US7089591B1
(en)
|
1999-07-30 |
2006-08-08 |
Symantec Corporation |
Generic detection and elimination of marco viruses
|
US6775657B1
(en)
*
|
1999-12-22 |
2004-08-10 |
Cisco Technology, Inc. |
Multilayered intrusion detection system and method
|
US6754709B1
(en)
*
|
2000-03-29 |
2004-06-22 |
Microsoft Corporation |
Application programming interface and generalized network address translator for intelligent transparent application gateway processes
|
GB0017201D0
(en)
*
|
2000-07-14 |
2000-08-30 |
Ibm |
Generalised program hooks
|
US7630398B2
(en)
*
|
2000-09-27 |
2009-12-08 |
Intel Corporation |
Subnet independent transparent bridge
|
US20020065876A1
(en)
*
|
2000-11-29 |
2002-05-30 |
Andrew Chien |
Method and process for the virtualization of system databases and stored information
|
US20020065874A1
(en)
*
|
2000-11-29 |
2002-05-30 |
Andrew Chien |
Method and process for virtualizing network interfaces
|
US20020092003A1
(en)
*
|
2000-11-29 |
2002-07-11 |
Brad Calder |
Method and process for the rewriting of binaries to intercept system calls in a secure execution environment
|
WO2002093334A2
(en)
*
|
2001-04-06 |
2002-11-21 |
Symantec Corporation |
Temporal access control for computer virus outbreaks
|
US7290266B2
(en)
*
|
2001-06-14 |
2007-10-30 |
Cisco Technology, Inc. |
Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy
|
US7231665B1
(en)
*
|
2001-07-05 |
2007-06-12 |
Mcafee, Inc. |
Prevention of operating system identification through fingerprinting techniques
|
US20030084321A1
(en)
*
|
2001-10-31 |
2003-05-01 |
Tarquini Richard Paul |
Node and mobile device for a mobile telecommunications network providing intrusion detection
|
US20030084319A1
(en)
*
|
2001-10-31 |
2003-05-01 |
Tarquini Richard Paul |
Node, method and computer readable medium for inserting an intrusion prevention system into a network stack
|
US7209971B1
(en)
*
|
2001-12-11 |
2007-04-24 |
Microsoft Corporation |
Architecture and run-time environment for network filter drivers
|
US7737134B2
(en)
*
|
2002-03-13 |
2010-06-15 |
The Texas A & M University System |
Anticancer agents and use
|
US6959297B2
(en)
|
2002-04-25 |
2005-10-25 |
Winnow Technology, Llc |
System and process for searching within a data stream using a pointer matrix and a trap matrix
|
US7155742B1
(en)
*
|
2002-05-16 |
2006-12-26 |
Symantec Corporation |
Countering infections to communications modules
|
US7367056B1
(en)
|
2002-06-04 |
2008-04-29 |
Symantec Corporation |
Countering malicious code infections to computer files that have been infected more than once
|
US7418729B2
(en)
*
|
2002-07-19 |
2008-08-26 |
Symantec Corporation |
Heuristic detection of malicious computer code by page tracking
|
US7380277B2
(en)
|
2002-07-22 |
2008-05-27 |
Symantec Corporation |
Preventing e-mail propagation of malicious computer code
|
US20040019895A1
(en)
*
|
2002-07-29 |
2004-01-29 |
Intel Corporation |
Dynamic communication tuning apparatus, systems, and methods
|
US7478431B1
(en)
|
2002-08-02 |
2009-01-13 |
Symantec Corporation |
Heuristic detection of computer viruses
|
US7469419B2
(en)
*
|
2002-10-07 |
2008-12-23 |
Symantec Corporation |
Detection of malicious computer code
|
US7159149B2
(en)
*
|
2002-10-24 |
2007-01-02 |
Symantec Corporation |
Heuristic detection and termination of fast spreading network worm attacks
|
US7278019B2
(en)
*
|
2002-11-04 |
2007-10-02 |
Hewlett-Packard Development Company, L.P. |
Method of hindering the propagation of a computer virus
|
US7249187B2
(en)
*
|
2002-11-27 |
2007-07-24 |
Symantec Corporation |
Enforcement of compliance with network security policies
|
US7941854B2
(en)
*
|
2002-12-05 |
2011-05-10 |
International Business Machines Corporation |
Method and system for responding to a computer intrusion
|
US7631353B2
(en)
*
|
2002-12-17 |
2009-12-08 |
Symantec Corporation |
Blocking replication of e-mail worms
|
US7296293B2
(en)
*
|
2002-12-31 |
2007-11-13 |
Symantec Corporation |
Using a benevolent worm to assess and correct computer security vulnerabilities
|
US7203959B2
(en)
|
2003-03-14 |
2007-04-10 |
Symantec Corporation |
Stream scanning through network proxy servers
|
JP2004289561A
(ja)
*
|
2003-03-24 |
2004-10-14 |
Sony Corp |
ネットワーク接続の管理方法および電子機器
|
US7398386B2
(en)
*
|
2003-04-12 |
2008-07-08 |
Cavium Networks, Inc. |
Transparent IPSec processing inline between a framer and a network component
|
US7949732B1
(en)
*
|
2003-05-12 |
2011-05-24 |
Sourcefire, Inc. |
Systems and methods for determining characteristics of a network and enforcing policy
|
US8271774B1
(en)
|
2003-08-11 |
2012-09-18 |
Symantec Corporation |
Circumstantial blocking of incoming network traffic containing code
|
US20050091558A1
(en)
*
|
2003-10-28 |
2005-04-28 |
International Business Machines Corporation |
System, method and program product for detecting malicious software
|
US7978716B2
(en)
*
|
2003-11-24 |
2011-07-12 |
Citrix Systems, Inc. |
Systems and methods for providing a VPN solution
|
US7426574B2
(en)
*
|
2003-12-16 |
2008-09-16 |
Trend Micro Incorporated |
Technique for intercepting data in a peer-to-peer network
|
US7337327B1
(en)
|
2004-03-30 |
2008-02-26 |
Symantec Corporation |
Using mobility tokens to observe malicious mobile code
|
US7533415B2
(en)
*
|
2004-04-21 |
2009-05-12 |
Trend Micro Incorporated |
Method and apparatus for controlling traffic in a computer network
|
US7484094B1
(en)
|
2004-05-14 |
2009-01-27 |
Symantec Corporation |
Opening computer files quickly and safely over a network
|
US7373667B1
(en)
|
2004-05-14 |
2008-05-13 |
Symantec Corporation |
Protecting a computer coupled to a network from malicious code infections
|
US7370233B1
(en)
|
2004-05-21 |
2008-05-06 |
Symantec Corporation |
Verification of desired end-state using a virtual machine environment
|
US7953814B1
(en)
|
2005-02-28 |
2011-05-31 |
Mcafee, Inc. |
Stopping and remediating outbound messaging abuse
|
US8495305B2
(en)
*
|
2004-06-30 |
2013-07-23 |
Citrix Systems, Inc. |
Method and device for performing caching of dynamically generated objects in a data communication network
|
US7757074B2
(en)
*
|
2004-06-30 |
2010-07-13 |
Citrix Application Networking, Llc |
System and method for establishing a virtual private network
|
US8739274B2
(en)
*
|
2004-06-30 |
2014-05-27 |
Citrix Systems, Inc. |
Method and device for performing integrated caching in a data communication network
|
AU2005266945A1
(en)
*
|
2004-07-23 |
2006-02-02 |
Citrix Systems, Inc. |
A method and systems for securing remote access to private networks
|
WO2006012610A2
(en)
*
|
2004-07-23 |
2006-02-02 |
Citrix Systems, Inc. |
Systems and methods for optimizing communications between network nodes
|
US7539681B2
(en)
*
|
2004-07-26 |
2009-05-26 |
Sourcefire, Inc. |
Methods and systems for multi-pattern searching
|
US7441042B1
(en)
|
2004-08-25 |
2008-10-21 |
Symanetc Corporation |
System and method for correlating network traffic and corresponding file input/output traffic
|
US7567573B2
(en)
*
|
2004-09-07 |
2009-07-28 |
F5 Networks, Inc. |
Method for automatic traffic interception
|
US7690034B1
(en)
|
2004-09-10 |
2010-03-30 |
Symantec Corporation |
Using behavior blocking mobility tokens to facilitate distributed worm detection
|
US7565686B1
(en)
|
2004-11-08 |
2009-07-21 |
Symantec Corporation |
Preventing unauthorized loading of late binding code into a process
|
US9015472B1
(en)
|
2005-03-10 |
2015-04-21 |
Mcafee, Inc. |
Marking electronic messages to indicate human origination
|
US9160755B2
(en)
|
2004-12-21 |
2015-10-13 |
Mcafee, Inc. |
Trusted communication network
|
US8549149B2
(en)
*
|
2004-12-30 |
2013-10-01 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
|
US8954595B2
(en)
*
|
2004-12-30 |
2015-02-10 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
|
US7810089B2
(en)
*
|
2004-12-30 |
2010-10-05 |
Citrix Systems, Inc. |
Systems and methods for automatic installation and execution of a client-side acceleration program
|
US8706877B2
(en)
*
|
2004-12-30 |
2014-04-22 |
Citrix Systems, Inc. |
Systems and methods for providing client-side dynamic redirection to bypass an intermediary
|
US8700695B2
(en)
*
|
2004-12-30 |
2014-04-15 |
Citrix Systems, Inc. |
Systems and methods for providing client-side accelerated access to remote applications via TCP pooling
|
US8255456B2
(en)
|
2005-12-30 |
2012-08-28 |
Citrix Systems, Inc. |
System and method for performing flash caching of dynamically generated objects in a data communication network
|
US8104086B1
(en)
|
2005-03-03 |
2012-01-24 |
Symantec Corporation |
Heuristically detecting spyware/adware registry activity
|
US20060288096A1
(en)
*
|
2005-06-17 |
2006-12-21 |
Wai Yim |
Integrated monitoring for network and local internet protocol traffic
|
US7486673B2
(en)
|
2005-08-29 |
2009-02-03 |
Connect Technologies Corporation |
Method and system for reassembling packets prior to searching
|
US7639715B1
(en)
*
|
2005-09-09 |
2009-12-29 |
Qlogic, Corporation |
Dedicated application interface for network systems
|
US7779422B1
(en)
|
2005-10-05 |
2010-08-17 |
Mcafee, Inc. |
System, method, and computer program product for compatibility among hooking applications
|
US7733803B2
(en)
*
|
2005-11-14 |
2010-06-08 |
Sourcefire, Inc. |
Systems and methods for modifying network map attributes
|
US8046833B2
(en)
|
2005-11-14 |
2011-10-25 |
Sourcefire, Inc. |
Intrusion event correlation with network discovery information
|
US7735099B1
(en)
|
2005-12-23 |
2010-06-08 |
Qlogic, Corporation |
Method and system for processing network data
|
US7921184B2
(en)
*
|
2005-12-30 |
2011-04-05 |
Citrix Systems, Inc. |
System and method for performing flash crowd caching of dynamically generated objects in a data communication network
|
US8301839B2
(en)
*
|
2005-12-30 |
2012-10-30 |
Citrix Systems, Inc. |
System and method for performing granular invalidation of cached dynamically generated objects in a data communication network
|
US8131667B1
(en)
*
|
2006-04-28 |
2012-03-06 |
Netapp, Inc. |
System and method for generating synthetic clients
|
US8239915B1
(en)
|
2006-06-30 |
2012-08-07 |
Symantec Corporation |
Endpoint management using trust rating data
|
US7948988B2
(en)
*
|
2006-07-27 |
2011-05-24 |
Sourcefire, Inc. |
Device, system and method for analysis of fragments in a fragment train
|
US7701945B2
(en)
*
|
2006-08-10 |
2010-04-20 |
Sourcefire, Inc. |
Device, system and method for analysis of segments in a transmission control protocol (TCP) session
|
US8997074B1
(en)
*
|
2006-09-29 |
2015-03-31 |
Trend Micro Incorporated |
Dynamic linking library (DLL) replacement in an embedded operating system environment
|
CA2672908A1
(en)
*
|
2006-10-06 |
2008-04-17 |
Sourcefire, Inc. |
Device, system and method for use of micro-policies in intrusion detection/prevention
|
US8069352B2
(en)
*
|
2007-02-28 |
2011-11-29 |
Sourcefire, Inc. |
Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
|
US7987065B1
(en)
*
|
2007-04-17 |
2011-07-26 |
Nvidia Corporation |
Automatic quality testing of multimedia rendering by software drivers
|
CA2685292C
(en)
*
|
2007-04-30 |
2013-09-24 |
Sourcefire, Inc. |
Real-time user awareness for a computer network
|
US20080306815A1
(en)
*
|
2007-06-06 |
2008-12-11 |
Nebuad, Inc. |
Method and system for inserting targeted data in available spaces of a webpage
|
CA2628625A1
(en)
*
|
2008-01-09 |
2008-07-23 |
Verint Systems Inc. |
Method and system for direct data recording
|
US8474043B2
(en)
*
|
2008-04-17 |
2013-06-25 |
Sourcefire, Inc. |
Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
|
US10354229B2
(en)
|
2008-08-04 |
2019-07-16 |
Mcafee, Llc |
Method and system for centralized contact management
|
WO2010045089A1
(en)
|
2008-10-08 |
2010-04-22 |
Sourcefire, Inc. |
Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
|
US8893260B2
(en)
*
|
2008-12-17 |
2014-11-18 |
Rockstar Consortium Us Lp |
Secure remote access public communication environment
|
CN101640923A
(zh)
*
|
2009-08-20 |
2010-02-03 |
深圳华为通信技术有限公司 |
获取网络配置信息的方法及装置
|
US10235216B1
(en)
*
|
2009-10-15 |
2019-03-19 |
Ivanti, Inc. |
Modifying system-defined user interface control functionality on a computing device
|
WO2011130510A1
(en)
|
2010-04-16 |
2011-10-20 |
Sourcefire, Inc. |
System and method for near-real time network attack detection, and system and method for unified detection via detection routing
|
US8433790B2
(en)
|
2010-06-11 |
2013-04-30 |
Sourcefire, Inc. |
System and method for assigning network blocks to sensors
|
US8671182B2
(en)
|
2010-06-22 |
2014-03-11 |
Sourcefire, Inc. |
System and method for resolving operating system or service identity conflicts
|
US8479292B1
(en)
*
|
2010-11-19 |
2013-07-02 |
Symantec Corporation |
Disabling malware that infects boot drivers
|
US8601034B2
(en)
|
2011-03-11 |
2013-12-03 |
Sourcefire, Inc. |
System and method for real time data awareness
|
US8527665B2
(en)
*
|
2011-04-15 |
2013-09-03 |
Ixia |
Redirecting function calls
|
US9560504B2
(en)
*
|
2011-08-01 |
2017-01-31 |
Samsung Electronics Co., Ltd. |
Secondary mobile device
|
WO2013093209A1
(en)
|
2011-12-21 |
2013-06-27 |
Ssh Communications Security Oyj |
Automated access, key, certificate, and credential management
|
US20140380300A1
(en)
*
|
2013-06-25 |
2014-12-25 |
Bank Of America Corporation |
Dynamic configuration framework
|
CN103957214A
(zh)
*
|
2014-05-06 |
2014-07-30 |
重庆邮电大学 |
一种教学用计算机网络数据包抓取方法
|
WO2018058182A1
(en)
*
|
2016-09-27 |
2018-04-05 |
Cog Systems Pty Ltd |
A network connectable computing system and a method for processing a plurality of messages
|