US7526435B1
(en)
*
|
1997-01-07 |
2009-04-28 |
Fujitsu Limited |
Information offering system automating registration of advertisement information on home pages
|
US5978475A
(en)
|
1997-07-18 |
1999-11-02 |
Counterpane Internet Security, Inc. |
Event auditing system
|
US7047415B2
(en)
|
1997-09-22 |
2006-05-16 |
Dfs Linkages, Inc. |
System and method for widely witnessed proof of time
|
US7017046B2
(en)
|
1997-09-22 |
2006-03-21 |
Proofspace, Inc. |
System and method for graphical indicia for the certification of records
|
US6158010A
(en)
|
1998-10-28 |
2000-12-05 |
Crosslogix, Inc. |
System and method for maintaining security in a distributed computer network
|
US7069586B1
(en)
|
2000-04-03 |
2006-06-27 |
Software Secure, Inc. |
Securely executing an application on a computer system
|
US7512965B1
(en)
*
|
2000-04-19 |
2009-03-31 |
Hewlett-Packard Development Company, L.P. |
Computer system security service
|
US7350204B2
(en)
|
2000-07-24 |
2008-03-25 |
Microsoft Corporation |
Policies for secure software execution
|
US6725240B1
(en)
|
2000-08-08 |
2004-04-20 |
International Business Machines Corporation |
Apparatus and method for protecting against data tampering in an audit subsystem
|
US6807569B1
(en)
|
2000-09-12 |
2004-10-19 |
Science Applications International Corporation |
Trusted and anonymous system and method for sharing threat data to industry assets
|
US6957261B2
(en)
*
|
2001-07-17 |
2005-10-18 |
Intel Corporation |
Resource policy management using a centralized policy data structure
|
JP2005532606A
(ja)
|
2001-12-31 |
2005-10-27 |
シタデル セキュリティ ソフトウェア インコーポレイテッド |
コンピュータの脆弱性を解決する自動化されたシステム
|
US20030172291A1
(en)
|
2002-03-08 |
2003-09-11 |
Paul Judge |
Systems and methods for automated whitelisting in monitored communications
|
GB0207354D0
(en)
*
|
2002-03-28 |
2002-05-08 |
Ibm |
Inheritance of access controls within a hierarchy of data processing system resources
|
US6950825B2
(en)
*
|
2002-05-30 |
2005-09-27 |
International Business Machines Corporation |
Fine grained role-based access to system resources
|
US7428592B2
(en)
*
|
2002-07-11 |
2008-09-23 |
Oracle International Corporation |
Securely persisting network resource identifiers
|
US20040123139A1
(en)
|
2002-12-18 |
2004-06-24 |
At&T Corp. |
System having filtering/monitoring of secure connections
|
US20040153418A1
(en)
|
2003-02-05 |
2004-08-05 |
Hanweck Gerald Alfred |
System and method for providing access to data from proprietary tools
|
JP4393774B2
(ja)
*
|
2003-02-28 |
2010-01-06 |
株式会社日立製作所 |
ジョブ管理方法、情報処理システム、プログラム、及び記録媒体
|
US7886236B2
(en)
|
2003-03-28 |
2011-02-08 |
Microsoft Corporation |
Dynamic feedback for gestures
|
US7681235B2
(en)
|
2003-05-19 |
2010-03-16 |
Radware Ltd. |
Dynamic network protection
|
US8065725B2
(en)
|
2003-05-30 |
2011-11-22 |
Yuliang Zheng |
Systems and methods for enhanced network security
|
WO2005010686A2
(en)
|
2003-07-18 |
2005-02-03 |
Corestreet, Ltd. |
Disseminating additional data used for controlling access
|
US8190893B2
(en)
|
2003-10-27 |
2012-05-29 |
Jp Morgan Chase Bank |
Portable security transaction protocol
|
US20050157662A1
(en)
|
2004-01-20 |
2005-07-21 |
Justin Bingham |
Systems and methods for detecting a compromised network
|
US7596285B2
(en)
|
2004-02-26 |
2009-09-29 |
International Business Machines Corporation |
Providing a portion of an electronic mail message at a reduced resolution
|
EP1759258A1
(en)
|
2004-04-06 |
2007-03-07 |
Telecom Italia S.p.A. |
Secure logging for irrefutable administration
|
US7225468B2
(en)
|
2004-05-07 |
2007-05-29 |
Digital Security Networks, Llc |
Methods and apparatus for computer network security using intrusion detection and prevention
|
US20060031928A1
(en)
|
2004-08-09 |
2006-02-09 |
Conley James W |
Detector and computerized method for determining an occurrence of tunneling activity
|
CA2600344A1
(en)
|
2005-03-02 |
2006-09-08 |
Markmonitor Inc. |
Distribution of trust data
|
US8646080B2
(en)
|
2005-09-16 |
2014-02-04 |
Avg Technologies Cy Limited |
Method and apparatus for removing harmful software
|
US7676845B2
(en)
|
2005-03-24 |
2010-03-09 |
Microsoft Corporation |
System and method of selectively scanning a file on a computing device for malware
|
FR2883997A1
(fr)
*
|
2005-04-04 |
2006-10-06 |
France Telecom |
Procede de gestion de decisions, procede de construction d'un arbre de decision, gestionnaire central, gestionnaire intermediaire, terminal et produits programmes d'ordinateur correspondants
|
US20060232826A1
(en)
*
|
2005-04-13 |
2006-10-19 |
Hagai Bar-El |
Method, device, and system of selectively accessing data
|
JP2009506405A
(ja)
|
2005-08-09 |
2009-02-12 |
ネクサン テクノロジーズ カナダ インコーポレイテッド |
データアーカイブシステム
|
US20070143851A1
(en)
|
2005-12-21 |
2007-06-21 |
Fiberlink |
Method and systems for controlling access to computing resources based on known security vulnerabilities
|
US7412448B2
(en)
*
|
2006-05-17 |
2008-08-12 |
International Business Machines Corporation |
Performance degradation root cause prediction in a distributed computing system
|
US7891003B2
(en)
|
2006-06-14 |
2011-02-15 |
Microsoft Corporation |
Enterprise threat modeling
|
WO2008000191A1
(fr)
*
|
2006-06-23 |
2008-01-03 |
Tencent Technology (Shenzhen) Company Limited |
Procédé, système et client d'annonce publicitaire diffusée
|
US8943332B2
(en)
|
2006-10-31 |
2015-01-27 |
Hewlett-Packard Development Company, L.P. |
Audit-log integrity using redactable signatures
|
US7962495B2
(en)
|
2006-11-20 |
2011-06-14 |
Palantir Technologies, Inc. |
Creating data in a data store using a dynamic ontology
|
US8196184B2
(en)
|
2007-02-16 |
2012-06-05 |
Microsoft Corporation |
Efficient data structures for multi-dimensional security
|
US8006094B2
(en)
|
2007-02-21 |
2011-08-23 |
Ricoh Co., Ltd. |
Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes
|
US20080222706A1
(en)
|
2007-03-06 |
2008-09-11 |
Martin Renaud |
Globally aware authentication system
|
US8959568B2
(en)
|
2007-03-14 |
2015-02-17 |
Microsoft Corporation |
Enterprise security assessment sharing
|
US8312546B2
(en)
|
2007-04-23 |
2012-11-13 |
Mcafee, Inc. |
Systems, apparatus, and methods for detecting malware
|
US20120084866A1
(en)
|
2007-06-12 |
2012-04-05 |
Stolfo Salvatore J |
Methods, systems, and media for measuring computer security
|
US8245271B2
(en)
|
2007-08-15 |
2012-08-14 |
Oracle International Corporation |
Scope-centric access control model
|
FR2921779B1
(fr)
|
2007-09-28 |
2011-02-18 |
Alcatel Lucent |
Communication d'une information de risque dans un reseau multi-domaine
|
TWI366114B
(en)
|
2008-03-04 |
2012-06-11 |
Ind Tech Res Inst |
Record system and method based on one-way hash function
|
JP5202067B2
(ja)
*
|
2008-03-27 |
2013-06-05 |
キヤノン株式会社 |
情報処理装置、情報処理方法、記憶媒体及びプログラム
|
US8166071B1
(en)
|
2008-05-22 |
2012-04-24 |
Informatica Corporation |
System and method for efficiently securing enterprise data resources
|
ES2960087T3
(es)
|
2008-05-22 |
2024-02-29 |
Hampidjan Hf |
Cable de sonar de cabecera mejorado
|
US8141129B2
(en)
*
|
2008-05-29 |
2012-03-20 |
Microsoft Corporation |
Centrally accessible policy repository
|
US8301904B1
(en)
|
2008-06-24 |
2012-10-30 |
Mcafee, Inc. |
System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
|
US8689335B2
(en)
|
2008-06-25 |
2014-04-01 |
Microsoft Corporation |
Mapping between users and machines in an enterprise security assessment sharing system
|
US20110113471A1
(en)
*
|
2008-07-10 |
2011-05-12 |
Telefonaktiebolaget L M Ericsson (Publ) |
Method and apparatus for context-based content management
|
US8387110B1
(en)
|
2010-02-10 |
2013-02-26 |
Socialware, Inc. |
Method, system and computer program product for tagging content on uncontrolled web application
|
US8667583B2
(en)
|
2008-09-22 |
2014-03-04 |
Microsoft Corporation |
Collecting and analyzing malware data
|
US8108933B2
(en)
|
2008-10-21 |
2012-01-31 |
Lookout, Inc. |
System and method for attack and malware prevention
|
US20100262688A1
(en)
|
2009-01-21 |
2010-10-14 |
Daniar Hussain |
Systems, methods, and devices for detecting security vulnerabilities in ip networks
|
US9400891B2
(en)
*
|
2009-01-23 |
2016-07-26 |
Randall Stephens |
Owner controlled transmitted file protection and access control system and method
|
US20100235915A1
(en)
|
2009-03-12 |
2010-09-16 |
Nasir Memon |
Using host symptoms, host roles, and/or host reputation for detection of host infection
|
CN101729531B
(zh)
|
2009-03-16 |
2016-04-13 |
中兴通讯股份有限公司 |
网络安全策略分发方法、装置及系统
|
US8239668B1
(en)
|
2009-04-15 |
2012-08-07 |
Trend Micro Incorporated |
Computer security threat data collection and aggregation with user privacy protection
|
KR101076887B1
(ko)
|
2009-06-26 |
2011-10-25 |
주식회사 하이닉스반도체 |
반도체 메모리소자의 랜딩플러그 형성방법
|
US8589694B2
(en)
*
|
2009-07-31 |
2013-11-19 |
International Business Machines Corporation |
System, method, and apparatus for graduated difficulty of human response tests
|
US8560854B2
(en)
|
2009-09-08 |
2013-10-15 |
Ricoh Co., Ltd. |
Device enabled verifiable stroke and image based workflows
|
US9049117B1
(en)
|
2009-10-21 |
2015-06-02 |
Narus, Inc. |
System and method for collecting and processing information of an internet user via IP-web correlation
|
WO2011063269A1
(en)
|
2009-11-20 |
2011-05-26 |
Alert Enterprise, Inc. |
Method and apparatus for risk visualization and remediation
|
US20110202555A1
(en)
|
2010-01-28 |
2011-08-18 |
IT.COM, Inc. |
Graphical User Interfaces Supporting Method And System For Electronic Discovery Using Social Network Analysis
|
US8863279B2
(en)
|
2010-03-08 |
2014-10-14 |
Raytheon Company |
System and method for malware detection
|
US8782794B2
(en)
|
2010-04-16 |
2014-07-15 |
Bank Of America Corporation |
Detecting secure or encrypted tunneling in a computer network
|
US9215548B2
(en)
|
2010-09-22 |
2015-12-15 |
Ncc Group Security Services, Inc. |
Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms
|
AU2011305214B2
(en)
|
2010-09-24 |
2014-12-11 |
Verisign, Inc. |
IP prioritization and scoring system for DDoS detection and mitigation
|
US8438473B2
(en)
|
2011-01-05 |
2013-05-07 |
Research In Motion Limited |
Handling of touch events in a browser environment
|
US9645986B2
(en)
|
2011-02-24 |
2017-05-09 |
Google Inc. |
Method, medium, and system for creating an electronic book with an umbrella policy
|
US9449010B2
(en)
|
2011-04-02 |
2016-09-20 |
Open Invention Network, Llc |
System and method for managing sensitive data using intelligent mobile agents on a network
|
US20150229664A1
(en)
|
2014-02-13 |
2015-08-13 |
Trevor Tyler HAWTHORN |
Assessing security risks of users in a computing network
|
RU2477929C2
(ru)
|
2011-04-19 |
2013-03-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ предотвращения инцидентов безопасности на основании рейтингов опасности пользователей
|
WO2012154657A2
(en)
|
2011-05-06 |
2012-11-15 |
The Penn State Research Foundation |
Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
|
US8640246B2
(en)
|
2011-06-27 |
2014-01-28 |
Raytheon Company |
Distributed malware detection
|
US8584242B2
(en)
|
2011-07-12 |
2013-11-12 |
At&T Intellectual Property I, L.P. |
Remote-assisted malware detection
|
US8726379B1
(en)
|
2011-07-15 |
2014-05-13 |
Norse Corporation |
Systems and methods for dynamic protection from electronic attacks
|
US9058486B2
(en)
|
2011-10-18 |
2015-06-16 |
Mcafee, Inc. |
User behavioral risk assessment
|
KR101575282B1
(ko)
|
2011-11-28 |
2015-12-09 |
한국전자통신연구원 |
보안관리 도메인들 간에 익명 식별자 기반의 보안정보를 공유하기 위한 에이전트 장치 및 방법
|
US9195777B2
(en)
|
2012-03-07 |
2015-11-24 |
Avira B.V. |
System, method and computer program product for normalizing data obtained from a plurality of social networks
|
US9275227B2
(en)
*
|
2012-04-05 |
2016-03-01 |
International Business Machines Corporation |
Policy driven administration of mobile applications
|
US8931043B2
(en)
|
2012-04-10 |
2015-01-06 |
Mcafee Inc. |
System and method for determining and using local reputations of users and hosts to protect information in a network environment
|
US8925082B2
(en)
|
2012-08-22 |
2014-12-30 |
International Business Machines Corporation |
Cooperative intrusion detection ecosystem for IP reputation-based security
|
CN103686684A
(zh)
*
|
2012-09-20 |
2014-03-26 |
腾讯科技(深圳)有限公司 |
离线缓存的方法及装置
|
US9081975B2
(en)
|
2012-10-22 |
2015-07-14 |
Palantir Technologies, Inc. |
Sharing information between nexuses that use different classification schemes for information access control
|
US8914886B2
(en)
|
2012-10-29 |
2014-12-16 |
Mcafee, Inc. |
Dynamic quarantining for malware detection
|
US20140143009A1
(en)
|
2012-11-16 |
2014-05-22 |
International Business Machines Corporation |
Risk reward estimation for company-country pairs
|
US8881259B2
(en)
|
2012-12-18 |
2014-11-04 |
Verizon Patent And Licensing Inc. |
Network security system with customizable rule-based analytics engine for identifying application layer violations
|
US9323935B2
(en)
|
2012-12-18 |
2016-04-26 |
Mcafee, Inc. |
User device security profile
|
US9659085B2
(en)
|
2012-12-28 |
2017-05-23 |
Microsoft Technology Licensing, Llc |
Detecting anomalies in behavioral network with contextual side information
|
US9430116B2
(en)
*
|
2013-02-12 |
2016-08-30 |
International Business Machines Corporation |
Visualization of runtime resource policy attachments and applied policy details
|
US9258198B2
(en)
|
2013-02-12 |
2016-02-09 |
International Business Machines Corporation |
Dynamic generation of policy enforcement rules and actions from policy attachment semantics
|
US10339157B2
(en)
|
2013-02-13 |
2019-07-02 |
Facebook, Inc. |
Hive table links
|
US20160072842A1
(en)
*
|
2013-03-18 |
2016-03-10 |
Gary S. Greenbaum |
Maintaining rule coherency for applications
|
US9111104B2
(en)
|
2013-03-29 |
2015-08-18 |
Jive Software, Inc. |
Entitlements determination via access control lists
|
CN103281301B
(zh)
|
2013-04-28 |
2017-02-08 |
上海海事大学 |
云安全恶意程序判断系统及方法
|
US9589043B2
(en)
|
2013-08-01 |
2017-03-07 |
Actiance, Inc. |
Unified context-aware content archive system
|
US9335897B2
(en)
|
2013-08-08 |
2016-05-10 |
Palantir Technologies Inc. |
Long click display of a context menu
|
US9392007B2
(en)
|
2013-11-04 |
2016-07-12 |
Crypteia Networks S.A. |
System and method for identifying infected networks and systems from unknown attacks
|
US9338013B2
(en)
|
2013-12-30 |
2016-05-10 |
Palantir Technologies Inc. |
Verifiable redactable audit log
|
US8832832B1
(en)
|
2014-01-03 |
2014-09-09 |
Palantir Technologies Inc. |
IP reputation
|
US20150199535A1
(en)
|
2014-01-13 |
2015-07-16 |
Oracle International Corporation |
Organization-based policies
|
US20150199625A1
(en)
|
2014-01-13 |
2015-07-16 |
Oracle International Corporation |
Logical and physical organization management
|
US20150248563A1
(en)
|
2014-03-03 |
2015-09-03 |
International Business Machines Corporation |
Requesting instant messaging history by validated parties
|
US9860252B2
(en)
|
2014-03-25 |
2018-01-02 |
Open Text Sa Ulc |
System and method for maintenance of transitive closure of a graph and user authentication
|
US9762603B2
(en)
|
2014-05-10 |
2017-09-12 |
Informatica Llc |
Assessment type-variable enterprise security impact analysis
|
US9021260B1
(en)
|
2014-07-03 |
2015-04-28 |
Palantir Technologies Inc. |
Malware data item analysis
|
US9785773B2
(en)
|
2014-07-03 |
2017-10-10 |
Palantir Technologies Inc. |
Malware data item analysis
|
US9419992B2
(en)
|
2014-08-13 |
2016-08-16 |
Palantir Technologies Inc. |
Unwanted tunneling alert system
|
US11281667B2
(en)
|
2015-01-08 |
2022-03-22 |
Microsoft Technology Licensing, Llc |
Distributed storage and distributed processing policy enforcement utilizing virtual identifiers
|
US10630686B2
(en)
|
2015-03-12 |
2020-04-21 |
Fornetix Llc |
Systems and methods for organizing devices in a policy hierarchy
|
US9888039B2
(en)
|
2015-12-28 |
2018-02-06 |
Palantir Technologies Inc. |
Network-based permissioning system
|
US10880281B2
(en)
|
2016-02-26 |
2020-12-29 |
Fornetix Llc |
Structure of policies for evaluating key attributes of encryption keys
|
US10860086B2
(en)
|
2016-02-26 |
2020-12-08 |
Fornetix Llc |
Policy-enabled encryption keys having complex logical operations
|
US10917239B2
(en)
|
2016-02-26 |
2021-02-09 |
Fornetix Llc |
Policy-enabled encryption keys having ephemeral policies
|
US11063980B2
(en)
|
2016-02-26 |
2021-07-13 |
Fornetix Llc |
System and method for associating encryption key management policy with device activity
|
US10027551B1
(en)
|
2017-06-29 |
2018-07-17 |
Palantir Technologies, Inc. |
Access controls through node-based effective policy identifiers
|