft Technology Licensing, Llc |
Adaptive fuzzing system for web services
|
EP2820583A4
(de)
*
|
2012-02-29 |
2015-11-25 |
Hewlett Packard Development Co |
Netzwerkdienst-schnittstellenanalyse
|
US9223961B1
(en)
*
|
2012-04-04 |
2015-12-29 |
Symantec Corporation |
Systems and methods for performing security analyses of applications configured for cloud-based platforms
|
US9275227B2
(en)
*
|
2012-04-05 |
2016-03-01 |
International Business Machines Corporation |
Policy driven administration of mobile applications
|
US8972543B1
(en)
|
2012-04-11 |
2015-03-03 |
Spirent Communications, Inc. |
Managing clients utilizing reverse transactions
|
CN103425929B
(zh)
*
|
2012-05-22 |
2016-05-25 |
百度在线网络技术(北京)有限公司 |
web白盒扫描方法及装置
|
CN102801740A
(zh)
*
|
2012-08-30 |
2012-11-28 |
苏州山石网络有限公司 |
木马病毒的阻止方法及装置
|
CA2789909C
(en)
|
2012-09-14 |
2019-09-10 |
Ibm Canada Limited - Ibm Canada Limitee |
Synchronizing http requests with respective html context
|
US8949995B2
(en)
|
2012-09-18 |
2015-02-03 |
International Business Machines Corporation |
Certifying server side web applications against security vulnerabilities
|
US9032530B2
(en)
*
|
2012-09-28 |
2015-05-12 |
International Business Machines Corporation |
Correcting workflow security vulnerabilities via static analysis and virtual patching
|
EP2901346A4
(de)
*
|
2012-09-28 |
2016-06-08 |
Hewlett Packard Development Co |
Sicherheitsprüfung einer anwendung
|
US9317693B2
(en)
|
2012-10-22 |
2016-04-19 |
Rapid7, Llc |
Systems and methods for advanced dynamic analysis scanning
|
CN103810181A
(zh)
*
|
2012-11-07 |
2014-05-21 |
江苏仕德伟网络科技股份有限公司 |
判断网页是否包含黑链的方法
|
US10108801B2
(en)
*
|
2012-11-15 |
2018-10-23 |
Qualys, Inc. |
Web application vulnerability scanning
|
CN103839002A
(zh)
|
2012-11-21 |
2014-06-04 |
腾讯科技(深圳)有限公司 |
网站源代码恶意链接注入监控方法及装置
|
US20140157419A1
(en)
|
2012-12-05 |
2014-06-05 |
International Business Machines Corporation |
Discovery of application vulnerabilities involving multiple execution flows
|
MX2015009172A
(es)
*
|
2013-01-15 |
2016-02-18 |
Beyondtrust Software Inc |
Sistemas y metodos para identificar y reportar vulnerabilidades de aplicaciones y archivos.
|
EP2951718A4
(de)
*
|
2013-01-29 |
2016-08-31 |
Hewlett Packard Entpr Dev Lp |
Analysestruktur für webanwendung
|
EP2959401A4
(de)
*
|
2013-02-25 |
2016-09-28 |
Hewlett Packard Development Co |
Regelbasierte darstellung von benutzeroberflächenelementen
|
US9467465B2
(en)
|
2013-02-25 |
2016-10-11 |
Beyondtrust Software, Inc. |
Systems and methods of risk based rules for application control
|
US9953169B2
(en)
|
2013-02-28 |
2018-04-24 |
Entit Software Llc |
Modify execution of application under test so user is power user
|
US9292694B1
(en)
|
2013-03-15 |
2016-03-22 |
Bitdefender IPR Management Ltd. |
Privacy protection for mobile devices
|
WO2014171950A1
(en)
*
|
2013-04-19 |
2014-10-23 |
Hewlett-Packard Development Company, L.P. |
Unused parameters of application under test
|
GB2515778A
(en)
|
2013-07-03 |
2015-01-07 |
Ibm |
Measuring robustness of web services to denial of service attacks
|
GB2516050A
(en)
|
2013-07-09 |
2015-01-14 |
Ibm |
A Network Security System
|
CN103942497B
(zh)
*
|
2013-09-11 |
2017-05-03 |
杭州安恒信息技术有限公司 |
一种取证式网站漏洞扫描方法和系统
|
WO2015116138A1
(en)
*
|
2014-01-31 |
2015-08-06 |
Hewlett-Packard Development Company |
Application test using attack suggestions
|
WO2016036368A1
(en)
*
|
2014-09-04 |
2016-03-10 |
Hewlett Packard Enterprise Development Lp |
Determine protective measure for data that meets criteria
|
US10515220B2
(en)
|
2014-09-25 |
2019-12-24 |
Micro Focus Llc |
Determine whether an appropriate defensive response was made by an application under test
|
US10469396B2
(en)
|
2014-10-10 |
2019-11-05 |
Pegasystems, Inc. |
Event processing with enhanced throughput
|
US9479525B2
(en)
*
|
2014-10-23 |
2016-10-25 |
International Business Machines Corporation |
Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server
|
US10182068B2
(en)
*
|
2014-11-26 |
2019-01-15 |
Entit Software Llc |
Determine vulnerability using runtime agent and network sniffer
|
US10120997B2
(en)
|
2015-01-01 |
2018-11-06 |
Checkmarx Ltd. |
Code instrumentation for runtime application self-protection
|
US10834065B1
(en)
|
2015-03-31 |
2020-11-10 |
F5 Networks, Inc. |
Methods for SSL protected NTLM re-authentication and devices thereof
|
US10826928B2
(en)
|
2015-07-10 |
2020-11-03 |
Reliaquest Holdings, Llc |
System and method for simulating network security threats and assessing network security
|
US9781158B1
(en)
|
2015-09-30 |
2017-10-03 |
EMC IP Holding Company LLC |
Integrated paronymous network address detection
|
US10264008B2
(en)
|
2015-10-08 |
2019-04-16 |
Bank Of America Corporation |
Vulnerability exposing application characteristic variation identification engine
|
US11100231B2
(en)
*
|
2015-10-08 |
2021-08-24 |
Errin Wesley Fulp |
Methods, systems and computer readable media for providing resilient computing services using systems diversity
|
WO2017082920A1
(en)
*
|
2015-11-13 |
2017-05-18 |
Hewlett Packard Enterprise Development Lp |
Automated multi-credential assessment
|
US9860250B2
(en)
*
|
2015-12-14 |
2018-01-02 |
Mastercard International Incorporated |
Systems and methods for use in indexing applications based on security standards
|
US10404698B1
(en)
|
2016-01-15 |
2019-09-03 |
F5 Networks, Inc. |
Methods for adaptive organization of web application access points in webtops and devices thereof
|
EP3433782B1
(de)
*
|
2016-03-21 |
2020-09-30 |
Checkmarx Ltd. |
Integrierte interaktive anwendungssicherheitsprüfung
|
US10387656B2
(en)
*
|
2016-03-21 |
2019-08-20 |
Checkmarx Ltd. |
Integrated interactive application security testing
|
US10698599B2
(en)
|
2016-06-03 |
2020-06-30 |
Pegasystems, Inc. |
Connecting graphical shapes using gestures
|
US10698647B2
(en)
|
2016-07-11 |
2020-06-30 |
Pegasystems Inc. |
Selective sharing for collaborative application usage
|
US10395040B2
(en)
*
|
2016-07-18 |
2019-08-27 |
vThreat, Inc. |
System and method for identifying network security threats and assessing network security
|
US10769267B1
(en)
*
|
2016-09-14 |
2020-09-08 |
Ca, Inc. |
Systems and methods for controlling access to credentials
|
US10333994B2
(en)
*
|
2016-11-09 |
2019-06-25 |
Cisco Technology, Inc. |
Method and device for improved multi-homed media transport
|
WO2018143097A1
(ja)
*
|
2017-01-31 |
2018-08-09 |
日本電信電話株式会社 |
判定装置、判定方法、および、判定プログラム
|
CN108696490A
(zh)
*
|
2017-04-11 |
2018-10-23 |
腾讯科技(深圳)有限公司 |
账号权限的识别方法及装置
|
EP3401827A1
(de)
|
2017-05-10 |
2018-11-14 |
Checkmarx Ltd. |
Computerimplementiertes verfahren und datenverarbeitungssystem
|
US10977361B2
(en)
|
2017-05-16 |
2021-04-13 |
Beyondtrust Software, Inc. |
Systems and methods for controlling privileged operations
|
US10831892B2
(en)
*
|
2018-06-07 |
2020-11-10 |
Sap Se |
Web browser script monitoring
|
US11048488B2
(en)
|
2018-08-14 |
2021-06-29 |
Pegasystems, Inc. |
Software code optimizer and method
|
US11528149B2
(en)
|
2019-04-26 |
2022-12-13 |
Beyondtrust Software, Inc. |
Root-level application selective configuration
|
US11368470B2
(en)
*
|
2019-06-13 |
2022-06-21 |
International Business Machines Corporation |
Real-time alert reasoning and priority-based campaign discovery
|
US11663339B2
(en)
*
|
2019-07-31 |
2023-05-30 |
International Business Machines Corporation |
Security testing based on user request
|
US11228611B1
(en)
*
|
2019-08-20 |
2022-01-18 |
Rapid7, Inc. |
Scanning unexposed web applications for vulnerabilities
|
US11297091B2
(en)
|
2019-09-24 |
2022-04-05 |
Bank Of America Corporation |
HTTP log integration to web application testing
|
CN110855612B
(zh)
*
|
2019-10-12 |
2022-03-18 |
杭州安恒信息技术股份有限公司 |
web后门路径探测方法
|
US11568130B1
(en)
*
|
2019-12-09 |
2023-01-31 |
Synopsys, Inc. |
Discovering contextualized placeholder variables in template code
|
US10977168B1
(en)
|
2019-12-26 |
2021-04-13 |
Anthem, Inc. |
Automation testing tool framework
|
US11411918B2
(en)
|
2020-05-26 |
2022-08-09 |
Microsoft Technology Licensing, Llc |
User interface for web server risk awareness
|
US11290480B2
(en)
|
2020-05-26 |
2022-03-29 |
Bank Of America Corporation |
Network vulnerability assessment tool
|
EP3945441B1
(de)
|
2020-07-28 |
2024-09-04 |
Checkmarx Ltd. |
Erkennung von nutzbaren pfaden in anwendungssoftware, die bibliotheken von dritten verwendet
|
US11567945B1
(en)
|
2020-08-27 |
2023-01-31 |
Pegasystems Inc. |
Customized digital content generation systems and methods
|
CN112906010B
(zh)
*
|
2021-05-07 |
2021-07-20 |
北京安普诺信息技术有限公司 |
一种自动化攻击测试方法及基于此的自动化安全测试方法
|
US12047406B1
(en)
*
|
2022-02-09 |
2024-07-23 |
Rapid7, Inc. |
Processing of web content for vulnerability assessments
|
US11930043B1
(en)
*
|
2023-02-28 |
2024-03-12 |
Blockaid Ltd |
Techniques for digital wallet integration and for scanning transactions using integrated modules
|
US12045826B1
(en)
*
|
2023-02-28 |
2024-07-23 |
Blockaid Ltd |
Techniques for decentralized application discovery and scanning
|