WO1997036246A1
(fr)
*
|
1996-03-22 |
1997-10-02 |
Hitachi, Ltd. |
Procede de gestion de reseau informatique et dispositif correspondant
|
US6421704B1
(en)
*
|
1998-03-20 |
2002-07-16 |
Sun Microsystems, Inc. |
Method, apparatus, and product for leasing of group membership in a distributed system
|
US6466947B2
(en)
*
|
1998-03-20 |
2002-10-15 |
Sun Microsystems, Inc. |
Apparatus and method for dynamically verifying information in a distributed system
|
US6393497B1
(en)
|
1998-03-20 |
2002-05-21 |
Sun Microsystems, Inc. |
Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system
|
US6185611B1
(en)
|
1998-03-20 |
2001-02-06 |
Sun Microsystem, Inc. |
Dynamic lookup service in a distributed system
|
US6938263B2
(en)
*
|
1996-04-23 |
2005-08-30 |
Sun Microsystems, Inc. |
System and method for facilitating dynamic loading of “stub” information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space
|
US6272559B1
(en)
*
|
1997-10-15 |
2001-08-07 |
Sun Microsystems, Inc. |
Deferred reconstruction of objects and remote loading for event notification in a distributed system
|
US6138238A
(en)
*
|
1997-12-11 |
2000-10-24 |
Sun Microsystems, Inc. |
Stack-based access control using code and executor identifiers
|
US6151643A
(en)
|
1996-06-07 |
2000-11-21 |
Networks Associates, Inc. |
Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
|
US6167520A
(en)
*
|
1996-11-08 |
2000-12-26 |
Finjan Software, Inc. |
System and method for protecting a client during runtime from hostile downloadables
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7613926B2
(en)
*
|
1997-11-06 |
2009-11-03 |
Finjan Software, Ltd |
Method and system for protecting a computer and a network from hostile downloadables
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
*
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US6301661B1
(en)
*
|
1997-02-12 |
2001-10-09 |
Verizon Labortories Inc. |
Enhanced security for applications employing downloadable executable content
|
US7366900B2
(en)
*
|
1997-02-12 |
2008-04-29 |
Verizon Laboratories, Inc. |
Platform-neutral system and method for providing secure remote operations over an insecure computer network
|
IL120420A
(en)
|
1997-03-10 |
1999-12-31 |
Security 7 Software Ltd |
Method and system for preventing the downloading and execution of executable objects
|
US6453334B1
(en)
|
1997-06-16 |
2002-09-17 |
Streamtheory, Inc. |
Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching
|
IL121815A
(en)
*
|
1997-09-22 |
2000-09-28 |
Security 7 Software Ltd |
Method and system for the identification and the suppression of executable objects
|
US6317868B1
(en)
*
|
1997-10-24 |
2001-11-13 |
University Of Washington |
Process for transparently enforcing protection domains and access control as well as auditing operations in software components
|
US7975305B2
(en)
*
|
1997-11-06 |
2011-07-05 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners for desktop computers
|
US7418731B2
(en)
*
|
1997-11-06 |
2008-08-26 |
Finjan Software, Ltd. |
Method and system for caching at secure gateways
|
US8225408B2
(en)
*
|
1997-11-06 |
2012-07-17 |
Finjan, Inc. |
Method and system for adaptive rule-based content scanners
|
CN1292115A
(zh)
*
|
1998-02-26 |
2001-04-18 |
太阳微系统公司 |
分布系统中动态验证信息的装置和方法
|
CN1298503A
(zh)
*
|
1998-02-26 |
2001-06-06 |
太阳微系统公司 |
分布式系统中的动态查找服务
|
IL123512A0
(en)
*
|
1998-03-02 |
1999-03-12 |
Security 7 Software Ltd |
Method and agent for the protection against hostile resource use access
|
US6986062B2
(en)
*
|
1998-04-09 |
2006-01-10 |
Microsoft Corporation |
Set top box object security system
|
EP0952522B1
(en)
*
|
1998-04-22 |
2011-08-24 |
Nippon Telegraph And Telephone Corporation |
Method and device for acquiring usage data of an application
|
US6654786B1
(en)
|
1998-04-30 |
2003-11-25 |
Openwave Systems Inc. |
Method and apparatus for informing wireless clients about updated information
|
US6421781B1
(en)
|
1998-04-30 |
2002-07-16 |
Openwave Systems Inc. |
Method and apparatus for maintaining security in a push server
|
US6965999B2
(en)
|
1998-05-01 |
2005-11-15 |
Microsoft Corporation |
Intelligent trust management method and system
|
US6505300B2
(en)
*
|
1998-06-12 |
2003-01-07 |
Microsoft Corporation |
Method and system for secure running of untrusted content
|
AU4568299A
(en)
*
|
1998-06-15 |
2000-01-05 |
Dmw Worldwide, Inc. |
Method and apparatus for assessing the security of a computer system
|
US6256393B1
(en)
*
|
1998-06-23 |
2001-07-03 |
General Instrument Corporation |
Authorization and access control of software object residing in set-top terminals
|
US6339829B1
(en)
*
|
1998-07-30 |
2002-01-15 |
International Business Machines Corporation |
Method and apparatus to store extended security information in a data structure which shadows a java class object
|
US9361243B2
(en)
|
1998-07-31 |
2016-06-07 |
Kom Networks Inc. |
Method and system for providing restricted access to a storage medium
|
US8234477B2
(en)
|
1998-07-31 |
2012-07-31 |
Kom Networks, Inc. |
Method and system for providing restricted access to a storage medium
|
US7711714B2
(en)
*
|
1998-09-22 |
2010-05-04 |
Hitachi, Ltd. |
Method and a device for sterilizing downloaded files
|
IL126587A
(en)
*
|
1998-10-15 |
2004-12-15 |
Computer Ass Think Inc |
A method and system for preventing unwanted actions of activatable objects
|
US6304974B1
(en)
*
|
1998-11-06 |
2001-10-16 |
Oracle Corporation |
Method and apparatus for managing trusted certificates
|
US6321338B1
(en)
*
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
WO2003012614A1
(en)
*
|
1998-11-24 |
2003-02-13 |
Cyberdfnz, Inc. |
A multi-system architecture using general purpose active-backplane and expansion-bus compatible single board computers and their peripherals for secure exchange of information and advanced computing
|
US6499109B1
(en)
*
|
1998-12-08 |
2002-12-24 |
Networks Associates Technology, Inc. |
Method and apparatus for securing software distributed over a network
|
US6266774B1
(en)
|
1998-12-08 |
2001-07-24 |
Mcafee.Com Corporation |
Method and system for securing, managing or optimizing a personal computer
|
IL143573A0
(en)
|
1998-12-09 |
2002-04-21 |
Network Ice Corp |
A method and apparatus for providing network and computer system security
|
US6763467B1
(en)
|
1999-02-03 |
2004-07-13 |
Cybersoft, Inc. |
Network traffic intercepting method and system
|
US6829708B1
(en)
|
1999-03-27 |
2004-12-07 |
Microsoft Corporation |
Specifying security for an element by assigning a scaled value representative of the relative security thereof
|
AU4332800A
(en)
*
|
1999-04-08 |
2000-11-14 |
Sun Microsystems, Inc. |
Method and system for establishing trust in downloaded proxy code
|
US6901518B1
(en)
*
|
1999-04-08 |
2005-05-31 |
Sun Microsystems, Inc. |
Method and system for establishing trust in downloaded proxy code
|
US6950932B1
(en)
*
|
1999-05-07 |
2005-09-27 |
Nortel Networks Limited |
Security association mediator for java-enabled devices
|
JP2000347866A
(ja)
*
|
1999-06-04 |
2000-12-15 |
Nec Corp |
分散システムとアクセス制御装置及び方法、並びにアクセス制御用プログラムを記録した記録媒体
|
US6845393B1
(en)
|
1999-06-14 |
2005-01-18 |
Sun Microsystems, Inc. |
Lookup discovery service in a distributed system having a plurality of lookup services each with associated characteristics and services
|
US7346929B1
(en)
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
TR200201280T2
(tr)
*
|
1999-08-31 |
2002-08-21 |
American Express Travel Related Services Company, Inc. |
Elektronik işlemler yürütmek için yöntemler ve cihazlar.
|
US7343351B1
(en)
*
|
1999-08-31 |
2008-03-11 |
American Express Travel Related Services Company, Inc. |
Methods and apparatus for conducting electronic transactions
|
US6308276B1
(en)
*
|
1999-09-07 |
2001-10-23 |
Icom Technologies |
SS7 firewall system
|
JP2001117769A
(ja)
*
|
1999-10-20 |
2001-04-27 |
Matsushita Electric Ind Co Ltd |
プログラム実行装置
|
US6523120B1
(en)
*
|
1999-10-29 |
2003-02-18 |
Rstar Corporation |
Level-based network access restriction
|
US6775536B1
(en)
*
|
1999-11-03 |
2004-08-10 |
Motorola, Inc |
Method for validating an application for use in a mobile communication device
|
US6976258B1
(en)
|
1999-11-30 |
2005-12-13 |
Ensim Corporation |
Providing quality of service guarantees to virtual hosts
|
US8006243B2
(en)
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
US6757824B1
(en)
*
|
1999-12-10 |
2004-06-29 |
Microsoft Corporation |
Client-side boot domains and boot rules
|
US6954858B1
(en)
|
1999-12-22 |
2005-10-11 |
Kimberly Joyce Welborn |
Computer virus avoidance system and mechanism
|
US7055175B1
(en)
*
|
2000-01-06 |
2006-05-30 |
International Business Machines Corporation |
Method and system for generating and using a virus free file certificate integrated within a file
|
US7269726B1
(en)
*
|
2000-01-14 |
2007-09-11 |
Hewlett-Packard Development Company, L.P. |
Lightweight public key infrastructure employing unsigned certificates
|
US6785818B1
(en)
*
|
2000-01-14 |
2004-08-31 |
Symantec Corporation |
Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks
|
US7353209B1
(en)
|
2000-01-14 |
2008-04-01 |
Microsoft Corporation |
Releasing decrypted digital content to an authenticated path
|
US6529985B1
(en)
|
2000-02-04 |
2003-03-04 |
Ensim Corporation |
Selective interception of system calls
|
US6711607B1
(en)
|
2000-02-04 |
2004-03-23 |
Ensim Corporation |
Dynamic scheduling of task streams in a multiple-resource system to ensure task stream quality of service
|
US6560613B1
(en)
|
2000-02-08 |
2003-05-06 |
Ensim Corporation |
Disambiguating file descriptors
|
US6754716B1
(en)
|
2000-02-11 |
2004-06-22 |
Ensim Corporation |
Restricting communication between network devices on a common network
|
US7343421B1
(en)
|
2000-02-14 |
2008-03-11 |
Digital Asset Enterprises Llc |
Restricting communication of selected processes to a set of specific network addresses
|
GB2359908B
(en)
*
|
2000-03-04 |
2004-09-15 |
Motorola Inc |
Communication system architecture and method of controlling data download to subscriber equipment
|
US6948003B1
(en)
|
2000-03-15 |
2005-09-20 |
Ensim Corporation |
Enabling a service provider to provide intranet services
|
US7085928B1
(en)
*
|
2000-03-31 |
2006-08-01 |
Cigital |
System and method for defending against malicious software
|
AU2001247742A1
(en)
*
|
2000-04-12 |
2001-10-30 |
Microsoft Corporation |
Method and system for accepting precompiled information
|
US6986051B2
(en)
*
|
2000-04-13 |
2006-01-10 |
International Business Machines Corporation |
Method and system for controlling and filtering files using a virus-free certificate
|
WO2001084775A2
(en)
|
2000-04-28 |
2001-11-08 |
Internet Security Systems, Inc. |
System and method for managing security events on a network
|
US6985937B1
(en)
|
2000-05-11 |
2006-01-10 |
Ensim Corporation |
Dynamically modifying the resources of a virtual server
|
US6907421B1
(en)
|
2000-05-16 |
2005-06-14 |
Ensim Corporation |
Regulating file access rates according to file type
|
KR20010107572A
(ko)
*
|
2000-05-24 |
2001-12-07 |
포만 제프리 엘 |
신뢰성 기반의 링크 액세스 제어 방법, 장치 및 프로그램제품
|
US7392398B1
(en)
*
|
2000-06-05 |
2008-06-24 |
Ati International Srl |
Method and apparatus for protection of computer assets from unauthorized access
|
US6611925B1
(en)
*
|
2000-06-13 |
2003-08-26 |
Networks Associates Technology, Inc. |
Single point of entry/origination item scanning within an enterprise or workgroup
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US6901519B1
(en)
*
|
2000-06-22 |
2005-05-31 |
Infobahn, Inc. |
E-mail virus protection system and method
|
US7913078B1
(en)
|
2000-06-22 |
2011-03-22 |
Walter Mason Stewart |
Computer network virus protection system and method
|
US7143024B1
(en)
|
2000-07-07 |
2006-11-28 |
Ensim Corporation |
Associating identifiers with virtual processes
|
US7093239B1
(en)
*
|
2000-07-14 |
2006-08-15 |
Internet Security Systems, Inc. |
Computer immune system and method for detecting unwanted code in a computer system
|
US8341743B2
(en)
*
|
2000-07-14 |
2012-12-25 |
Ca, Inc. |
Detection of viral code using emulation of operating system functions
|
US6909691B1
(en)
|
2000-08-07 |
2005-06-21 |
Ensim Corporation |
Fairly partitioning resources while limiting the maximum fair share
|
US7917393B2
(en)
*
|
2000-09-01 |
2011-03-29 |
Sri International, Inc. |
Probabilistic alert correlation
|
US6785732B1
(en)
*
|
2000-09-11 |
2004-08-31 |
International Business Machines Corporation |
Web server apparatus and method for virus checking
|
US6732211B1
(en)
|
2000-09-18 |
2004-05-04 |
Ensim Corporation |
Intercepting I/O multiplexing operations involving cross-domain file descriptor sets
|
US6883098B1
(en)
*
|
2000-09-20 |
2005-04-19 |
International Business Machines Corporation |
Method and computer system for controlling access by applications to this and other computer systems
|
US7263616B1
(en)
*
|
2000-09-22 |
2007-08-28 |
Ge Medical Systems Global Technology Company, Llc |
Ultrasound imaging system having computer virus protection
|
US6650890B1
(en)
|
2000-09-29 |
2003-11-18 |
Postini, Inc. |
Value-added electronic messaging services and transparent implementation thereof using intermediate server
|
US7392540B1
(en)
*
|
2000-10-03 |
2008-06-24 |
Hewlett-Packard Development Company, L.P. |
Methods and systems for customer premises remote collaboration facility
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7086090B1
(en)
*
|
2000-10-20 |
2006-08-01 |
International Business Machines Corporation |
Method and system for protecting pervasive devices and servers from exchanging viruses
|
US7062567B2
(en)
|
2000-11-06 |
2006-06-13 |
Endeavors Technology, Inc. |
Intelligent network streaming and execution system for conventionally coded applications
|
US8831995B2
(en)
|
2000-11-06 |
2014-09-09 |
Numecent Holdings, Inc. |
Optimized server for streamed applications
|
TW584801B
(en)
*
|
2000-12-11 |
2004-04-21 |
Ntt Docomo Inc |
Terminal and repeater
|
US20020078262A1
(en)
*
|
2000-12-14 |
2002-06-20 |
Curl Corporation |
System and methods for providing compatibility across multiple versions of a software system
|
DE10064658B4
(de)
*
|
2000-12-22 |
2004-04-08 |
Siemens Ag |
Rechneranordnung, die an ein Datenübertragungsnetz anschließbar ist
|
US7219354B1
(en)
|
2000-12-22 |
2007-05-15 |
Ensim Corporation |
Virtualizing super-user privileges for multiple virtual processes
|
US7296275B2
(en)
*
|
2001-01-04 |
2007-11-13 |
Sun Microsystems, Inc. |
Method and system for passing objects in a distributed system using serialization contexts
|
US7603356B2
(en)
|
2001-01-26 |
2009-10-13 |
Ascentive Llc |
System and method for network administration and local administration of privacy protection criteria
|
US20020178375A1
(en)
*
|
2001-01-31 |
2002-11-28 |
Harris Corporation |
Method and system for protecting against malicious mobile code
|
US20020147803A1
(en)
|
2001-01-31 |
2002-10-10 |
Dodd Timothy David |
Method and system for calculating risk in association with a security audit of a computer network
|
FI20010256A0
(fi)
*
|
2001-02-12 |
2001-02-12 |
Stonesoft Oy |
Pakettidatayhteystietojen käsittely tietoturvagatewayelementissä
|
US6618736B1
(en)
|
2001-03-09 |
2003-09-09 |
Ensim Corporation |
Template-based creation and archival of file systems
|
US20020133709A1
(en)
|
2001-03-14 |
2002-09-19 |
Hoffman Terry George |
Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS
|
US6732279B2
(en)
*
|
2001-03-14 |
2004-05-04 |
Terry George Hoffman |
Anti-virus protection system and method
|
US7313822B2
(en)
*
|
2001-03-16 |
2007-12-25 |
Protegrity Corporation |
Application-layer security method and system
|
US7882555B2
(en)
*
|
2001-03-16 |
2011-02-01 |
Kavado, Inc. |
Application layer security method and system
|
GB2376093A
(en)
*
|
2001-03-21 |
2002-12-04 |
Appsense Ltd |
A security system relating to networks
|
US20020138589A1
(en)
*
|
2001-03-21 |
2002-09-26 |
Binnur Al-Kazily |
System and method for service caching on-demand
|
US6993588B2
(en)
*
|
2001-03-26 |
2006-01-31 |
Sumisho Computer Systems Corporation |
System and methods for securely permitting mobile code to access resources over a network
|
US7010696B1
(en)
|
2001-03-30 |
2006-03-07 |
Mcafee, Inc. |
Method and apparatus for predicting the incidence of a virus
|
WO2002093334A2
(en)
*
|
2001-04-06 |
2002-11-21 |
Symantec Corporation |
Temporal access control for computer virus outbreaks
|
US6931552B2
(en)
*
|
2001-05-02 |
2005-08-16 |
James B. Pritchard |
Apparatus and method for protecting a computer system against computer viruses and unauthorized access
|
US7036148B2
(en)
*
|
2001-05-08 |
2006-04-25 |
International Business Machines Corporation |
Method of operating an intrusion detection system according to a set of business rules
|
US7640434B2
(en)
*
|
2001-05-31 |
2009-12-29 |
Trend Micro, Inc. |
Identification of undesirable content in responses sent in reply to a user request for content
|
US7099663B2
(en)
|
2001-05-31 |
2006-08-29 |
Qualcomm Inc. |
Safe application distribution and execution in a wireless environment
|
US7657419B2
(en)
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US20020199116A1
(en)
*
|
2001-06-25 |
2002-12-26 |
Keith Hoene |
System and method for computer network virus exclusion
|
US6981280B2
(en)
|
2001-06-29 |
2005-12-27 |
Mcafee, Inc. |
Intelligent network scanning system and method
|
US7546629B2
(en)
*
|
2002-03-06 |
2009-06-09 |
Check Point Software Technologies, Inc. |
System and methodology for security policy arbitration
|
US20040107360A1
(en)
*
|
2002-12-02 |
2004-06-03 |
Zone Labs, Inc. |
System and Methodology for Policy Enforcement
|
US7590684B2
(en)
*
|
2001-07-06 |
2009-09-15 |
Check Point Software Technologies, Inc. |
System providing methodology for access control with cooperative enforcement
|
US9454752B2
(en)
|
2001-07-10 |
2016-09-27 |
Chartoleaux Kg Limited Liability Company |
Reload protocol at a transaction processing entity
|
US7735725B1
(en)
|
2001-07-10 |
2010-06-15 |
Fred Bishop |
Processing an RF transaction using a routing number
|
US7249112B2
(en)
|
2002-07-09 |
2007-07-24 |
American Express Travel Related Services Company, Inc. |
System and method for assigning a funding source for a radio frequency identification device
|
US9031880B2
(en)
|
2001-07-10 |
2015-05-12 |
Iii Holdings 1, Llc |
Systems and methods for non-traditional payment using biometric data
|
US7360689B2
(en)
|
2001-07-10 |
2008-04-22 |
American Express Travel Related Services Company, Inc. |
Method and system for proffering multiple biometrics for use with a FOB
|
US20030014667A1
(en)
*
|
2001-07-16 |
2003-01-16 |
Andrei Kolichtchak |
Buffer overflow attack detection and suppression
|
US20030018909A1
(en)
*
|
2001-07-17 |
2003-01-23 |
International Business Machines Corporation |
Method and apparatus for enforcing security policies in Java applications
|
US7096491B2
(en)
*
|
2001-07-20 |
2006-08-22 |
Hewlett-Packard Development Company, L.P. |
Mobile code security architecture in an application service provider environment
|
CA2354993C
(en)
|
2001-08-10 |
2010-11-09 |
Ibm Canada Limited-Ibm Canada Limitee |
Method of indicating links to external urls
|
IL160342A0
(en)
*
|
2001-08-15 |
2004-07-25 |
Qualcomm Inc |
Test enabled application execution
|
JP2003067210A
(ja)
*
|
2001-08-22 |
2003-03-07 |
Just Syst Corp |
プログラム実行防止装置、プログラム実行防止方法、その方法をコンピュータに実行させるプログラムおよびそのプログラムを記録したコンピュータ読み取り可能な記録媒体
|
US20030051029A1
(en)
*
|
2001-09-07 |
2003-03-13 |
Reedy Dennis G. |
Dynamic provisioning of sevice components in a distributed system
|
US7660887B2
(en)
|
2001-09-07 |
2010-02-09 |
Sun Microsystems, Inc. |
Systems and methods for providing dynamic quality of service for a distributed system
|
US7756969B1
(en)
|
2001-09-07 |
2010-07-13 |
Oracle America, Inc. |
Dynamic provisioning of identification services in a distributed system
|
US7698713B2
(en)
|
2001-09-20 |
2010-04-13 |
Google Inc. |
Altered states of software component behavior
|
EP1296252B1
(en)
*
|
2001-09-21 |
2007-08-01 |
Koninklijke KPN N.V. |
Computer system, data communication network, computer program and data carrier, all for filtering a received message comprising mark-up language content
|
WO2003032158A2
(en)
*
|
2001-10-11 |
2003-04-17 |
Curl Corporation |
System and method for specifying access to resources in a mobile code system
|
US8261095B1
(en)
|
2001-11-01 |
2012-09-04 |
Google Inc. |
Methods and systems for using derived user accounts
|
US7958550B2
(en)
|
2001-11-02 |
2011-06-07 |
Sterling Commerce, Inc. |
Method and system for secure communication
|
US7051340B2
(en)
*
|
2001-11-29 |
2006-05-23 |
Hewlett-Packard Development Company, L.P. |
System and method for isolating applications from each other
|
JP3939977B2
(ja)
*
|
2001-12-20 |
2007-07-04 |
富士通株式会社 |
アクセス権矛盾検出装置および解析ルール作成装置
|
US7661134B2
(en)
*
|
2001-12-21 |
2010-02-09 |
Cybersoft, Inc. |
Apparatus, methods and articles of manufacture for securing computer networks
|
FR2834407B1
(fr)
*
|
2001-12-31 |
2004-06-04 |
Cegetel Groupe |
Procede de securisation deportee d'un telechargement de donnees actives dans un terminal
|
WO2003058451A1
(en)
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
JP2003202929A
(ja)
*
|
2002-01-08 |
2003-07-18 |
Ntt Docomo Inc |
配信方法および配信システム
|
US9652613B1
(en)
|
2002-01-17 |
2017-05-16 |
Trustwave Holdings, Inc. |
Virus detection by executing electronic message code in a virtual machine
|
US7607171B1
(en)
|
2002-01-17 |
2009-10-20 |
Avinti, Inc. |
Virus detection by executing e-mail code in a virtual machine
|
WO2003063449A1
(en)
*
|
2002-01-18 |
2003-07-31 |
Metrowerks Corporation |
System and method for monitoring network security
|
US7707416B2
(en)
*
|
2002-02-01 |
2010-04-27 |
Novell, Inc. |
Authentication cache and authentication on demand in a distributed network environment
|
US7487535B1
(en)
*
|
2002-02-01 |
2009-02-03 |
Novell, Inc. |
Authentication on demand in a distributed network environment
|
US7340777B1
(en)
|
2003-03-31 |
2008-03-04 |
Symantec Corporation |
In memory heuristic system and method for detecting viruses
|
DE60326938D1
(de)
*
|
2002-02-19 |
2009-05-14 |
Postini Inc |
E-mail-verwaltungsdienste
|
ES2373647T3
(es)
*
|
2002-02-27 |
2012-02-07 |
Opentv, Inc. |
Método y dispositivo para la obtención de un objeto de perfil de seguridad jerárquica.
|
AU2003216472A1
(en)
*
|
2002-03-01 |
2003-09-16 |
Green Border Technologies |
Method and system for assured denotation of application semantics
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
AU2003230606B2
(en)
*
|
2002-03-08 |
2009-04-30 |
Mcafee, Llc |
Systems and methods for enhancing electronic communication security
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US7162715B1
(en)
|
2002-03-16 |
2007-01-09 |
I-Squared, Inc. |
Method and apparatus for preemptive monitoring of software binaries by instruction interception and dynamic recompilation
|
WO2003083646A1
(fr)
|
2002-04-03 |
2003-10-09 |
Ntt Docomo, Inc. |
Procede et systeme de distribution, et terminal
|
US7191163B2
(en)
|
2002-04-19 |
2007-03-13 |
Computer Associates Think, Inc. |
System and method for providing inferencing services
|
IL149583A0
(en)
*
|
2002-05-09 |
2003-07-06 |
Kavado Israel Ltd |
Method for automatic setting and updating of a security policy
|
US7191469B2
(en)
*
|
2002-05-13 |
2007-03-13 |
Green Border Technologies |
Methods and systems for providing a secure application environment using derived user accounts
|
US20070118899A1
(en)
*
|
2002-05-17 |
2007-05-24 |
Satyam Computer Services Limited Of Mayfair Centre |
System and method for automated safe reprogramming of software radios
|
JP2003337716A
(ja)
*
|
2002-05-20 |
2003-11-28 |
Ntt Docomo Inc |
電子機器、データ共用方法、プログラム及び記憶媒体
|
US7577941B2
(en)
*
|
2002-05-22 |
2009-08-18 |
Microsoft Corporation |
System and method for identifying potential security risks in controls
|
JP2003345654A
(ja)
*
|
2002-05-23 |
2003-12-05 |
Hitachi Ltd |
データ保護システム
|
US7367056B1
(en)
|
2002-06-04 |
2008-04-29 |
Symantec Corporation |
Countering malicious code infections to computer files that have been infected more than once
|
EP1525522A2
(en)
|
2002-06-06 |
2005-04-27 |
Green Border Technologies |
Method and system for implementing a secure application execution environment using derived user accounts for internet content
|
US7146640B2
(en)
*
|
2002-09-05 |
2006-12-05 |
Exobox Technologies Corp. |
Personal computer internet security system
|
US6805287B2
(en)
|
2002-09-12 |
2004-10-19 |
American Express Travel Related Services Company, Inc. |
System and method for converting a stored value card to a credit card
|
US7287164B2
(en)
*
|
2002-09-12 |
2007-10-23 |
International Business Machines Corporation |
Method and system for encoding signatures to authenticate files
|
US7469419B2
(en)
|
2002-10-07 |
2008-12-23 |
Symantec Corporation |
Detection of malicious computer code
|
US7337471B2
(en)
*
|
2002-10-07 |
2008-02-26 |
Symantec Corporation |
Selective detection of malicious computer code
|
US6850943B2
(en)
*
|
2002-10-18 |
2005-02-01 |
Check Point Software Technologies, Inc. |
Security system and methodology for providing indirect access control
|
US7260847B2
(en)
*
|
2002-10-24 |
2007-08-21 |
Symantec Corporation |
Antivirus scanning in a hard-linked environment
|
US7568218B2
(en)
|
2002-10-31 |
2009-07-28 |
Microsoft Corporation |
Selective cross-realm authentication
|
JP2004171258A
(ja)
*
|
2002-11-20 |
2004-06-17 |
Nec Corp |
パーミッショントークン管理システム及びプログラム
|
US7249187B2
(en)
|
2002-11-27 |
2007-07-24 |
Symantec Corporation |
Enforcement of compliance with network security policies
|
US7788722B1
(en)
|
2002-12-02 |
2010-08-31 |
Arcsight, Inc. |
Modular agent for network security intrusion detection system
|
US20040123117A1
(en)
*
|
2002-12-18 |
2004-06-24 |
Symantec Corporation |
Validation for behavior-blocking system
|
US7203937B1
(en)
*
|
2003-01-09 |
2007-04-10 |
Microsoft Corporation |
Software installation and configuration with specific role for target computer and identity indicator for authorization for performance of features
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US20040153665A1
(en)
*
|
2003-02-03 |
2004-08-05 |
Logan Browne |
Wireless network control and protection system
|
US20040153666A1
(en)
*
|
2003-02-05 |
2004-08-05 |
Sobel William E. |
Structured rollout of updates to malicious computer code detection definitions
|
US20040158546A1
(en)
*
|
2003-02-06 |
2004-08-12 |
Sobel William E. |
Integrity checking for software downloaded from untrusted sources
|
US7293290B2
(en)
*
|
2003-02-06 |
2007-11-06 |
Symantec Corporation |
Dynamic detection of computer worms
|
US7246227B2
(en)
*
|
2003-02-10 |
2007-07-17 |
Symantec Corporation |
Efficient scanning of stream based data
|
US7603472B2
(en)
*
|
2003-02-19 |
2009-10-13 |
Google Inc. |
Zero-minute virus and spam detection
|
US20060265459A1
(en)
*
|
2003-02-19 |
2006-11-23 |
Postini, Inc. |
Systems and methods for managing the transmission of synchronous electronic messages
|
US7958187B2
(en)
*
|
2003-02-19 |
2011-06-07 |
Google Inc. |
Systems and methods for managing directory harvest attacks via electronic messages
|
US6965968B1
(en)
|
2003-02-27 |
2005-11-15 |
Finjan Software Ltd. |
Policy-based caching
|
GB0304663D0
(en)
*
|
2003-02-28 |
2003-04-02 |
Ncipher Corp Ltd |
A method and system of securely enforcing a computer policy
|
US7308578B2
(en)
*
|
2003-03-06 |
2007-12-11 |
International Business Machines Corporation |
Method and apparatus for authorizing execution for applications in a data processing system
|
US7203959B2
(en)
|
2003-03-14 |
2007-04-10 |
Symantec Corporation |
Stream scanning through network proxy servers
|
US7529754B2
(en)
|
2003-03-14 |
2009-05-05 |
Websense, Inc. |
System and method of monitoring and controlling application files
|
US7185015B2
(en)
|
2003-03-14 |
2007-02-27 |
Websense, Inc. |
System and method of monitoring and controlling application files
|
US20060130016A1
(en)
*
|
2003-03-17 |
2006-06-15 |
Wagner John R |
Method of kernal-mode instruction interception and apparatus therefor
|
US7546638B2
(en)
*
|
2003-03-18 |
2009-06-09 |
Symantec Corporation |
Automated identification and clean-up of malicious computer code
|
JP2004302543A
(ja)
*
|
2003-03-28 |
2004-10-28 |
Ntt Docomo Inc |
受信装置およびプログラム
|
JP2004302516A
(ja)
*
|
2003-03-28 |
2004-10-28 |
Ntt Docomo Inc |
端末装置およびプログラム
|
JP4176533B2
(ja)
|
2003-03-31 |
2008-11-05 |
株式会社エヌ・ティ・ティ・ドコモ |
端末装置及びプログラム
|
US8136155B2
(en)
*
|
2003-04-01 |
2012-03-13 |
Check Point Software Technologies, Inc. |
Security system with methodology for interprocess communication control
|
US10063523B2
(en)
*
|
2005-09-14 |
2018-08-28 |
Oracle International Corporation |
Crafted identities
|
US10275723B2
(en)
*
|
2005-09-14 |
2019-04-30 |
Oracle International Corporation |
Policy enforcement via attestations
|
US9781154B1
(en)
|
2003-04-01 |
2017-10-03 |
Oracle International Corporation |
Systems and methods for supporting information security and sub-system operational protocol conformance
|
US20040250086A1
(en)
*
|
2003-05-23 |
2004-12-09 |
Harris Corporation |
Method and system for protecting against software misuse and malicious code
|
US7359395B2
(en)
*
|
2003-06-16 |
2008-04-15 |
Packeteer, Inc. |
Pre-fetch communication systems and methods
|
US20050015599A1
(en)
*
|
2003-06-25 |
2005-01-20 |
Nokia, Inc. |
Two-phase hash value matching technique in message protection systems
|
US8468330B1
(en)
|
2003-06-30 |
2013-06-18 |
Oracle International Corporation |
Methods, systems, and data structures for loading and authenticating a module
|
US7788726B2
(en)
*
|
2003-07-02 |
2010-08-31 |
Check Point Software Technologies, Inc. |
System and methodology providing information lockbox
|
US7739278B1
(en)
*
|
2003-08-22 |
2010-06-15 |
Symantec Corporation |
Source independent file attribute tracking
|
JP4174392B2
(ja)
*
|
2003-08-28 |
2008-10-29 |
日本電気株式会社 |
ネットワークへの不正接続防止システム、及びネットワークへの不正接続防止装置
|
US7451487B2
(en)
*
|
2003-09-08 |
2008-11-11 |
Sonicwall, Inc. |
Fraudulent message detection
|
WO2005043360A1
(en)
*
|
2003-10-21 |
2005-05-12 |
Green Border Technologies |
Systems and methods for secure client applications
|
US7657938B2
(en)
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
JP2005141635A
(ja)
*
|
2003-11-10 |
2005-06-02 |
Sony Corp |
コンテンツ共有システム,コンテンツ処理装置,情報処理装置,プログラム,記録媒体,コンテンツ共有方法
|
US7647631B2
(en)
*
|
2003-12-10 |
2010-01-12 |
Hewlett-Packard Development Company |
Automated user interaction in application assessment
|
US7950059B2
(en)
*
|
2003-12-30 |
2011-05-24 |
Check-Point Software Technologies Ltd. |
Universal worm catcher
|
US7480655B2
(en)
*
|
2004-01-09 |
2009-01-20 |
Webroor Software, Inc. |
System and method for protecting files on a computer from access by unauthorized applications
|
US7792874B1
(en)
|
2004-01-30 |
2010-09-07 |
Oracle America, Inc. |
Dynamic provisioning for filtering and consolidating events
|
US8423471B1
(en)
*
|
2004-02-04 |
2013-04-16 |
Radix Holdings, Llc |
Protected document elements
|
WO2005076726A2
(en)
*
|
2004-02-17 |
2005-08-25 |
Checkpoint Software Technologies Ltd. |
Mobile network security system
|
US8332943B2
(en)
|
2004-02-17 |
2012-12-11 |
Microsoft Corporation |
Tiered object-related trust decisions
|
US7607172B2
(en)
*
|
2004-03-02 |
2009-10-20 |
International Business Machines Corporation |
Method of protecting a computing system from harmful active content in documents
|
US9106694B2
(en)
|
2004-04-01 |
2015-08-11 |
Fireeye, Inc. |
Electronic message analysis for malware detection
|
US8793787B2
(en)
|
2004-04-01 |
2014-07-29 |
Fireeye, Inc. |
Detecting malicious network content using virtual environment components
|
US8881282B1
(en)
|
2004-04-01 |
2014-11-04 |
Fireeye, Inc. |
Systems and methods for malware attack detection and identification
|
US7587537B1
(en)
|
2007-11-30 |
2009-09-08 |
Altera Corporation |
Serializer-deserializer circuits formed from input-output circuit registers
|
US8171553B2
(en)
|
2004-04-01 |
2012-05-01 |
Fireeye, Inc. |
Heuristic based capture with replay to virtual machine
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US7130981B1
(en)
|
2004-04-06 |
2006-10-31 |
Symantec Corporation |
Signature driven cache extension for stream based scanning
|
JP4333455B2
(ja)
*
|
2004-04-09 |
2009-09-16 |
ソニー株式会社 |
コンテンツ再生装置,プログラム及びコンテンツ再生制御方法
|
US7735100B1
(en)
*
|
2004-04-22 |
2010-06-08 |
Symantec Corporation |
Regulating remote registry access over a computer network
|
US7647321B2
(en)
*
|
2004-04-26 |
2010-01-12 |
Google Inc. |
System and method for filtering electronic messages using business heuristics
|
US8108937B1
(en)
*
|
2004-04-26 |
2012-01-31 |
Symantec Corporation |
Robustly regulating access to executable class registry entries
|
US20060242406A1
(en)
|
2005-04-22 |
2006-10-26 |
Microsoft Corporation |
Protected computing environment
|
US8041769B2
(en)
*
|
2004-05-02 |
2011-10-18 |
Markmonitor Inc. |
Generating phish messages
|
US8769671B2
(en)
*
|
2004-05-02 |
2014-07-01 |
Markmonitor Inc. |
Online fraud solution
|
US7913302B2
(en)
*
|
2004-05-02 |
2011-03-22 |
Markmonitor, Inc. |
Advanced responses to online fraud
|
US7457823B2
(en)
|
2004-05-02 |
2008-11-25 |
Markmonitor Inc. |
Methods and systems for analyzing data related to possible online fraud
|
US7992204B2
(en)
*
|
2004-05-02 |
2011-08-02 |
Markmonitor, Inc. |
Enhanced responses to online fraud
|
US7870608B2
(en)
*
|
2004-05-02 |
2011-01-11 |
Markmonitor, Inc. |
Early detection and monitoring of online fraud
|
US20070107053A1
(en)
*
|
2004-05-02 |
2007-05-10 |
Markmonitor, Inc. |
Enhanced responses to online fraud
|
US9203648B2
(en)
*
|
2004-05-02 |
2015-12-01 |
Thomson Reuters Global Resources |
Online fraud solution
|
US7861304B1
(en)
|
2004-05-07 |
2010-12-28 |
Symantec Corporation |
Pattern matching using embedded functions
|
US7484094B1
(en)
|
2004-05-14 |
2009-01-27 |
Symantec Corporation |
Opening computer files quickly and safely over a network
|
US7373667B1
(en)
|
2004-05-14 |
2008-05-13 |
Symantec Corporation |
Protecting a computer coupled to a network from malicious code infections
|
WO2005114539A2
(en)
*
|
2004-05-20 |
2005-12-01 |
Computer Associates Think, Inc. |
Systems and methods for excluding user specified applications
|
AU2005248858B8
(en)
*
|
2004-05-25 |
2011-05-26 |
Google Llc |
Electronic message source reputation information system
|
US8707251B2
(en)
*
|
2004-06-07 |
2014-04-22 |
International Business Machines Corporation |
Buffered viewing of electronic documents
|
JP2005352673A
(ja)
*
|
2004-06-09 |
2005-12-22 |
Fujitsu Ltd |
不正アクセス監視プログラム、装置および方法
|
CN100385852C
(zh)
*
|
2004-06-22 |
2008-04-30 |
腾讯科技(深圳)有限公司 |
一种网页插件选择下载的实现方法及其装置
|
US7606821B2
(en)
*
|
2004-06-30 |
2009-10-20 |
Ebay Inc. |
Method and system for preventing fraudulent activities
|
EP1783616A4
(en)
*
|
2004-07-21 |
2009-10-21 |
Sony Corp |
CONTENT PROCESSING DEVICE, CONDITIONAL PROCESSING METHOD AND COMPUTER PROGRAM
|
US7765603B2
(en)
|
2004-07-21 |
2010-07-27 |
Sony Corporation |
Communication system, contents processing device, communication method, and computer program
|
US7877473B2
(en)
|
2004-07-21 |
2011-01-25 |
Sony Corporation |
Mode detection of data transfer between a source device and a connected portable device
|
BRPI0506146A
(pt)
*
|
2004-07-21 |
2006-10-24 |
Sony Corp |
aparelho de reprodução de conteúdo, métodos de controle de reprodução de conteúdo para controlar a reprodução de um conteúdo em um aparelho de reprodução de conteúdo, e, programa para controlar reprodução de um conteúdo em um aparelho de reprodução de conteúdo
|
US7877328B2
(en)
|
2004-07-21 |
2011-01-25 |
Sony Corporation |
Communication system communication method, contents processing device, and computer program
|
US7712135B2
(en)
|
2004-08-05 |
2010-05-04 |
Savant Protection, Inc. |
Pre-emptive anti-virus protection of computing systems
|
US7484247B2
(en)
|
2004-08-07 |
2009-01-27 |
Allen F Rozman |
System and method for protecting a computer system from malicious software
|
US8914309B2
(en)
|
2004-08-20 |
2014-12-16 |
Ebay Inc. |
Method and system for tracking fraudulent activity
|
US7509680B1
(en)
|
2004-09-01 |
2009-03-24 |
Symantec Corporation |
Detecting computer worms as they arrive at local computers through open network shares
|
GB2418037B
(en)
*
|
2004-09-09 |
2007-02-28 |
Surfcontrol Plc |
System, method and apparatus for use in monitoring or controlling internet access
|
GB2418999A
(en)
*
|
2004-09-09 |
2006-04-12 |
Surfcontrol Plc |
Categorizing uniform resource locators
|
GB2418108B
(en)
|
2004-09-09 |
2007-06-27 |
Surfcontrol Plc |
System, method and apparatus for use in monitoring or controlling internet access
|
US7690034B1
(en)
*
|
2004-09-10 |
2010-03-30 |
Symantec Corporation |
Using behavior blocking mobility tokens to facilitate distributed worm detection
|
US8161538B2
(en)
*
|
2004-09-13 |
2012-04-17 |
Cisco Technology, Inc. |
Stateful application firewall
|
US20060059551A1
(en)
*
|
2004-09-13 |
2006-03-16 |
Utstarcom Inc. |
Dynamic firewall capabilities for wireless access gateways
|
US8312431B1
(en)
*
|
2004-09-17 |
2012-11-13 |
Oracle America, Inc. |
System and computer readable medium for verifying access to signed ELF objects
|
US20060075490A1
(en)
*
|
2004-10-01 |
2006-04-06 |
Boney Matthew L |
System and method for actively operating malware to generate a definition
|
US7287279B2
(en)
|
2004-10-01 |
2007-10-23 |
Webroot Software, Inc. |
System and method for locating malware
|
US8181219B2
(en)
|
2004-10-01 |
2012-05-15 |
Microsoft Corporation |
Access authorization having embedded policies
|
US20060075494A1
(en)
*
|
2004-10-01 |
2006-04-06 |
Bertman Justin R |
Method and system for analyzing data for potential malware
|
US7480683B2
(en)
*
|
2004-10-01 |
2009-01-20 |
Webroot Software, Inc. |
System and method for heuristic analysis to identify pestware
|
US20060075468A1
(en)
*
|
2004-10-01 |
2006-04-06 |
Boney Matthew L |
System and method for locating malware and generating malware definitions
|
US7904956B2
(en)
*
|
2004-10-01 |
2011-03-08 |
Microsoft Corporation |
Access authorization with anomaly detection
|
US20060085528A1
(en)
*
|
2004-10-01 |
2006-04-20 |
Steve Thomas |
System and method for monitoring network communications for pestware
|
US7533131B2
(en)
*
|
2004-10-01 |
2009-05-12 |
Webroot Software, Inc. |
System and method for pestware detection and removal
|
US7461339B2
(en)
|
2004-10-21 |
2008-12-02 |
Trend Micro, Inc. |
Controlling hostile electronic mail content
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US7565686B1
(en)
|
2004-11-08 |
2009-07-21 |
Symantec Corporation |
Preventing unauthorized loading of late binding code into a process
|
EP1825390A2
(en)
|
2004-11-13 |
2007-08-29 |
Stream Theory, Inc. |
Hybrid local/remote streaming
|
CN100374712C
(zh)
*
|
2004-12-08 |
2008-03-12 |
成都威特电喷有限责任公司 |
电控组合泵总成
|
US20060167871A1
(en)
*
|
2004-12-17 |
2006-07-27 |
James Lee Sorenson |
Method and system for blocking specific network resources
|
US8234638B2
(en)
*
|
2004-12-28 |
2012-07-31 |
Hercules Software, Llc |
Creating a relatively unique environment for computing platforms
|
US20060149730A1
(en)
*
|
2004-12-30 |
2006-07-06 |
Curtis James R |
Client authenticated web browser with access approval mechanism
|
US20060174078A1
(en)
*
|
2005-01-19 |
2006-08-03 |
Alcatel |
System and method for executing a process on a microprocessor-enabled device
|
KR100705002B1
(ko)
|
2005-02-25 |
2007-04-10 |
엔에이치엔(주) |
액티브엑스 컨트롤 설치 방법
|
US7610273B2
(en)
*
|
2005-03-22 |
2009-10-27 |
Microsoft Corporation |
Application identity and rating service
|
EP1875364A2
(en)
|
2005-03-23 |
2008-01-09 |
Stream Theory, Inc. |
System and method for tracking changes to files in streaming applications
|
US8024523B2
(en)
|
2007-11-07 |
2011-09-20 |
Endeavors Technologies, Inc. |
Opportunistic block transmission with time constraints
|
US7346611B2
(en)
*
|
2005-04-12 |
2008-03-18 |
Webroot Software, Inc. |
System and method for accessing data from a data storage medium
|
US7565695B2
(en)
*
|
2005-04-12 |
2009-07-21 |
Webroot Software, Inc. |
System and method for directly accessing data from a data storage medium
|
US20060232592A1
(en)
*
|
2005-04-18 |
2006-10-19 |
Faso Paul L |
Method of Internet surfing to eliminate the risk of receiving malicious code
|
US9363481B2
(en)
|
2005-04-22 |
2016-06-07 |
Microsoft Technology Licensing, Llc |
Protected media pipeline
|
US20060253597A1
(en)
*
|
2005-05-05 |
2006-11-09 |
Mujica Technologies Inc. |
E-mail system
|
US7937480B2
(en)
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
US8078740B2
(en)
|
2005-06-03 |
2011-12-13 |
Microsoft Corporation |
Running internet applications with low rights
|
US20060277183A1
(en)
*
|
2005-06-06 |
2006-12-07 |
Tony Nichols |
System and method for neutralizing locked pestware files
|
US8452744B2
(en)
*
|
2005-06-06 |
2013-05-28 |
Webroot Inc. |
System and method for analyzing locked files
|
TW200644495A
(en)
*
|
2005-06-10 |
2006-12-16 |
D Link Corp |
Regional joint detecting and guarding system for security of network information
|
WO2006137057A2
(en)
*
|
2005-06-21 |
2006-12-28 |
Onigma Ltd. |
A method and a system for providing comprehensive protection against leakage of sensitive information assets using host based agents, content- meta-data and rules-based policies
|
GB0512744D0
(en)
*
|
2005-06-22 |
2005-07-27 |
Blackspider Technologies |
Method and system for filtering electronic messages
|
US7975303B1
(en)
|
2005-06-27 |
2011-07-05 |
Symantec Corporation |
Efficient file scanning using input-output hints
|
US7895654B1
(en)
|
2005-06-27 |
2011-02-22 |
Symantec Corporation |
Efficient file scanning using secure listing of file modification times
|
JP4804816B2
(ja)
*
|
2005-06-29 |
2011-11-02 |
株式会社エヌ・ティ・ティ・ドコモ |
通信端末、および通信方法
|
US20090144826A2
(en)
*
|
2005-06-30 |
2009-06-04 |
Webroot Software, Inc. |
Systems and Methods for Identifying Malware Distribution
|
JP2009507268A
(ja)
*
|
2005-07-01 |
2009-02-19 |
マークモニター インコーポレイテッド |
改良された不正行為監視システム
|
US20070016951A1
(en)
*
|
2005-07-13 |
2007-01-18 |
Piccard Paul L |
Systems and methods for identifying sources of malware
|
US20070067842A1
(en)
*
|
2005-08-08 |
2007-03-22 |
Greene Michael P |
Systems and methods for collecting files related to malware
|
US8726369B1
(en)
|
2005-08-11 |
2014-05-13 |
Aaron T. Emigh |
Trusted path, authentication and data security
|
US8245270B2
(en)
*
|
2005-09-01 |
2012-08-14 |
Microsoft Corporation |
Resource based dynamic security authorization
|
US8682795B2
(en)
*
|
2005-09-16 |
2014-03-25 |
Oracle International Corporation |
Trusted information exchange based on trust agreements
|
US20070073792A1
(en)
*
|
2005-09-28 |
2007-03-29 |
Tony Nichols |
System and method for removing residual data from memory
|
US20070074289A1
(en)
*
|
2005-09-28 |
2007-03-29 |
Phil Maddaloni |
Client side exploit tracking
|
US20070079375A1
(en)
*
|
2005-10-04 |
2007-04-05 |
Drew Copley |
Computer Behavioral Management Using Heuristic Analysis
|
US7712132B1
(en)
|
2005-10-06 |
2010-05-04 |
Ogilvie John W |
Detecting surreptitious spyware
|
US7996898B2
(en)
*
|
2005-10-25 |
2011-08-09 |
Webroot Software, Inc. |
System and method for monitoring events on a computer to reduce false positive indication of pestware
|
US20070094496A1
(en)
*
|
2005-10-25 |
2007-04-26 |
Michael Burtscher |
System and method for kernel-level pestware management
|
US20070094733A1
(en)
*
|
2005-10-26 |
2007-04-26 |
Wilson Michael C |
System and method for neutralizing pestware residing in executable memory
|
US20070094726A1
(en)
*
|
2005-10-26 |
2007-04-26 |
Wilson Michael C |
System and method for neutralizing pestware that is loaded by a desirable process
|
US20070107057A1
(en)
*
|
2005-11-10 |
2007-05-10 |
Docomo Communications Laboratories Usa, Inc. |
Method and apparatus for detecting and preventing unsafe behavior of javascript programs
|
CN101310285B
(zh)
*
|
2005-11-17 |
2011-09-07 |
皇家飞利浦电子股份有限公司 |
用于管理访问控制的系统
|
US7926108B2
(en)
*
|
2005-11-23 |
2011-04-12 |
Trend Micro Incorporated |
SMTP network security processing in a transparent relay in a computer network
|
US20080281772A2
(en)
*
|
2005-11-30 |
2008-11-13 |
Webroot Software, Inc. |
System and method for managing access to storage media
|
US7930299B2
(en)
|
2005-11-30 |
2011-04-19 |
Finjan, Inc. |
System and method for appending security information to search engine results
|
US7660412B1
(en)
|
2005-12-09 |
2010-02-09 |
Trend Micro Incorporated |
Generation of debug information for debugging a network security appliance
|
US7613918B2
(en)
*
|
2006-02-16 |
2009-11-03 |
Finjan Software Ltd. |
System and method for enforcing a security context on a downloadable
|
US7757289B2
(en)
*
|
2005-12-12 |
2010-07-13 |
Finjan, Inc. |
System and method for inspecting dynamically generated executable code
|
US20120144485A9
(en)
|
2005-12-12 |
2012-06-07 |
Finjan Software, Ltd. |
Computer security method and system with input parameter validation
|
US8453243B2
(en)
*
|
2005-12-28 |
2013-05-28 |
Websense, Inc. |
Real time lockdown
|
US8418245B2
(en)
*
|
2006-01-18 |
2013-04-09 |
Webroot Inc. |
Method and system for detecting obfuscatory pestware in a computer memory
|
US8255992B2
(en)
*
|
2006-01-18 |
2012-08-28 |
Webroot Inc. |
Method and system for detecting dependent pestware objects on a computer
|
US20070168285A1
(en)
*
|
2006-01-18 |
2007-07-19 |
Jurijs Girtakovskis |
Systems and methods for neutralizing unauthorized attempts to monitor user activity
|
US7721333B2
(en)
*
|
2006-01-18 |
2010-05-18 |
Webroot Software, Inc. |
Method and system for detecting a keylogger on a computer
|
US20070169198A1
(en)
*
|
2006-01-18 |
2007-07-19 |
Phil Madddaloni |
System and method for managing pestware affecting an operating system of a computer
|
US20070168694A1
(en)
*
|
2006-01-18 |
2007-07-19 |
Phil Maddaloni |
System and method for identifying and removing pestware using a secondary operating system
|
US7917715B2
(en)
*
|
2006-01-28 |
2011-03-29 |
Tallman Jr Leon C |
Internet-safe computer
|
US9135469B2
(en)
*
|
2006-02-28 |
2015-09-15 |
Paypal, Inc. |
Information protection system
|
US20070203884A1
(en)
*
|
2006-02-28 |
2007-08-30 |
Tony Nichols |
System and method for obtaining file information and data locations
|
US8458789B1
(en)
*
|
2006-03-09 |
2013-06-04 |
Mcafee, Inc. |
System, method and computer program product for identifying unwanted code associated with network communications
|
US20070226800A1
(en)
*
|
2006-03-22 |
2007-09-27 |
Tony Nichols |
Method and system for denying pestware direct drive access
|
US8079032B2
(en)
*
|
2006-03-22 |
2011-12-13 |
Webroot Software, Inc. |
Method and system for rendering harmless a locked pestware executable object
|
US7996834B2
(en)
*
|
2006-04-14 |
2011-08-09 |
Microsoft Corporation |
Virtual machine self-service restrictions
|
US20070261117A1
(en)
*
|
2006-04-20 |
2007-11-08 |
Boney Matthew L |
Method and system for detecting a compressed pestware executable object
|
US8181244B2
(en)
*
|
2006-04-20 |
2012-05-15 |
Webroot Inc. |
Backward researching time stamped events to find an origin of pestware
|
US8201243B2
(en)
*
|
2006-04-20 |
2012-06-12 |
Webroot Inc. |
Backwards researching activity indicative of pestware
|
US20070250818A1
(en)
*
|
2006-04-20 |
2007-10-25 |
Boney Matthew L |
Backwards researching existing pestware
|
US7735139B1
(en)
*
|
2006-05-17 |
2010-06-08 |
Trend Micro Incorporated |
In-line scanning of network data in an asymmetric routing environment
|
US20070294396A1
(en)
*
|
2006-06-15 |
2007-12-20 |
Krzaczynski Eryk W |
Method and system for researching pestware spread through electronic messages
|
US20080010326A1
(en)
*
|
2006-06-15 |
2008-01-10 |
Carpenter Troy A |
Method and system for securely deleting files from a computer storage device
|
US20070294767A1
(en)
*
|
2006-06-20 |
2007-12-20 |
Paul Piccard |
Method and system for accurate detection and removal of pestware
|
US8117441B2
(en)
*
|
2006-06-20 |
2012-02-14 |
Microsoft Corporation |
Integrating security protection tools with computer device integrity and privacy policy
|
US8185737B2
(en)
|
2006-06-23 |
2012-05-22 |
Microsoft Corporation |
Communication across domains
|
GB2439574A
(en)
*
|
2006-06-29 |
2008-01-02 |
Symbian Software Ltd |
Detecting revoked certificates for downloaded software
|
US8239915B1
(en)
|
2006-06-30 |
2012-08-07 |
Symantec Corporation |
Endpoint management using trust rating data
|
US7818807B1
(en)
*
|
2006-06-30 |
2010-10-19 |
Symantec Corporation |
System and method of logical prefetching for optimizing file scanning operations
|
FI20060665A0
(fi)
*
|
2006-07-07 |
2006-07-07 |
Nokia Corp |
Poikkeavuuden havaitseminen
|
US7996903B2
(en)
|
2006-07-07 |
2011-08-09 |
Webroot Software, Inc. |
Method and system for detecting and removing hidden pestware files
|
US8020206B2
(en)
|
2006-07-10 |
2011-09-13 |
Websense, Inc. |
System and method of analyzing web content
|
US8615800B2
(en)
|
2006-07-10 |
2013-12-24 |
Websense, Inc. |
System and method for analyzing web content
|
GB2443005A
(en)
*
|
2006-07-19 |
2008-04-23 |
Chronicle Solutions |
Analysing network traffic by decoding a wide variety of protocols (or object types) of each packet
|
US8578495B2
(en)
*
|
2006-07-26 |
2013-11-05 |
Webroot Inc. |
System and method for analyzing packed files
|
US20080028466A1
(en)
*
|
2006-07-26 |
2008-01-31 |
Michael Burtscher |
System and method for retrieving information from a storage medium
|
US20080028462A1
(en)
*
|
2006-07-26 |
2008-01-31 |
Michael Burtscher |
System and method for loading and analyzing files
|
US8190868B2
(en)
*
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US8171550B2
(en)
*
|
2006-08-07 |
2012-05-01 |
Webroot Inc. |
System and method for defining and detecting pestware with function parameters
|
US7590707B2
(en)
*
|
2006-08-07 |
2009-09-15 |
Webroot Software, Inc. |
Method and system for identifying network addresses associated with suspect network destinations
|
US8065664B2
(en)
*
|
2006-08-07 |
2011-11-22 |
Webroot Software, Inc. |
System and method for defining and detecting pestware
|
US7769992B2
(en)
|
2006-08-18 |
2010-08-03 |
Webroot Software, Inc. |
File manipulation during early boot time
|
US20080127352A1
(en)
*
|
2006-08-18 |
2008-05-29 |
Min Wang |
System and method for protecting a registry of a computer
|
US8056134B1
(en)
|
2006-09-10 |
2011-11-08 |
Ogilvie John W |
Malware detection and identification via malware spoofing
|
US7913292B2
(en)
*
|
2006-10-18 |
2011-03-22 |
Microsoft Corporation |
Identification and visualization of trusted user interface objects
|
US8261345B2
(en)
|
2006-10-23 |
2012-09-04 |
Endeavors Technologies, Inc. |
Rule-based application access management
|
US8527592B2
(en)
|
2006-10-31 |
2013-09-03 |
Watchguard Technologies, Inc. |
Reputation-based method and system for determining a likelihood that a message is undesired
|
US9654495B2
(en)
|
2006-12-01 |
2017-05-16 |
Websense, Llc |
System and method of analyzing web addresses
|
GB2458094A
(en)
|
2007-01-09 |
2009-09-09 |
Surfcontrol On Demand Ltd |
URL interception and categorization in firewalls
|
US20080229416A1
(en)
*
|
2007-01-09 |
2008-09-18 |
G. K. Webb Services Llc |
Computer Network Virus Protection System and Method
|
GB2445764A
(en)
|
2007-01-22 |
2008-07-23 |
Surfcontrol Plc |
Resource access filtering system and database structure for use therewith
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
AU2008214131B2
(en)
*
|
2007-02-02 |
2012-06-14 |
Websense, Inc. |
System and method for adding context to prevent data leakage over a computer network
|
US8015174B2
(en)
*
|
2007-02-28 |
2011-09-06 |
Websense, Inc. |
System and method of controlling access to the internet
|
GB0709527D0
(en)
|
2007-05-18 |
2007-06-27 |
Surfcontrol Plc |
Electronic messaging system, message processing apparatus and message processing method
|
JP4395178B2
(ja)
*
|
2007-05-29 |
2010-01-06 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
コンテンツ処理システム、方法及びプログラム
|
US8127358B1
(en)
|
2007-05-30 |
2012-02-28 |
Trend Micro Incorporated |
Thin client for computer security applications
|
US8402529B1
(en)
|
2007-05-30 |
2013-03-19 |
M86 Security, Inc. |
Preventing propagation of malicious software during execution in a virtual machine
|
US10019570B2
(en)
*
|
2007-06-14 |
2018-07-10 |
Microsoft Technology Licensing, Llc |
Protection and communication abstractions for web browsers
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8892738B2
(en)
|
2007-11-07 |
2014-11-18 |
Numecent Holdings, Inc. |
Deriving component statistics for a stream enabled application
|
US8045458B2
(en)
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
KR20090047890A
(ko)
*
|
2007-11-08 |
2009-05-13 |
한국전자통신연구원 |
검색 엔진을 이용한 악성 코드 유포 사이트 관리 방법,장치 및 시스템
|
US8245289B2
(en)
|
2007-11-09 |
2012-08-14 |
International Business Machines Corporation |
Methods and systems for preventing security breaches
|
US8161541B2
(en)
*
|
2007-12-13 |
2012-04-17 |
Alcatel Lucent |
Ethernet connectivity fault management with user verification option
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US8146151B2
(en)
|
2008-02-27 |
2012-03-27 |
Microsoft Corporation |
Safe file transmission and reputation lookup
|
US8407784B2
(en)
*
|
2008-03-19 |
2013-03-26 |
Websense, Inc. |
Method and system for protection against information stealing software
|
US8370948B2
(en)
*
|
2008-03-19 |
2013-02-05 |
Websense, Inc. |
System and method for analysis of electronic information dissemination events
|
US9015842B2
(en)
|
2008-03-19 |
2015-04-21 |
Websense, Inc. |
Method and system for protection against information stealing software
|
US9130986B2
(en)
|
2008-03-19 |
2015-09-08 |
Websense, Inc. |
Method and system for protection against information stealing software
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
KR100953841B1
(ko)
|
2008-04-14 |
2010-04-20 |
주식회사위즈베라 |
액티브엑스 컨트롤의 설치 방법
|
US8769702B2
(en)
|
2008-04-16 |
2014-07-01 |
Micosoft Corporation |
Application reputation service
|
CA2729158A1
(en)
|
2008-06-30 |
2010-01-07 |
Websense, Inc. |
System and method for dynamic and real-time categorization of webpages
|
US9940181B2
(en)
*
|
2008-07-14 |
2018-04-10 |
Nyotron Information Security Ltd. |
System and method for reacting to system calls made to a kernal of the system
|
US8566585B2
(en)
*
|
2008-07-14 |
2013-10-22 |
Nyotron Information Security Ltd. |
System and a method for processing system calls in a computerized system that implements a kernel
|
US20100031041A1
(en)
*
|
2008-08-04 |
2010-02-04 |
Postalguard Ltd. |
Method and system for securing internet communication from hacking attacks
|
EP2157525B1
(de)
*
|
2008-08-21 |
2018-01-10 |
Unify GmbH & Co. KG |
Verfahren zur Erkennung von Schadsoftware
|
US8448245B2
(en)
*
|
2009-01-17 |
2013-05-21 |
Stopthehacker.com, Jaal LLC |
Automated identification of phishing, phony and malicious web sites
|
US8484625B2
(en)
*
|
2009-04-01 |
2013-07-09 |
Motorola Mobility Llc |
Method and apparatus to vet an executable program using a model
|
JP5332838B2
(ja)
*
|
2009-04-07 |
2013-11-06 |
ソニー株式会社 |
情報処理装置、および実行制御方法
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
EP2443580A1
(en)
|
2009-05-26 |
2012-04-25 |
Websense, Inc. |
Systems and methods for efficeint detection of fingerprinted data and information
|
US8930805B2
(en)
*
|
2009-07-24 |
2015-01-06 |
Bank Of America Corporation |
Browser preview
|
US8832829B2
(en)
|
2009-09-30 |
2014-09-09 |
Fireeye, Inc. |
Network-based binary file extraction and analysis for malware detection
|
US8458774B2
(en)
*
|
2009-11-02 |
2013-06-04 |
Authentify Inc. |
Method for secure site and user authentication
|
US8479286B2
(en)
*
|
2009-12-15 |
2013-07-02 |
Mcafee, Inc. |
Systems and methods for behavioral sandboxing
|
US8813232B2
(en)
|
2010-03-04 |
2014-08-19 |
Mcafee Inc. |
Systems and methods for risk rating and pro-actively detecting malicious online ads
|
US20110219449A1
(en)
*
|
2010-03-04 |
2011-09-08 |
St Neitzel Michael |
Malware detection method, system and computer program product
|
US8468602B2
(en)
*
|
2010-03-08 |
2013-06-18 |
Raytheon Company |
System and method for host-level malware detection
|
US8863279B2
(en)
*
|
2010-03-08 |
2014-10-14 |
Raytheon Company |
System and method for malware detection
|
US9009820B1
(en)
|
2010-03-08 |
2015-04-14 |
Raytheon Company |
System and method for malware detection using multiple techniques
|
US8402547B2
(en)
*
|
2010-03-14 |
2013-03-19 |
Virtual Forge GmbH |
Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in SAP® ABAP™ code
|
US10025688B2
(en)
|
2010-03-14 |
2018-07-17 |
Virtual Forge GmbH |
System and method for detecting data extrusion in software applications
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US8914879B2
(en)
|
2010-06-11 |
2014-12-16 |
Trustwave Holdings, Inc. |
System and method for improving coverage for web code
|
US8510829B2
(en)
|
2010-06-24 |
2013-08-13 |
Mcafee, Inc. |
Systems and methods to detect malicious media files
|
US9280391B2
(en)
|
2010-08-23 |
2016-03-08 |
AVG Netherlands B.V. |
Systems and methods for improving performance of computer systems
|
US8726387B2
(en)
*
|
2011-02-11 |
2014-05-13 |
F-Secure Corporation |
Detecting a trojan horse
|
US9405902B1
(en)
|
2011-03-15 |
2016-08-02 |
Trend Micro Incorporated |
Anti-malware service in multi-tenant cloud computing environments
|
US8601583B1
(en)
|
2011-04-14 |
2013-12-03 |
Trend Micro Incorporated |
Certification of virtual machine images in cloud computing environments
|
US8676884B2
(en)
*
|
2011-06-08 |
2014-03-18 |
F-Secure Corporation |
Security configuration
|
US8893278B1
(en)
|
2011-07-12 |
2014-11-18 |
Trustwave Holdings, Inc. |
Detecting malware communication on an infected computing device
|
US9003544B2
(en)
*
|
2011-07-26 |
2015-04-07 |
Kaspersky Lab Zao |
Efficient securing of data on mobile devices
|
US8776040B2
(en)
|
2011-08-19 |
2014-07-08 |
International Business Machines Corporation |
Protection for unauthorized firmware and software upgrades to consumer electronic devices
|
US8856771B2
(en)
*
|
2011-08-19 |
2014-10-07 |
International Business Machines Corporation |
Protection for unauthorized firmware and software upgrades to consumer electronic devices
|
KR101389682B1
(ko)
*
|
2011-08-25 |
2014-04-28 |
주식회사 팬택 |
바이러스 피해를 방지하는 시스템 및 방법
|
CN102333122B
(zh)
*
|
2011-09-28 |
2015-04-15 |
奇智软件(北京)有限公司 |
一种下载资源提供方法、装置及系统
|
US8239918B1
(en)
*
|
2011-10-11 |
2012-08-07 |
Google Inc. |
Application marketplace administrative controls
|
GB2492857B
(en)
*
|
2011-11-30 |
2013-07-17 |
Avecto Ltd |
Method and computer device to control software file downloads
|
US9407443B2
(en)
|
2012-06-05 |
2016-08-02 |
Lookout, Inc. |
Component analysis of software applications on computing devices
|
US9754105B1
(en)
|
2012-09-25 |
2017-09-05 |
Malwarebytes Corporation |
Preventing the successful exploitation of software application vulnerability for malicious purposes
|
US9154520B1
(en)
*
|
2012-11-27 |
2015-10-06 |
Symantec Corporation |
Systems and methods for notifying users of endpoint devices about blocked downloads
|
MY188366A
(en)
*
|
2012-12-05 |
2021-12-06 |
Mimos Berhad |
A system and method for establishing trustworthiness of an application
|
US9117054B2
(en)
|
2012-12-21 |
2015-08-25 |
Websense, Inc. |
Method and aparatus for presence based resource management
|
US10572665B2
(en)
|
2012-12-28 |
2020-02-25 |
Fireeye, Inc. |
System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
|
US9195829B1
(en)
|
2013-02-23 |
2015-11-24 |
Fireeye, Inc. |
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
|
US9626509B1
(en)
|
2013-03-13 |
2017-04-18 |
Fireeye, Inc. |
Malicious content analysis with multi-version application support within single operating environment
|
US9104867B1
(en)
|
2013-03-13 |
2015-08-11 |
Fireeye, Inc. |
Malicious content analysis using simulated user interaction without user involvement
|
US9311479B1
(en)
|
2013-03-14 |
2016-04-12 |
Fireeye, Inc. |
Correlation and consolidation of analytic data for holistic view of a malware attack
|
WO2014142986A1
(en)
*
|
2013-03-15 |
2014-09-18 |
Mcafee, Inc. |
Server-assisted anti-malware client
|
WO2014143000A1
(en)
|
2013-03-15 |
2014-09-18 |
Mcafee, Inc. |
Server-assisted anti-malware
|
WO2014145805A1
(en)
|
2013-03-15 |
2014-09-18 |
Mandiant, Llc |
System and method employing structured intelligence to verify and contain threats at endpoints
|
US9143519B2
(en)
|
2013-03-15 |
2015-09-22 |
Mcafee, Inc. |
Remote malware remediation
|
US10713358B2
(en)
|
2013-03-15 |
2020-07-14 |
Fireeye, Inc. |
System and method to extract and utilize disassembly features to classify software intent
|
US9495180B2
(en)
|
2013-05-10 |
2016-11-15 |
Fireeye, Inc. |
Optimized resource allocation for virtual machines within a malware content detection system
|
US9635039B1
(en)
|
2013-05-13 |
2017-04-25 |
Fireeye, Inc. |
Classifying sets of malicious indicators for detecting command and control communications associated with malware
|
US9300686B2
(en)
|
2013-06-28 |
2016-03-29 |
Fireeye, Inc. |
System and method for detecting malicious links in electronic messages
|
US9477934B2
(en)
*
|
2013-07-16 |
2016-10-25 |
Sap Portals Israel Ltd. |
Enterprise collaboration content governance framework
|
US9171160B2
(en)
|
2013-09-30 |
2015-10-27 |
Fireeye, Inc. |
Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
|
US10515214B1
(en)
|
2013-09-30 |
2019-12-24 |
Fireeye, Inc. |
System and method for classifying malware within content created during analysis of a specimen
|
US9628507B2
(en)
|
2013-09-30 |
2017-04-18 |
Fireeye, Inc. |
Advanced persistent threat (APT) detection center
|
US9690936B1
(en)
|
2013-09-30 |
2017-06-27 |
Fireeye, Inc. |
Multistage system and method for analyzing obfuscated content for malware
|
US9736179B2
(en)
|
2013-09-30 |
2017-08-15 |
Fireeye, Inc. |
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
|
US9747446B1
(en)
|
2013-12-26 |
2017-08-29 |
Fireeye, Inc. |
System and method for run-time object classification
|
US9756074B2
(en)
|
2013-12-26 |
2017-09-05 |
Fireeye, Inc. |
System and method for IPS and VM-based detection of suspicious objects
|
US9292686B2
(en)
|
2014-01-16 |
2016-03-22 |
Fireeye, Inc. |
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
|
US9450968B2
(en)
|
2014-01-17 |
2016-09-20 |
Microsoft Technology Licensing, Llc |
Media stream trust display
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US10242185B1
(en)
|
2014-03-21 |
2019-03-26 |
Fireeye, Inc. |
Dynamic guest image creation and rollback
|
US9591015B1
(en)
|
2014-03-28 |
2017-03-07 |
Fireeye, Inc. |
System and method for offloading packet processing and static analysis operations
|
US9223972B1
(en)
|
2014-03-31 |
2015-12-29 |
Fireeye, Inc. |
Dynamically remote tuning of a malware content detection system
|
US10084813B2
(en)
|
2014-06-24 |
2018-09-25 |
Fireeye, Inc. |
Intrusion prevention and remedy system
|
US10805340B1
(en)
|
2014-06-26 |
2020-10-13 |
Fireeye, Inc. |
Infection vector and malware tracking with an interactive user display
|
US9398028B1
(en)
|
2014-06-26 |
2016-07-19 |
Fireeye, Inc. |
System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
|
US10002252B2
(en)
|
2014-07-01 |
2018-06-19 |
Fireeye, Inc. |
Verification of trusted threat-aware microvisor
|
US11507663B2
(en)
|
2014-08-11 |
2022-11-22 |
Sentinel Labs Israel Ltd. |
Method of remediating operations performed by a program and system thereof
|
US10102374B1
(en)
|
2014-08-11 |
2018-10-16 |
Sentinel Labs Israel Ltd. |
Method of remediating a program and system thereof by undoing operations
|
US9710648B2
(en)
|
2014-08-11 |
2017-07-18 |
Sentinel Labs Israel Ltd. |
Method of malware detection and system thereof
|
US9363280B1
(en)
|
2014-08-22 |
2016-06-07 |
Fireeye, Inc. |
System and method of detecting delivery of malware using cross-customer data
|
US10671726B1
(en)
|
2014-09-22 |
2020-06-02 |
Fireeye Inc. |
System and method for malware analysis using thread-level event monitoring
|
US10027689B1
(en)
|
2014-09-29 |
2018-07-17 |
Fireeye, Inc. |
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
|
JP6144848B2
(ja)
*
|
2014-10-14 |
2017-06-07 |
日本電信電話株式会社 |
解析装置、解析方法、および、解析プログラム
|
US9529994B2
(en)
*
|
2014-11-24 |
2016-12-27 |
Shape Security, Inc. |
Call stack integrity check on client/server systems
|
US9690933B1
(en)
|
2014-12-22 |
2017-06-27 |
Fireeye, Inc. |
Framework for classifying an object as malicious with machine learning for deploying updated predictive models
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US9838417B1
(en)
|
2014-12-30 |
2017-12-05 |
Fireeye, Inc. |
Intelligent context aware user interaction for malware detection
|
CN105991746A
(zh)
*
|
2015-03-04 |
2016-10-05 |
腾讯科技(深圳)有限公司 |
一种下载文件的方法及装置
|
US10148693B2
(en)
|
2015-03-25 |
2018-12-04 |
Fireeye, Inc. |
Exploit detection system
|
US10417031B2
(en)
|
2015-03-31 |
2019-09-17 |
Fireeye, Inc. |
Selective virtualization for security threat detection
|
US10474813B1
(en)
|
2015-03-31 |
2019-11-12 |
Fireeye, Inc. |
Code injection technique for remediation at an endpoint of a network
|
US9654485B1
(en)
|
2015-04-13 |
2017-05-16 |
Fireeye, Inc. |
Analytics-based security monitoring system and method
|
CA2982463C
(en)
*
|
2015-05-01 |
2019-03-05 |
Lookout, Inc. |
Determining source of side-loaded software
|
US10642753B1
(en)
|
2015-06-30 |
2020-05-05 |
Fireeye, Inc. |
System and method for protecting a software component running in virtual machine using a virtualization layer
|
US11113086B1
(en)
|
2015-06-30 |
2021-09-07 |
Fireeye, Inc. |
Virtual system and method for securing external network connectivity
|
US10454950B1
(en)
|
2015-06-30 |
2019-10-22 |
Fireeye, Inc. |
Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
|
US10726127B1
(en)
|
2015-06-30 |
2020-07-28 |
Fireeye, Inc. |
System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
|
US10715542B1
(en)
|
2015-08-14 |
2020-07-14 |
Fireeye, Inc. |
Mobile application risk analysis
|
US10033747B1
(en)
|
2015-09-29 |
2018-07-24 |
Fireeye, Inc. |
System and method for detecting interpreter-based exploit attacks
|
US10210329B1
(en)
|
2015-09-30 |
2019-02-19 |
Fireeye, Inc. |
Method to detect application execution hijacking using memory protection
|
US10601865B1
(en)
|
2015-09-30 |
2020-03-24 |
Fireeye, Inc. |
Detection of credential spearphishing attacks using email analysis
|
US10706149B1
(en)
|
2015-09-30 |
2020-07-07 |
Fireeye, Inc. |
Detecting delayed activation malware using a primary controller and plural time controllers
|
US10817606B1
(en)
|
2015-09-30 |
2020-10-27 |
Fireeye, Inc. |
Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
|
US9825989B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Cyber attack early warning system
|
US10284575B2
(en)
|
2015-11-10 |
2019-05-07 |
Fireeye, Inc. |
Launcher for setting analysis environment variations for malware detection
|
US9867021B1
(en)
|
2015-12-02 |
2018-01-09 |
Hopgrade, Inc. |
Specially programmed computing devices being continuously configured to allow unfamiliar individuals to have instantaneous real-time meetings to create a new marketplace for goods and/or services
|
US10447728B1
(en)
|
2015-12-10 |
2019-10-15 |
Fireeye, Inc. |
Technique for protecting guest processes using a layered virtualization architecture
|
US10846117B1
(en)
|
2015-12-10 |
2020-11-24 |
Fireeye, Inc. |
Technique for establishing secure communication between host and guest processes of a virtualization architecture
|
US10108446B1
(en)
|
2015-12-11 |
2018-10-23 |
Fireeye, Inc. |
Late load technique for deploying a virtualization layer underneath a running operating system
|
US10133866B1
(en)
|
2015-12-30 |
2018-11-20 |
Fireeye, Inc. |
System and method for triggering analysis of an object for malware in response to modification of that object
|
US10050998B1
(en)
|
2015-12-30 |
2018-08-14 |
Fireeye, Inc. |
Malicious message analysis system
|
US10621338B1
(en)
|
2015-12-30 |
2020-04-14 |
Fireeye, Inc. |
Method to detect forgery and exploits using last branch recording registers
|
US10565378B1
(en)
|
2015-12-30 |
2020-02-18 |
Fireeye, Inc. |
Exploit of privilege detection framework
|
US11552986B1
(en)
|
2015-12-31 |
2023-01-10 |
Fireeye Security Holdings Us Llc |
Cyber-security framework for application of virtual features
|
US10581874B1
(en)
|
2015-12-31 |
2020-03-03 |
Fireeye, Inc. |
Malware detection system with contextual analysis
|
CN105633921B
(zh)
*
|
2016-01-19 |
2017-11-28 |
河南理工大学 |
基于量子通信的35kV供电系统继电保护定值设置方法
|
US10476894B2
(en)
|
2016-02-17 |
2019-11-12 |
Sophos Limited |
Evaluating installers and installer payloads
|
US10785255B1
(en)
|
2016-03-25 |
2020-09-22 |
Fireeye, Inc. |
Cluster configuration within a scalable malware detection system
|
US10476906B1
(en)
|
2016-03-25 |
2019-11-12 |
Fireeye, Inc. |
System and method for managing formation and modification of a cluster within a malware detection system
|
US10601863B1
(en)
|
2016-03-25 |
2020-03-24 |
Fireeye, Inc. |
System and method for managing sensor enrollment
|
US10671721B1
(en)
|
2016-03-25 |
2020-06-02 |
Fireeye, Inc. |
Timeout management services
|
US10826933B1
(en)
|
2016-03-31 |
2020-11-03 |
Fireeye, Inc. |
Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
|
US10893059B1
(en)
|
2016-03-31 |
2021-01-12 |
Fireeye, Inc. |
Verification and enhancement using detection systems located at the network periphery and endpoint devices
|
EP3443432A4
(en)
|
2016-04-12 |
2020-04-01 |
Guardknox Cyber Technologies Ltd. |
SPECIALLY PROGRAMMED COMPUTER SYSTEMS WITH ASSOCIATED DEVICES CONFIGURED TO IMPLEMENT SECURE LOCKINGS AND METHODS OF USING THEM
|
US10169585B1
(en)
|
2016-06-22 |
2019-01-01 |
Fireeye, Inc. |
System and methods for advanced malware detection through placement of transition events
|
US10462173B1
(en)
|
2016-06-30 |
2019-10-29 |
Fireeye, Inc. |
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
|
US10592678B1
(en)
|
2016-09-09 |
2020-03-17 |
Fireeye, Inc. |
Secure communications between peers using a verified virtual trusted platform module
|
US10491627B1
(en)
|
2016-09-29 |
2019-11-26 |
Fireeye, Inc. |
Advanced malware detection using similarity analysis
|
US10795991B1
(en)
|
2016-11-08 |
2020-10-06 |
Fireeye, Inc. |
Enterprise search
|
US10587647B1
(en)
|
2016-11-22 |
2020-03-10 |
Fireeye, Inc. |
Technique for malware detection capability comparison of network security devices
|
US11616812B2
(en)
|
2016-12-19 |
2023-03-28 |
Attivo Networks Inc. |
Deceiving attackers accessing active directory data
|
US11695800B2
(en)
|
2016-12-19 |
2023-07-04 |
SentinelOne, Inc. |
Deceiving attackers accessing network data
|
US10581879B1
(en)
|
2016-12-22 |
2020-03-03 |
Fireeye, Inc. |
Enhanced malware detection for generated objects
|
US10552610B1
(en)
|
2016-12-22 |
2020-02-04 |
Fireeye, Inc. |
Adaptive virtual machine snapshot update framework for malware behavioral analysis
|
US10523609B1
(en)
|
2016-12-27 |
2019-12-31 |
Fireeye, Inc. |
Multi-vector malware detection and analysis
|
US10904286B1
(en)
|
2017-03-24 |
2021-01-26 |
Fireeye, Inc. |
Detection of phishing attacks using similarity analysis
|
US10798112B2
(en)
|
2017-03-30 |
2020-10-06 |
Fireeye, Inc. |
Attribute-controlled malware detection
|
US10791138B1
(en)
|
2017-03-30 |
2020-09-29 |
Fireeye, Inc. |
Subscription-based malware detection
|
US10848397B1
(en)
|
2017-03-30 |
2020-11-24 |
Fireeye, Inc. |
System and method for enforcing compliance with subscription requirements for cyber-attack detection service
|
US10902119B1
(en)
|
2017-03-30 |
2021-01-26 |
Fireeye, Inc. |
Data extraction system for malware analysis
|
US10218697B2
(en)
|
2017-06-09 |
2019-02-26 |
Lookout, Inc. |
Use of device risk evaluation to manage access to services
|
US10855700B1
(en)
|
2017-06-29 |
2020-12-01 |
Fireeye, Inc. |
Post-intrusion detection of cyber-attacks during lateral movement within networks
|
US10503904B1
(en)
|
2017-06-29 |
2019-12-10 |
Fireeye, Inc. |
Ransomware detection and mitigation
|
US10601848B1
(en)
|
2017-06-29 |
2020-03-24 |
Fireeye, Inc. |
Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
|
US10893068B1
(en)
|
2017-06-30 |
2021-01-12 |
Fireeye, Inc. |
Ransomware file modification prevention technique
|
JP2020530922A
(ja)
|
2017-08-08 |
2020-10-29 |
センチネル ラボ, インコーポレイテッドSentinel Labs, Inc. |
エッジネットワーキングのエンドポイントを動的にモデリングおよびグループ化する方法、システム、およびデバイス
|
US10873589B2
(en)
|
2017-08-08 |
2020-12-22 |
Sonicwall Inc. |
Real-time prevention of malicious content via dynamic analysis
|
US10747872B1
(en)
|
2017-09-27 |
2020-08-18 |
Fireeye, Inc. |
System and method for preventing malware evasion
|
US10805346B2
(en)
|
2017-10-01 |
2020-10-13 |
Fireeye, Inc. |
Phishing attack detection
|
US11151252B2
(en)
|
2017-10-13 |
2021-10-19 |
Sonicwall Inc. |
Just in time memory analysis for malware detection
|
US11108809B2
(en)
|
2017-10-27 |
2021-08-31 |
Fireeye, Inc. |
System and method for analyzing binary code for malware classification using artificial neural network techniques
|
US10594720B2
(en)
*
|
2017-11-03 |
2020-03-17 |
International Business Machines Corporation |
Exercising security control point (SCP) capabilities on live systems based on internal validation processing
|
US11005860B1
(en)
|
2017-12-28 |
2021-05-11 |
Fireeye, Inc. |
Method and system for efficient cybersecurity analysis of endpoint events
|
US11240275B1
(en)
|
2017-12-28 |
2022-02-01 |
Fireeye Security Holdings Us Llc |
Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
|
US11271955B2
(en)
|
2017-12-28 |
2022-03-08 |
Fireeye Security Holdings Us Llc |
Platform and method for retroactive reclassification employing a cybersecurity-based global data store
|
US10685110B2
(en)
|
2017-12-29 |
2020-06-16 |
Sonicwall Inc. |
Detection of exploitative program code
|
US11347871B2
(en)
*
|
2018-01-16 |
2022-05-31 |
International Business Machines Corporation |
Dynamic cybersecurity protection mechanism for data storage devices
|
US10902122B2
(en)
|
2018-01-31 |
2021-01-26 |
Sonicwall Inc. |
Just in time memory analysis for malware detection
|
US11470115B2
(en)
|
2018-02-09 |
2022-10-11 |
Attivo Networks, Inc. |
Implementing decoys in a network environment
|
US10826931B1
(en)
|
2018-03-29 |
2020-11-03 |
Fireeye, Inc. |
System and method for predicting and mitigating cybersecurity system misconfigurations
|
US11558401B1
(en)
|
2018-03-30 |
2023-01-17 |
Fireeye Security Holdings Us Llc |
Multi-vector malware detection data sharing system for improved detection
|
US10956477B1
(en)
|
2018-03-30 |
2021-03-23 |
Fireeye, Inc. |
System and method for detecting malicious scripts through natural language processing modeling
|
US11003773B1
(en)
|
2018-03-30 |
2021-05-11 |
Fireeye, Inc. |
System and method for automatically generating malware detection rule recommendations
|
US11232201B2
(en)
|
2018-05-14 |
2022-01-25 |
Sonicwall Inc. |
Cloud based just in time memory analysis for malware detection
|
US11314859B1
(en)
|
2018-06-27 |
2022-04-26 |
FireEye Security Holdings, Inc. |
Cyber-security system and method for detecting escalation of privileges within an access token
|
US11075930B1
(en)
|
2018-06-27 |
2021-07-27 |
Fireeye, Inc. |
System and method for detecting repetitive cybersecurity attacks constituting an email campaign
|
US11228491B1
(en)
|
2018-06-28 |
2022-01-18 |
Fireeye Security Holdings Us Llc |
System and method for distributed cluster configuration monitoring and management
|
US11316900B1
(en)
|
2018-06-29 |
2022-04-26 |
FireEye Security Holdings Inc. |
System and method for automatically prioritizing rules for cyber-threat detection and mitigation
|
US11182473B1
(en)
|
2018-09-13 |
2021-11-23 |
Fireeye Security Holdings Us Llc |
System and method for mitigating cyberattacks against processor operability by a guest process
|
US11763004B1
(en)
|
2018-09-27 |
2023-09-19 |
Fireeye Security Holdings Us Llc |
System and method for bootkit detection
|
US11188622B2
(en)
*
|
2018-09-28 |
2021-11-30 |
Daniel Chien |
Systems and methods for computer security
|
US12074887B1
(en)
|
2018-12-21 |
2024-08-27 |
Musarubra Us Llc |
System and method for selectively processing content after identification and removal of malicious content
|
US11368475B1
(en)
|
2018-12-21 |
2022-06-21 |
Fireeye Security Holdings Us Llc |
System and method for scanning remote services to locate stored objects with malware
|
EP3973427A4
(en)
|
2019-05-20 |
2023-06-21 |
Sentinel Labs Israel Ltd. |
SYSTEMS AND METHODS FOR EXECUTABLE CODE DETECTION, AUTOMATIC FEATURE EXTRACTION, AND POSITION-INDEPENDENT CODE DETECTION
|
US11258806B1
(en)
|
2019-06-24 |
2022-02-22 |
Mandiant, Inc. |
System and method for automatically associating cybersecurity intelligence to cyberthreat actors
|
US11556640B1
(en)
|
2019-06-27 |
2023-01-17 |
Mandiant, Inc. |
Systems and methods for automated cybersecurity analysis of extracted binary string sets
|
US11392700B1
(en)
|
2019-06-28 |
2022-07-19 |
Fireeye Security Holdings Us Llc |
System and method for supporting cross-platform data verification
|
US11886585B1
(en)
|
2019-09-27 |
2024-01-30 |
Musarubra Us Llc |
System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
|
US11637862B1
(en)
|
2019-09-30 |
2023-04-25 |
Mandiant, Inc. |
System and method for surfacing cyber-security threats with a self-learning recommendation engine
|
US11677754B2
(en)
|
2019-12-09 |
2023-06-13 |
Daniel Chien |
Access control systems and methods
|
US11509463B2
(en)
|
2020-05-31 |
2022-11-22 |
Daniel Chien |
Timestamp-based shared key generation
|
US11579857B2
(en)
|
2020-12-16 |
2023-02-14 |
Sentinel Labs Israel Ltd. |
Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
|
US11899782B1
(en)
|
2021-07-13 |
2024-02-13 |
SentinelOne, Inc. |
Preserving DLL hooks
|