US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US6938058B2
(en)
|
1999-08-23 |
2005-08-30 |
Eisenworld, Inc. |
Apparatus and method for transferring information between platforms
|
US6842861B1
(en)
*
|
2000-03-24 |
2005-01-11 |
Networks Associates Technology, Inc. |
Method and system for detecting viruses on handheld computers
|
US6654816B1
(en)
*
|
2000-05-31 |
2003-11-25 |
Hewlett-Packard Development Company, L.P. |
Communication interface systems for locally analyzing computers
|
US20040073617A1
(en)
*
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US20040064737A1
(en)
*
|
2000-06-19 |
2004-04-01 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
|
US7328349B2
(en)
*
|
2001-12-14 |
2008-02-05 |
Bbn Technologies Corp. |
Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
|
US6901519B1
(en)
|
2000-06-22 |
2005-05-31 |
Infobahn, Inc. |
E-mail virus protection system and method
|
GB2368233B
(en)
*
|
2000-08-31 |
2002-10-16 |
F Secure Oyj |
Maintaining virus detection software
|
GB2366693B
(en)
*
|
2000-08-31 |
2002-08-14 |
F Secure Oyj |
Software virus protection
|
JP4867125B2
(en)
*
|
2000-09-20 |
2012-02-01 |
ソニー株式会社 |
Distribution system and distribution method
|
JP4281238B2
(en)
*
|
2000-10-06 |
2009-06-17 |
ソニー株式会社 |
Program information providing apparatus and method, image recording system, and program storage medium
|
EP1202148A1
(en)
*
|
2000-10-31 |
2002-05-02 |
Hewlett-Packard Company, A Delaware Corporation |
Virus check on altered data
|
US7155487B2
(en)
*
|
2000-11-30 |
2006-12-26 |
Intel Corporation |
Method, system and article of manufacture for data distribution over a network
|
US7877518B2
(en)
*
|
2000-11-30 |
2011-01-25 |
Access Systems Americas, Inc. |
Method and apparatus for updating applications on a mobile device via device synchronization
|
US7200105B1
(en)
|
2001-01-12 |
2007-04-03 |
Bbn Technologies Corp. |
Systems and methods for point of ingress traceback of a network attack
|
US6965928B1
(en)
*
|
2001-03-09 |
2005-11-15 |
Networks Associates Technology, Inc. |
System and method for remote maintenance of handheld computers
|
JP2002314658A
(en)
*
|
2001-04-16 |
2002-10-25 |
Nec Corp |
Folding portable terminal
|
US7228565B2
(en)
*
|
2001-05-15 |
2007-06-05 |
Mcafee, Inc. |
Event reporting between a reporting computer and a receiving computer
|
US7861303B2
(en)
|
2001-08-01 |
2010-12-28 |
Mcafee, Inc. |
Malware scanning wireless service agent system and method
|
US20030028870A1
(en)
*
|
2001-08-01 |
2003-02-06 |
Weisman Mitchell T. |
Distribution of downloadable software over a network
|
US7302706B1
(en)
*
|
2001-08-31 |
2007-11-27 |
Mcafee, Inc |
Network-based file scanning and solution delivery in real time
|
US6978223B2
(en)
*
|
2001-09-06 |
2005-12-20 |
Bbnt Solutions Llc |
Systems and methods for network performance measurement using packet signature collection
|
GB0129596D0
(en)
*
|
2001-12-11 |
2002-01-30 |
Nokia Corp |
Risk detection
|
US7096500B2
(en)
*
|
2001-12-21 |
2006-08-22 |
Mcafee, Inc. |
Predictive malware scanning of internet data
|
US20030149887A1
(en)
*
|
2002-02-01 |
2003-08-07 |
Satyendra Yadav |
Application-specific network intrusion detection
|
US7174566B2
(en)
|
2002-02-01 |
2007-02-06 |
Intel Corporation |
Integrated network intrusion detection
|
US7203681B1
(en)
*
|
2002-02-20 |
2007-04-10 |
Palm, Inc. |
Hand-held device filtering
|
JP4567275B2
(en)
*
|
2002-02-28 |
2010-10-20 |
株式会社エヌ・ティ・ティ・ドコモ |
Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
|
US7503042B2
(en)
*
|
2002-03-08 |
2009-03-10 |
Microsoft Corporation |
Non-script based intelligent migration tool capable of migrating software selected by a user, including software for which said migration tool has had no previous knowledge or encounters
|
US7376842B1
(en)
*
|
2002-03-13 |
2008-05-20 |
Mcafee, Inc. |
Malware scanning messages containing multiple data records
|
EP1500206B1
(en)
*
|
2002-04-19 |
2012-07-11 |
Computer Associates Think, Inc. |
System and method for managing wireless devices in an enterprise
|
US20030204596A1
(en)
*
|
2002-04-29 |
2003-10-30 |
Satyendra Yadav |
Application-based network quality of service provisioning
|
KR20030087195A
(en)
*
|
2002-05-07 |
2003-11-14 |
주식회사 세니온 |
Mobile Communication Terminal And Computer Virus Detection And Cure Service Method In The Mobile Communication Terminal
|
US7103913B2
(en)
*
|
2002-05-08 |
2006-09-05 |
International Business Machines Corporation |
Method and apparatus for determination of the non-replicative behavior of a malicious program
|
KR20030087861A
(en)
*
|
2002-05-10 |
2003-11-15 |
신승중 |
Remote Controller for Remedy of Computer Virus
|
FR2841425B1
(en)
*
|
2002-06-20 |
2004-09-24 |
Cit Alcatel |
METHOD FOR PROVIDING SERVICE CONFIGURATION DATA TO A MOBILE TELEPHONY DEVICE THROUGH A COMPUTER TERMINAL
|
US20040015718A1
(en)
*
|
2002-07-22 |
2004-01-22 |
Hostsentinel, Inc. |
Framework for collaborative suppression of undesirable computer activity
|
US7487543B2
(en)
*
|
2002-07-23 |
2009-02-03 |
International Business Machines Corporation |
Method and apparatus for the automatic determination of potentially worm-like behavior of a program
|
US7383579B1
(en)
*
|
2002-08-21 |
2008-06-03 |
At&T Delaware Intellectual Property, Inc. |
Systems and methods for determining anti-virus protection status
|
US7748039B2
(en)
*
|
2002-08-30 |
2010-06-29 |
Symantec Corporation |
Method and apparatus for detecting malicious code in an information handling system
|
US7331062B2
(en)
*
|
2002-08-30 |
2008-02-12 |
Symantec Corporation |
Method, computer software, and system for providing end to end security protection of an online transaction
|
US7509679B2
(en)
*
|
2002-08-30 |
2009-03-24 |
Symantec Corporation |
Method, system and computer program product for security in a global computer network transaction
|
US7832011B2
(en)
*
|
2002-08-30 |
2010-11-09 |
Symantec Corporation |
Method and apparatus for detecting malicious code in an information handling system
|
US7337471B2
(en)
*
|
2002-10-07 |
2008-02-26 |
Symantec Corporation |
Selective detection of malicious computer code
|
US7260847B2
(en)
*
|
2002-10-24 |
2007-08-21 |
Symantec Corporation |
Antivirus scanning in a hard-linked environment
|
JP4181965B2
(en)
*
|
2002-11-11 |
2008-11-19 |
キヤノン株式会社 |
Computer peripheral device and control method thereof
|
US7373664B2
(en)
*
|
2002-12-16 |
2008-05-13 |
Symantec Corporation |
Proactive protection against e-mail worms and spam
|
US20040128203A1
(en)
*
|
2002-12-26 |
2004-07-01 |
Pierre Christa St. |
Scheme for creating and delivering a new customized computer system with the "personality" of a user's other computer system pre-installed
|
KR100551421B1
(en)
|
2002-12-28 |
2006-02-09 |
주식회사 팬택앤큐리텔 |
Mobile communication system of inactivating virus
|
US20040145615A1
(en)
*
|
2003-01-29 |
2004-07-29 |
Castro Eugene Villa |
Printing/scanning device entitlement monitoring system
|
US20040153666A1
(en)
*
|
2003-02-05 |
2004-08-05 |
Sobel William E. |
Structured rollout of updates to malicious computer code detection definitions
|
US7293290B2
(en)
*
|
2003-02-06 |
2007-11-06 |
Symantec Corporation |
Dynamic detection of computer worms
|
US20040158546A1
(en)
*
|
2003-02-06 |
2004-08-12 |
Sobel William E. |
Integrity checking for software downloaded from untrusted sources
|
US20040158741A1
(en)
*
|
2003-02-07 |
2004-08-12 |
Peter Schneider |
System and method for remote virus scanning in wireless networks
|
US7246227B2
(en)
*
|
2003-02-10 |
2007-07-17 |
Symantec Corporation |
Efficient scanning of stream based data
|
US6941453B2
(en)
*
|
2003-02-11 |
2005-09-06 |
Bitfone Corporation |
System and method for determining if a device needs to be updated and locating and invoking an update agent to update the firmware or software in the device
|
US7546638B2
(en)
*
|
2003-03-18 |
2009-06-09 |
Symantec Corporation |
Automated identification and clean-up of malicious computer code
|
JP3835421B2
(en)
*
|
2003-03-28 |
2006-10-18 |
コニカミノルタビジネステクノロジーズ株式会社 |
Control program and control device
|
KR20040089386A
(en)
*
|
2003-04-14 |
2004-10-21 |
주식회사 하우리 |
Curative Method for Computer Virus Infecting Memory, Recording Medium Comprising Program Readable by Computer, and The Device
|
US6987963B2
(en)
*
|
2003-04-17 |
2006-01-17 |
Ntt Docomo, Inc. |
System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
|
US20040250115A1
(en)
*
|
2003-04-21 |
2004-12-09 |
Trend Micro Incorporated. |
Self-contained mechanism for deploying and controlling data security services via a web browser platform
|
US20050005152A1
(en)
*
|
2003-07-01 |
2005-01-06 |
Navjot Singh |
Security vulnerability monitor
|
US9118709B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US9118711B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
JP4604029B2
(en)
*
|
2003-07-07 |
2010-12-22 |
エムフォメーション・テクノロジーズ・インコーポレイテッド |
OTA wireless device and system and method for network management
|
US7424706B2
(en)
*
|
2003-07-16 |
2008-09-09 |
Microsoft Corporation |
Automatic detection and patching of vulnerable files
|
US7552473B2
(en)
*
|
2003-08-12 |
2009-06-23 |
Symantec Corporation |
Detecting and blocking drive sharing worms
|
US7739278B1
(en)
|
2003-08-22 |
2010-06-15 |
Symantec Corporation |
Source independent file attribute tracking
|
US20050064859A1
(en)
*
|
2003-09-23 |
2005-03-24 |
Motorola, Inc. |
Server-based system for backing up memory of a wireless subscriber device
|
US7519726B2
(en)
*
|
2003-12-12 |
2009-04-14 |
International Business Machines Corporation |
Methods, apparatus and computer programs for enhanced access to resources within a network
|
US7475427B2
(en)
*
|
2003-12-12 |
2009-01-06 |
International Business Machines Corporation |
Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network
|
US7398399B2
(en)
*
|
2003-12-12 |
2008-07-08 |
International Business Machines Corporation |
Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
|
US20050177720A1
(en)
*
|
2004-02-10 |
2005-08-11 |
Seiichi Katano |
Virus protection for multi-function peripherals
|
US20050177748A1
(en)
*
|
2004-02-10 |
2005-08-11 |
Seiichi Katano |
Virus protection for multi-function peripherals
|
US7130981B1
(en)
|
2004-04-06 |
2006-10-31 |
Symantec Corporation |
Signature driven cache extension for stream based scanning
|
US7904895B1
(en)
|
2004-04-21 |
2011-03-08 |
Hewlett-Packard Develpment Company, L.P. |
Firmware update in electronic devices employing update agent in a flash memory card
|
US7861304B1
(en)
|
2004-05-07 |
2010-12-28 |
Symantec Corporation |
Pattern matching using embedded functions
|
US7681237B1
(en)
*
|
2004-05-13 |
2010-03-16 |
Symantec Corporation |
Semi-synchronous scanning of modified files in real time
|
US7373667B1
(en)
|
2004-05-14 |
2008-05-13 |
Symantec Corporation |
Protecting a computer coupled to a network from malicious code infections
|
US7484094B1
(en)
|
2004-05-14 |
2009-01-27 |
Symantec Corporation |
Opening computer files quickly and safely over a network
|
US7694340B2
(en)
|
2004-06-21 |
2010-04-06 |
Microsoft Corporation |
Anti virus for an item store
|
FI20040944A0
(en)
*
|
2004-07-07 |
2004-07-07 |
Nokia Corp |
Content communication management in a communications system
|
US8146072B2
(en)
*
|
2004-07-30 |
2012-03-27 |
Hewlett-Packard Development Company, L.P. |
System and method for updating software on a computer
|
US7509676B2
(en)
*
|
2004-07-30 |
2009-03-24 |
Electronic Data Systems Corporation |
System and method for restricting access to an enterprise network
|
US8224784B2
(en)
*
|
2004-08-13 |
2012-07-17 |
Microsoft Corporation |
Combined computer disaster recovery and migration tool for effective disaster recovery as well as the backup and migration of user- and system-specific information
|
US7634685B2
(en)
|
2004-08-13 |
2009-12-15 |
Microsoft Corporation |
Remote computer disaster recovery and migration tool for effective disaster recovery and migration scheme
|
US8526940B1
(en)
|
2004-08-17 |
2013-09-03 |
Palm, Inc. |
Centralized rules repository for smart phone customer care
|
US8667590B1
(en)
|
2004-08-20 |
2014-03-04 |
Trend Micro Incorporated |
Method and apparatus for protecting high availability devices from computer viruses and other malicious content
|
US7509680B1
(en)
|
2004-09-01 |
2009-03-24 |
Symantec Corporation |
Detecting computer worms as they arrive at local computers through open network shares
|
GB2418500A
(en)
*
|
2004-09-27 |
2006-03-29 |
Clearswift Ltd |
Detection, quarantine and modification of dangerous web pages
|
US7565686B1
(en)
|
2004-11-08 |
2009-07-21 |
Symantec Corporation |
Preventing unauthorized loading of late binding code into a process
|
US20060101277A1
(en)
*
|
2004-11-10 |
2006-05-11 |
Meenan Patrick A |
Detecting and remedying unauthorized computer programs
|
US7735138B2
(en)
*
|
2005-01-14 |
2010-06-08 |
Trend Micro Incorporated |
Method and apparatus for performing antivirus tasks in a mobile wireless device
|
US8059551B2
(en)
*
|
2005-02-15 |
2011-11-15 |
Raytheon Bbn Technologies Corp. |
Method for source-spoofed IP packet traceback
|
KR100599084B1
(en)
*
|
2005-02-24 |
2006-07-12 |
삼성전자주식회사 |
Method for protecting virus on mobile communication network
|
US8607328B1
(en)
*
|
2005-03-04 |
2013-12-10 |
David Hodges |
Methods and systems for automated system support
|
CN1838668A
(en)
*
|
2005-03-22 |
2006-09-27 |
松下电器产业株式会社 |
Method for detecting computer virus and its application
|
US7730215B1
(en)
*
|
2005-04-08 |
2010-06-01 |
Symantec Corporation |
Detecting entry-portal-only network connections
|
CN100337200C
(en)
*
|
2005-04-22 |
2007-09-12 |
珠海金山软件股份有限公司 |
Software upgrading method for use in computer systems
|
US7895654B1
(en)
|
2005-06-27 |
2011-02-22 |
Symantec Corporation |
Efficient file scanning using secure listing of file modification times
|
US7975303B1
(en)
|
2005-06-27 |
2011-07-05 |
Symantec Corporation |
Efficient file scanning using input-output hints
|
EP1907901B1
(en)
*
|
2005-07-28 |
2017-01-18 |
Alcatel Lucent |
System and method for remotely controlling device functionality
|
JP5000652B2
(en)
*
|
2005-07-28 |
2012-08-15 |
エムフォメーション・テクノロジーズ・インコーポレイテッド |
System and method for quality of service management of wireless devices
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US8769663B2
(en)
*
|
2005-08-24 |
2014-07-01 |
Fortinet, Inc. |
Systems and methods for detecting undesirable network traffic content
|
US20070094731A1
(en)
*
|
2005-10-25 |
2007-04-26 |
Microsoft Corporation |
Integrated functionality for detecting and treating undesirable activities
|
US8381297B2
(en)
|
2005-12-13 |
2013-02-19 |
Yoggie Security Systems Ltd. |
System and method for providing network security to mobile devices
|
US8869270B2
(en)
*
|
2008-03-26 |
2014-10-21 |
Cupp Computing As |
System and method for implementing content and network security inside a chip
|
US20080276302A1
(en)
|
2005-12-13 |
2008-11-06 |
Yoggie Security Systems Ltd. |
System and Method for Providing Data and Device Security Between External and Host Devices
|
US7757290B2
(en)
*
|
2006-01-30 |
2010-07-13 |
Microsoft Corporation |
Bypassing software services to detect malware
|
US7634262B1
(en)
*
|
2006-03-07 |
2009-12-15 |
Trend Micro, Inc. |
Virus pattern update for mobile device
|
US20070214042A1
(en)
*
|
2006-03-13 |
2007-09-13 |
Microsoft Corporation |
Advertising triggered by sequences of user actions
|
US8443445B1
(en)
|
2006-03-31 |
2013-05-14 |
Emc Corporation |
Risk-aware scanning of objects
|
US7854006B1
(en)
|
2006-03-31 |
2010-12-14 |
Emc Corporation |
Differential virus scan
|
US8205261B1
(en)
|
2006-03-31 |
2012-06-19 |
Emc Corporation |
Incremental virus scan
|
US7542759B2
(en)
*
|
2006-04-18 |
2009-06-02 |
Edwards Bryan T |
Method and apparatus for broadcasting software update information to mobile phones over a wireless communications network
|
US20070277167A1
(en)
*
|
2006-05-23 |
2007-11-29 |
International Business Machines Corporation |
System and method for computer system maintenance
|
US8209676B2
(en)
|
2006-06-08 |
2012-06-26 |
Hewlett-Packard Development Company, L.P. |
Device management in a network
|
US20080010538A1
(en)
*
|
2006-06-27 |
2008-01-10 |
Symantec Corporation |
Detecting suspicious embedded malicious content in benign file formats
|
US8122507B1
(en)
*
|
2006-06-28 |
2012-02-21 |
Emc Corporation |
Efficient scanning of objects
|
US8087084B1
(en)
|
2006-06-28 |
2011-12-27 |
Emc Corporation |
Security for scanning objects
|
US8631494B2
(en)
*
|
2006-07-06 |
2014-01-14 |
Imation Corp. |
Method and device for scanning data for signatures prior to storage in a storage device
|
WO2008014454A2
(en)
|
2006-07-27 |
2008-01-31 |
Hewlett-Packard Development Company, L.P. |
User experience and dependency management in a mobile device
|
GB0621656D0
(en)
*
|
2006-10-31 |
2006-12-06 |
Hewlett Packard Development Co |
Data file transformation
|
US7945955B2
(en)
*
|
2006-12-18 |
2011-05-17 |
Quick Heal Technologies Private Limited |
Virus detection in mobile devices having insufficient resources to execute virus detection software
|
US7673023B1
(en)
*
|
2006-12-29 |
2010-03-02 |
Unisys Corporation |
Method and apparatus for service processor updates
|
US8635691B2
(en)
*
|
2007-03-02 |
2014-01-21 |
403 Labs, Llc |
Sensitive data scanner
|
US8533847B2
(en)
*
|
2007-05-24 |
2013-09-10 |
Sandisk Il Ltd. |
Apparatus and method for screening new data without impacting download speed
|
US8365272B2
(en)
|
2007-05-30 |
2013-01-29 |
Yoggie Security Systems Ltd. |
System and method for providing network and computer firewall protection with dynamic address isolation to a device
|
US20090031298A1
(en)
*
|
2007-06-11 |
2009-01-29 |
Jeffrey Brunet |
System and method for automated installation and/or launch of software
|
CN101359356B
(en)
*
|
2007-08-03 |
2010-08-25 |
联想(北京)有限公司 |
Method and system for deleting or isolating computer virus
|
US8087061B2
(en)
*
|
2007-08-07 |
2011-12-27 |
Microsoft Corporation |
Resource-reordered remediation of malware threats
|
US8250566B2
(en)
*
|
2007-09-27 |
2012-08-21 |
Mark Zusman |
Automated software upgrade and distribution
|
US8112807B2
(en)
*
|
2007-11-07 |
2012-02-07 |
Qualcomm Incorporated |
Systems, methods, and apparatuses for erasing memory on wireless devices
|
WO2009081502A1
(en)
*
|
2007-12-26 |
2009-07-02 |
Fujitsu Limited |
Communication terminal
|
US8255896B2
(en)
*
|
2008-04-01 |
2012-08-28 |
Honeywell International Inc. |
Network software normalization and installation in a fire detection system
|
US8341200B2
(en)
*
|
2008-06-12 |
2012-12-25 |
Pomian & Corella, Llc |
Protecting a web application against attacks through shared files
|
EP2136581A1
(en)
*
|
2008-06-16 |
2009-12-23 |
Koninklijke KPN N.V. |
Protecting a mobile device against a denial of service attack
|
US8631488B2
(en)
|
2008-08-04 |
2014-01-14 |
Cupp Computing As |
Systems and methods for providing security services during power management mode
|
KR20100033233A
(en)
*
|
2008-09-19 |
2010-03-29 |
엘지전자 주식회사 |
Mobile terminal and operation control method thereof
|
WO2010059864A1
(en)
|
2008-11-19 |
2010-05-27 |
Yoggie Security Systems Ltd. |
Systems and methods for providing real time access monitoring of a removable media device
|
US20100131683A1
(en)
*
|
2008-11-26 |
2010-05-27 |
Moore Clay S |
System for storing, accessing and automatically updating documents
|
TW201032062A
(en)
*
|
2009-02-27 |
2010-09-01 |
Io Interconnect Ltd |
Synchronization chip device of netbooks
|
US7591019B1
(en)
*
|
2009-04-01 |
2009-09-15 |
Kaspersky Lab, Zao |
Method and system for optimization of anti-virus scan
|
GB2469308B
(en)
*
|
2009-04-08 |
2014-02-19 |
F Secure Oyj |
Disinfecting a file system
|
US9015840B2
(en)
*
|
2009-06-08 |
2015-04-21 |
Clevx, Llc |
Portable media system with virus blocker and method of operation thereof
|
US8839421B2
(en)
|
2009-08-31 |
2014-09-16 |
Blackberry Limited |
System and method for controlling applications to mitigate the effects of malicious software
|
US9588829B2
(en)
*
|
2010-03-04 |
2017-03-07 |
F-Secure Oyj |
Security method and apparatus directed at removable storage devices
|
JP2013523043A
(en)
|
2010-03-22 |
2013-06-13 |
エルアールディシー システムズ、エルエルシー |
How to identify and protect the integrity of a source dataset
|
US9135443B2
(en)
*
|
2010-05-06 |
2015-09-15 |
Mcafee, Inc. |
Identifying malicious threads
|
US9098333B1
(en)
|
2010-05-07 |
2015-08-04 |
Ziften Technologies, Inc. |
Monitoring computer process resource usage
|
JP5665188B2
(en)
*
|
2011-03-31 |
2015-02-04 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
System for inspecting information processing equipment to which software update is applied
|
US8516592B1
(en)
|
2011-06-13 |
2013-08-20 |
Trend Micro Incorporated |
Wireless hotspot with lightweight anti-malware
|
US8621630B2
(en)
|
2011-06-17 |
2013-12-31 |
Microsoft Corporation |
System, method and device for cloud-based content inspection for mobile devices
|
RU2460132C1
(en)
*
|
2011-06-28 |
2012-08-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of controlling access to corporate network resources for personal computers
|
KR101389682B1
(en)
*
|
2011-08-25 |
2014-04-28 |
주식회사 팬택 |
System and method that prevent virus damage
|
US9552201B2
(en)
*
|
2011-08-31 |
2017-01-24 |
Avaya Inc. |
System and method for incremental software installation
|
CN103034805B
(en)
*
|
2011-09-30 |
2015-12-16 |
腾讯科技(深圳)有限公司 |
Multi engine checking and killing virus method and apparatus
|
CN103198256B
(en)
*
|
2012-01-10 |
2016-05-25 |
凹凸电子(武汉)有限公司 |
For detection of detection system and the method for Application Status
|
WO2014059037A2
(en)
|
2012-10-09 |
2014-04-17 |
Cupp Computing As |
Transaction security systems and methods
|
US9483642B2
(en)
*
|
2012-10-30 |
2016-11-01 |
Gabriel Kedma |
Runtime detection of self-replicating malware
|
JP6316536B2
(en)
*
|
2012-11-15 |
2018-04-25 |
任天堂株式会社 |
Information processing system, information processing apparatus, information processing program, and information processing method
|
US9378370B2
(en)
|
2013-06-17 |
2016-06-28 |
Microsoft Technology Licensing, Llc |
Scanning files for inappropriate content during synchronization
|
US20140379637A1
(en)
|
2013-06-25 |
2014-12-25 |
Microsoft Corporation |
Reverse replication to rollback corrupted files
|
US11157976B2
(en)
|
2013-07-08 |
2021-10-26 |
Cupp Computing As |
Systems and methods for providing digital content marketplace security
|
US20150149563A1
(en)
*
|
2013-11-26 |
2015-05-28 |
At&T Intellectual Property I, L.P. |
Intelligent machine-to-machine (im2m) reserve
|
US10587471B1
(en)
*
|
2013-12-17 |
2020-03-10 |
Amazon Technologies, Inc. |
Criterion-based computing instance activation
|
US9762614B2
(en)
|
2014-02-13 |
2017-09-12 |
Cupp Computing As |
Systems and methods for providing network security using a secure digital device
|
US20200241500A1
(en)
*
|
2019-01-25 |
2020-07-30 |
Taiwan Development Institute |
Numerical control machine tool processing program sharing method
|
US11228910B2
(en)
*
|
2019-01-25 |
2022-01-18 |
V440 Spó£Ka Akcyjna |
Mobile communication device and method of determining security status thereof
|