US4223380A
(en)
|
1978-04-06 |
1980-09-16 |
Ncr Corporation |
Distributed multiprocessor communication system
|
JPS55112651A
(en)
|
1979-02-21 |
1980-08-30 |
Fujitsu Ltd |
Virtual computer system
|
US4672609A
(en)
|
1982-01-19 |
1987-06-09 |
Tandem Computers Incorporated |
Memory system with operation error detection
|
US4773028A
(en)
|
1984-10-01 |
1988-09-20 |
Tektronix, Inc. |
Method and apparatus for improved monitoring and detection of improper device operation
|
US4819234A
(en)
|
1987-05-01 |
1989-04-04 |
Prime Computer, Inc. |
Operating system debugger
|
CA1314101C
(en)
|
1988-02-17 |
1993-03-02 |
Henry Shao-Lin Teng |
Expert system for security inspection of a digital computer system in a network environment
|
US5121345A
(en)
|
1988-11-03 |
1992-06-09 |
Lentz Stephen A |
System and method for protecting integrity of computer data and software
|
US4975950A
(en)
|
1988-11-03 |
1990-12-04 |
Lentz Stephen A |
System and method of protecting integrity of computer data and software
|
US5347450A
(en)
|
1989-01-18 |
1994-09-13 |
Intel Corporation |
Message routing in a multiprocessor computer system
|
US5353393A
(en)
|
1989-06-14 |
1994-10-04 |
Sunwest Trading Corporation |
Apparatus and method for manipulating scanned documents in a computer aided design system
|
US5347579A
(en)
|
1989-07-05 |
1994-09-13 |
Blandford Robert R |
Personal computer diary
|
US5204966A
(en)
|
1990-03-09 |
1993-04-20 |
Digital Equipment Corporation |
System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords
|
EP0449242A3
(en)
*
|
1990-03-28 |
1992-10-28 |
National Semiconductor Corporation |
Method and structure for providing computer security and virus prevention
|
US5032979A
(en)
|
1990-06-22 |
1991-07-16 |
International Business Machines Corporation |
Distributed security auditing subsystem for an operating system
|
US5210704A
(en)
|
1990-10-02 |
1993-05-11 |
Technology International Incorporated |
System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment
|
JPH04310188A
(ja)
|
1991-03-01 |
1992-11-02 |
Internatl Business Mach Corp <Ibm> |
文書/画像ライブラリのためのライブラリサービス方法
|
US5274824A
(en)
|
1991-03-01 |
1993-12-28 |
Bull Hn Information Systems Inc. |
Keyring metaphor for user's security keys on a distributed multiprocess data system
|
EP0510244A1
(de)
|
1991-04-22 |
1992-10-28 |
Acer Incorporated |
Verfahren und Anordnung zum Schutz eines Computers gegen Computerviren
|
US5774727A
(en)
|
1991-06-27 |
1998-06-30 |
Digital Equipment Corporation |
Parallel processing system for virtual processor implementation of machine-language instructions
|
US5577209A
(en)
|
1991-07-11 |
1996-11-19 |
Itt Corporation |
Apparatus and method for providing multi-level security for communication among computers and terminals on a network
|
US5309562A
(en)
|
1991-08-19 |
1994-05-03 |
Multi-Tech Systems, Inc. |
Method and apparatus for establishing protocol spoofing from a modem
|
US5454074A
(en)
|
1991-09-18 |
1995-09-26 |
The Boeing Company |
Electronic checklist system
|
US5649095A
(en)
|
1992-03-30 |
1997-07-15 |
Cozza; Paul D. |
Method and apparatus for detecting computer viruses through the use of a scan information cache
|
US5278901A
(en)
*
|
1992-04-30 |
1994-01-11 |
International Business Machines Corporation |
Pattern-oriented intrusion-detection system and method
|
US5311593A
(en)
|
1992-05-13 |
1994-05-10 |
Chipcom Corporation |
Security system for a network concentrator
|
JP3483583B2
(ja)
*
|
1992-05-25 |
2004-01-06 |
株式会社東芝 |
不正ユーザアクセス防止システム
|
US5359659A
(en)
|
1992-06-19 |
1994-10-25 |
Doren Rosenthal |
Method for securing software against corruption by computer viruses
|
US5371852A
(en)
|
1992-10-14 |
1994-12-06 |
International Business Machines Corporation |
Method and apparatus for making a cluster of computers appear as a single host on a network
|
JP3171962B2
(ja)
*
|
1992-11-04 |
2001-06-04 |
富士通株式会社 |
ポリシング・ユーザ・インタフェース方式
|
US5345595A
(en)
*
|
1992-11-12 |
1994-09-06 |
Coral Systems, Inc. |
Apparatus and method for detecting fraudulent telecommunication activity
|
JP2501771B2
(ja)
|
1993-01-19 |
1996-05-29 |
インターナショナル・ビジネス・マシーンズ・コーポレイション |
不所望のソフトウェア・エンティティの複数の有効なシグネチャを得る方法及び装置
|
US5440723A
(en)
|
1993-01-19 |
1995-08-08 |
International Business Machines Corporation |
Automatic immune system for computers and computer networks
|
US5586260A
(en)
|
1993-02-12 |
1996-12-17 |
Digital Equipment Corporation |
Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
|
GB9303527D0
(en)
|
1993-02-22 |
1993-04-07 |
Hewlett Packard Ltd |
Network analysis method
|
JP2823698B2
(ja)
|
1993-02-23 |
1998-11-11 |
ブリテイッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー |
事象相関
|
TW225623B
(en)
*
|
1993-03-31 |
1994-06-21 |
American Telephone & Telegraph |
Real-time fraud monitoring system
|
US5630061A
(en)
|
1993-04-19 |
1997-05-13 |
International Business Machines Corporation |
System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes
|
US5398196A
(en)
|
1993-07-29 |
1995-03-14 |
Chambers; David A. |
Method and apparatus for detection of computer viruses
|
KR100195076B1
(ko)
*
|
1993-09-16 |
1999-06-15 |
윤종용 |
용융탄산염 연료전지용 양전극의 제조방법
|
US5414833A
(en)
*
|
1993-10-27 |
1995-05-09 |
International Business Machines Corporation |
Network security system and method using a parallel finite state machine adaptive active monitor and responder
|
US5606668A
(en)
|
1993-12-15 |
1997-02-25 |
Checkpoint Software Technologies Ltd. |
System for securing inbound and outbound data packet flow in a computer network
|
US5835726A
(en)
|
1993-12-15 |
1998-11-10 |
Check Point Software Technologies Ltd. |
System for securing the flow of and selectively modifying packets in a computer network
|
US5515508A
(en)
|
1993-12-17 |
1996-05-07 |
Taligent, Inc. |
Client server system and method of operation including a dynamically configurable protocol stack
|
US5974457A
(en)
|
1993-12-23 |
1999-10-26 |
International Business Machines Corporation |
Intelligent realtime monitoring of data traffic
|
US5557742A
(en)
|
1994-03-07 |
1996-09-17 |
Haystack Labs, Inc. |
Method and system for detecting intrusion into and misuse of a data processing system
|
US5522026A
(en)
|
1994-03-18 |
1996-05-28 |
The Boeing Company |
System for creating a single electronic checklist in response to multiple faults
|
US5675711A
(en)
|
1994-05-13 |
1997-10-07 |
International Business Machines Corporation |
Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses
|
ATE183592T1
(de)
|
1994-06-01 |
1999-09-15 |
Quantum Leap Innovations Inc |
Computervirenfalle
|
US5999711A
(en)
|
1994-07-18 |
1999-12-07 |
Microsoft Corporation |
Method and system for providing certificates holding authentication and authorization information for users/machines
|
US6006016A
(en)
|
1994-11-10 |
1999-12-21 |
Bay Networks, Inc. |
Network fault correlation
|
US5623601A
(en)
|
1994-11-18 |
1997-04-22 |
Milkway Networks Corporation |
Apparatus and method for providing a secure gateway for communication and data exchanges between networks
|
US5764890A
(en)
|
1994-12-13 |
1998-06-09 |
Microsoft Corporation |
Method and system for adding a secure network server to an existing computer network
|
CA2138302C
(en)
|
1994-12-15 |
1999-05-25 |
Michael S. Fortinsky |
Provision of secure access to external resources from a distributed computing environment
|
US5590331A
(en)
|
1994-12-23 |
1996-12-31 |
Sun Microsystems, Inc. |
Method and apparatus for generating platform-standard object files containing machine-independent code
|
JPH08242229A
(ja)
|
1995-03-01 |
1996-09-17 |
Fujitsu Ltd |
ネットワーク監視における状態整合処理システム
|
US5696486A
(en)
|
1995-03-29 |
1997-12-09 |
Cabletron Systems, Inc. |
Method and apparatus for policy-based alarm notification in a distributed network management environment
|
US5907602A
(en)
*
|
1995-03-30 |
1999-05-25 |
British Telecommunications Public Limited Company |
Detecting possible fraudulent communication usage
|
US5749066A
(en)
|
1995-04-24 |
1998-05-05 |
Ericsson Messaging Systems Inc. |
Method and apparatus for developing a neural network for phoneme recognition
|
US5734697A
(en)
|
1995-04-28 |
1998-03-31 |
Mci Corporation |
Method and apparatus for improving telecommunications system performance
|
US5790799A
(en)
|
1995-05-17 |
1998-08-04 |
Digital Equipment Corporation |
System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code
|
US6061795A
(en)
|
1995-07-31 |
2000-05-09 |
Pinnacle Technology Inc. |
Network desktop management security system and method
|
US6477585B1
(en)
|
1995-08-18 |
2002-11-05 |
International Business Machines Corporation |
Filter mechanism for an event management service
|
US6144961A
(en)
|
1995-08-31 |
2000-11-07 |
Compuware Corporation |
Method and system for non-intrusive measurement of transaction response times on a network
|
US5878420A
(en)
|
1995-08-31 |
1999-03-02 |
Compuware Corporation |
Network monitoring and management system
|
US5623600A
(en)
|
1995-09-26 |
1997-04-22 |
Trend Micro, Incorporated |
Virus detection and removal apparatus for computer networks
|
US5765030A
(en)
|
1996-07-19 |
1998-06-09 |
Symantec Corp |
Processor emulator module having a variable pre-fetch queue size for program execution
|
US6067410A
(en)
|
1996-02-09 |
2000-05-23 |
Symantec Corporation |
Emulation repair system
|
US5696822A
(en)
|
1995-09-28 |
1997-12-09 |
Symantec Corporation |
Polymorphic virus detection module
|
US5826013A
(en)
|
1995-09-28 |
1998-10-20 |
Symantec Corporation |
Polymorphic virus detection module
|
US5854916A
(en)
|
1995-09-28 |
1998-12-29 |
Symantec Corporation |
State-based cache for antivirus software
|
US5745692A
(en)
|
1995-10-23 |
1998-04-28 |
Ncr Corporation |
Automated systems administration of remote computer servers
|
JPH09128336A
(ja)
*
|
1995-11-06 |
1997-05-16 |
Hitachi Ltd |
ネットワークセキュリティシステム
|
US5832211A
(en)
|
1995-11-13 |
1998-11-03 |
International Business Machines Corporation |
Propagating plain-text passwords from a main registry to a plurality of foreign registries
|
US5838903A
(en)
|
1995-11-13 |
1998-11-17 |
International Business Machines Corporation |
Configurable password integrity servers for use in a shared resource environment
|
US5764887A
(en)
|
1995-12-11 |
1998-06-09 |
International Business Machines Corporation |
System and method for supporting distributed computing mechanisms in a local area network server environment
|
GB9526129D0
(en)
|
1995-12-21 |
1996-02-21 |
Philips Electronics Nv |
Machine code format translation
|
JP3165366B2
(ja)
|
1996-02-08 |
2001-05-14 |
株式会社日立製作所 |
ネットワークセキュリティシステム
|
JPH09214493A
(ja)
|
1996-02-08 |
1997-08-15 |
Hitachi Ltd |
ネットワークシステム
|
US5761504A
(en)
|
1996-02-16 |
1998-06-02 |
Motorola, Inc. |
Method for updating a software code in a communication system
|
US5950012A
(en)
|
1996-03-08 |
1999-09-07 |
Texas Instruments Incorporated |
Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes
|
US5964839A
(en)
|
1996-03-29 |
1999-10-12 |
At&T Corp |
System and method for monitoring information flow and performing data collection
|
US6377994B1
(en)
|
1996-04-15 |
2002-04-23 |
International Business Machines Corporation |
Method and apparatus for controlling server access to a resource in a client/server system
|
US5822517A
(en)
|
1996-04-15 |
1998-10-13 |
Dotan; Eyal |
Method for detecting infection of software programs by memory resident software viruses
|
US6014645A
(en)
|
1996-04-19 |
2000-01-11 |
Block Financial Corporation |
Real-time financial card application system
|
US5881236A
(en)
|
1996-04-26 |
1999-03-09 |
Hewlett-Packard Company |
System for installation of software on a remote computer system over a network using checksums and password protection
|
US6104783A
(en)
|
1996-05-01 |
2000-08-15 |
Instant Alert Security, Llc |
Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems
|
US5884033A
(en)
|
1996-05-15 |
1999-03-16 |
Spyglass, Inc. |
Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
|
US5798706A
(en)
|
1996-06-18 |
1998-08-25 |
Raptor Systems, Inc. |
Detecting unauthorized network communication
|
US5857191A
(en)
|
1996-07-08 |
1999-01-05 |
Gradient Technologies, Inc. |
Web application server with secure common gateway interface
|
US5787177A
(en)
|
1996-08-01 |
1998-07-28 |
Harris Corporation |
Integrated network security access control system
|
US5828833A
(en)
|
1996-08-15 |
1998-10-27 |
Electronic Data Systems Corporation |
Method and system for allowing remote procedure calls through a network firewall
|
US5864665A
(en)
|
1996-08-20 |
1999-01-26 |
International Business Machines Corporation |
Auditing login activity in a distributed computing environment
|
US5832208A
(en)
|
1996-09-05 |
1998-11-03 |
Cheyenne Software International Sales Corp. |
Anti-virus agent for use with databases and mail servers
|
US5845067A
(en)
|
1996-09-09 |
1998-12-01 |
Porter; Jack Edward |
Method and apparatus for document management utilizing a messaging system
|
US5892903A
(en)
|
1996-09-12 |
1999-04-06 |
Internet Security Systems, Inc. |
Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
|
US5983350A
(en)
|
1996-09-18 |
1999-11-09 |
Secure Computing Corporation |
Secure firewall supporting different levels of authentication based on address or encryption status
|
US5899999A
(en)
|
1996-10-16 |
1999-05-04 |
Microsoft Corporation |
Iterative convolution filter particularly suited for use in an image classification and retrieval system
|
US6453345B2
(en)
*
|
1996-11-06 |
2002-09-17 |
Datadirect Networks, Inc. |
Network security and surveillance system
|
US5991881A
(en)
*
|
1996-11-08 |
1999-11-23 |
Harris Corporation |
Network surveillance system
|
US6167520A
(en)
|
1996-11-08 |
2000-12-26 |
Finjan Software, Inc. |
System and method for protecting a client during runtime from hostile downloadables
|
US6154844A
(en)
|
1996-11-08 |
2000-11-28 |
Finjan Software, Ltd. |
System and method for attaching a downloadable security profile to a downloadable
|
US5796942A
(en)
|
1996-11-21 |
1998-08-18 |
Computer Associates International, Inc. |
Method and apparatus for automated network-wide surveillance and security breach intervention
|
US5848233A
(en)
|
1996-12-09 |
1998-12-08 |
Sun Microsystems, Inc. |
Method and apparatus for dynamic packet filter assignment
|
US5974237A
(en)
|
1996-12-18 |
1999-10-26 |
Northern Telecom Limited |
Communications network monitoring
|
US5987611A
(en)
|
1996-12-31 |
1999-11-16 |
Zone Labs, Inc. |
System and methodology for managing internet access on a per application basis for client computers connected to the internet
|
US5875296A
(en)
|
1997-01-28 |
1999-02-23 |
International Business Machines Corporation |
Distributed file system web server user authentication with cookies
|
JP3737594B2
(ja)
*
|
1997-01-28 |
2006-01-18 |
株式会社日立コミュニケーションテクノロジー |
ネットワーク管理システム、セキュリティ管理装置およびセキュリティ管理方法
|
US5983270A
(en)
|
1997-03-11 |
1999-11-09 |
Sequel Technology Corporation |
Method and apparatus for managing internetwork and intranetwork activity
|
US6085224A
(en)
|
1997-03-11 |
2000-07-04 |
Intracept, Inc. |
Method and system for responding to hidden data and programs in a datastream
|
US5925126A
(en)
|
1997-03-18 |
1999-07-20 |
Memco Software, Ltd. |
Method for security shield implementation in computer system's software
|
US5987606A
(en)
|
1997-03-19 |
1999-11-16 |
Bascom Global Internet Services, Inc. |
Method and system for content filtering information retrieved from an internet computer network
|
US6477648B1
(en)
|
1997-03-23 |
2002-11-05 |
Novell, Inc. |
Trusted workstation in a networked client/server computing system
|
US5893091A
(en)
*
|
1997-04-11 |
1999-04-06 |
Immediata Corporation |
Multicasting with key words
|
US5964889A
(en)
|
1997-04-16 |
1999-10-12 |
Symantec Corporation |
Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator
|
JP3028783B2
(ja)
|
1997-04-25 |
2000-04-04 |
日本電気株式会社 |
ネットワークの監視方法と装置
|
US6314525B1
(en)
|
1997-05-13 |
2001-11-06 |
3Com Corporation |
Means for allowing two or more network interface controller cards to appear as one card to an operating system
|
US5922051A
(en)
*
|
1997-05-14 |
1999-07-13 |
Ncr Corporation |
System and method for traffic management in a network management system
|
US6119234A
(en)
|
1997-06-27 |
2000-09-12 |
Sun Microsystems, Inc. |
Method and apparatus for client-host communication over a computer network
|
US6073172A
(en)
|
1997-07-14 |
2000-06-06 |
Freegate Corporation |
Initializing and reconfiguring a secure network interface
|
KR19990011713A
(ko)
|
1997-07-25 |
1999-02-18 |
윤종용 |
시나리오형 사용자 인터페이스에 의한 문자 정보 전송
|
DE69823116D1
(de)
|
1997-08-05 |
2004-05-19 |
Canon Kk |
Bildverarbeitungsverfahren und -gerät
|
US5919257A
(en)
|
1997-08-08 |
1999-07-06 |
Novell, Inc. |
Networked workstation intrusion detection system
|
US5978917A
(en)
|
1997-08-14 |
1999-11-02 |
Symantec Corporation |
Detection and elimination of macro viruses
|
US6275938B1
(en)
|
1997-08-28 |
2001-08-14 |
Microsoft Corporation |
Security enhancement for untrusted executable code
|
US6009467A
(en)
|
1997-08-29 |
1999-12-28 |
International Business Machines Corporation |
System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions
|
US6016553A
(en)
|
1997-09-05 |
2000-01-18 |
Wild File, Inc. |
Method, software and apparatus for saving, using and recovering data
|
US6321337B1
(en)
|
1997-09-09 |
2001-11-20 |
Sanctum Ltd. |
Method and system for protecting operations of trusted internal networks
|
US5983348A
(en)
|
1997-09-10 |
1999-11-09 |
Trend Micro Incorporated |
Computer network malicious code scanner
|
US5961644A
(en)
|
1997-09-19 |
1999-10-05 |
International Business Machines Corporation |
Method and apparatus for testing the integrity of computer security alarm systems
|
US6357008B1
(en)
|
1997-09-23 |
2002-03-12 |
Symantec Corporation |
Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
|
US5991856A
(en)
|
1997-09-30 |
1999-11-23 |
Network Associates, Inc. |
System and method for computer operating system protection
|
US6003132A
(en)
|
1997-10-22 |
1999-12-14 |
Rvt Technologies, Inc. |
Method and apparatus for isolating a computer system upon detection of viruses and similar data
|
US6081894A
(en)
|
1997-10-22 |
2000-06-27 |
Rvt Technologies, Inc. |
Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
|
US6035323A
(en)
|
1997-10-24 |
2000-03-07 |
Pictra, Inc. |
Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media
|
US6041347A
(en)
|
1997-10-24 |
2000-03-21 |
Unified Access Communications |
Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
|
US6463426B1
(en)
|
1997-10-27 |
2002-10-08 |
Massachusetts Institute Of Technology |
Information search and retrieval system
|
US6070244A
(en)
|
1997-11-10 |
2000-05-30 |
The Chase Manhattan Bank |
Computer network security management system
|
US6119165A
(en)
|
1997-11-17 |
2000-09-12 |
Trend Micro, Inc. |
Controlled distribution of application programs in a computer network
|
US6108799A
(en)
|
1997-11-21 |
2000-08-22 |
International Business Machines Corporation |
Automated sample creation of polymorphic and non-polymorphic marcro viruses
|
US6094731A
(en)
|
1997-11-24 |
2000-07-25 |
Symantec Corporation |
Antivirus accelerator for computer networks
|
US6026442A
(en)
*
|
1997-11-24 |
2000-02-15 |
Cabletron Systems, Inc. |
Method and apparatus for surveillance in communications networks
|
US6021510A
(en)
|
1997-11-24 |
2000-02-01 |
Symantec Corporation |
Antivirus accelerator
|
US6118940A
(en)
|
1997-11-25 |
2000-09-12 |
International Business Machines Corp. |
Method and apparatus for benchmarking byte code sequences
|
IL122314A
(en)
|
1997-11-27 |
2001-03-19 |
Security 7 Software Ltd |
Method and system for enforcing a communication security policy
|
US6052709A
(en)
|
1997-12-23 |
2000-04-18 |
Bright Light Technologies, Inc. |
Apparatus and method for controlling delivery of unsolicited electronic mail
|
US6088803A
(en)
|
1997-12-30 |
2000-07-11 |
Intel Corporation |
System for virus-checking network data during download to a client device
|
US6029256A
(en)
|
1997-12-31 |
2000-02-22 |
Network Associates, Inc. |
Method and system for allowing computer programs easy access to features of a virus scanning engine
|
US6035423A
(en)
|
1997-12-31 |
2000-03-07 |
Network Associates, Inc. |
Method and system for providing automated updating and upgrading of antivirus applications using a computer network
|
US6088804A
(en)
|
1998-01-12 |
2000-07-11 |
Motorola, Inc. |
Adaptive system and method for responding to computer network security attacks
|
US6122738A
(en)
|
1998-01-22 |
2000-09-19 |
Symantec Corporation |
Computer file integrity verification
|
US5987610A
(en)
|
1998-02-12 |
1999-11-16 |
Ameritech Corporation |
Computer virus screening methods and systems
|
US6279113B1
(en)
|
1998-03-16 |
2001-08-21 |
Internet Tools, Inc. |
Dynamic signature inspection-based network intrusion detection
|
US6195687B1
(en)
|
1998-03-18 |
2001-02-27 |
Netschools Corporation |
Method and apparatus for master-slave control in a educational classroom communication network
|
US6628824B1
(en)
|
1998-03-20 |
2003-09-30 |
Ken Belanger |
Method and apparatus for image identification and comparison
|
US6725378B1
(en)
*
|
1998-04-15 |
2004-04-20 |
Purdue Research Foundation |
Network protection for denial of service attacks
|
US6161109A
(en)
|
1998-04-16 |
2000-12-12 |
International Business Machines Corporation |
Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy
|
US6298445B1
(en)
|
1998-04-30 |
2001-10-02 |
Netect, Ltd. |
Computer security
|
US6408391B1
(en)
|
1998-05-06 |
2002-06-18 |
Prc Inc. |
Dynamic system defense for information warfare
|
US6070190A
(en)
|
1998-05-11 |
2000-05-30 |
International Business Machines Corporation |
Client-based application availability and response monitoring and reporting for distributed computing environments
|
US6173413B1
(en)
|
1998-05-12 |
2001-01-09 |
Sun Microsystems, Inc. |
Mechanism for maintaining constant permissions for multiple instances of a device within a cluster
|
US6397242B1
(en)
|
1998-05-15 |
2002-05-28 |
Vmware, Inc. |
Virtualization system including a virtual machine monitor for a computer with a segmented architecture
|
US6275942B1
(en)
|
1998-05-20 |
2001-08-14 |
Network Associates, Inc. |
System, method and computer program product for automatic response to computer system misuse using active response modules
|
US6347374B1
(en)
|
1998-06-05 |
2002-02-12 |
Intrusion.Com, Inc. |
Event detection
|
WO1999067713A1
(en)
|
1998-06-22 |
1999-12-29 |
Colin Constable |
Virtual data storage (vds) system
|
US6185689B1
(en)
|
1998-06-24 |
2001-02-06 |
Richard S. Carson & Assoc., Inc. |
Method for network self security assessment
|
US6324656B1
(en)
|
1998-06-30 |
2001-11-27 |
Cisco Technology, Inc. |
System and method for rules-driven multi-phase network vulnerability assessment
|
US6282546B1
(en)
|
1998-06-30 |
2001-08-28 |
Cisco Technology, Inc. |
System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
|
US6661904B1
(en)
|
1998-07-15 |
2003-12-09 |
Personalogo |
Method and system for automated electronic conveyance of hidden data
|
US6453346B1
(en)
|
1998-07-17 |
2002-09-17 |
Proactivenet, Inc. |
Method and apparatus for intelligent storage and reduction of network information
|
US6711127B1
(en)
|
1998-07-31 |
2004-03-23 |
General Dynamics Government Systems Corporation |
System for intrusion detection and vulnerability analysis in a telecommunications signaling network
|
US6429952B1
(en)
|
1998-08-31 |
2002-08-06 |
Sharp Laboratories Of America |
Browser interface to scanner
|
DE69817176T2
(de)
|
1998-09-09 |
2004-06-24 |
International Business Machines Corp. |
Verfahren und Vorrichtung zur Eindringdetektion in Rechnern und Rechnernetzen
|
US6271840B1
(en)
|
1998-09-24 |
2001-08-07 |
James Lee Finseth |
Graphical search engine visual index
|
US6338141B1
(en)
|
1998-09-30 |
2002-01-08 |
Cybersoft, Inc. |
Method and apparatus for computer virus detection, analysis, and removal in real time
|
US6460141B1
(en)
|
1998-10-28 |
2002-10-01 |
Rsa Security Inc. |
Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
|
US6230288B1
(en)
|
1998-10-29 |
2001-05-08 |
Network Associates, Inc. |
Method of treating whitespace during virus detection
|
US6321338B1
(en)
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
US6530024B1
(en)
|
1998-11-20 |
2003-03-04 |
Centrax Corporation |
Adaptive feedback security system and method
|
US6517587B2
(en)
|
1998-12-08 |
2003-02-11 |
Yodlee.Com, Inc. |
Networked architecture for enabling automated gathering of information from Web servers
|
US6266774B1
(en)
|
1998-12-08 |
2001-07-24 |
Mcafee.Com Corporation |
Method and system for securing, managing or optimizing a personal computer
|
US6226372B1
(en)
|
1998-12-11 |
2001-05-01 |
Securelogix Corporation |
Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
|
US6574737B1
(en)
|
1998-12-23 |
2003-06-03 |
Symantec Corporation |
System for penetrating computer or computer network
|
US6499107B1
(en)
|
1998-12-29 |
2002-12-24 |
Cisco Technology, Inc. |
Method and system for adaptive network security using intelligent packet analysis
|
US6415321B1
(en)
|
1998-12-29 |
2002-07-02 |
Cisco Technology, Inc. |
Domain mapping method and system
|
US6301668B1
(en)
*
|
1998-12-29 |
2001-10-09 |
Cisco Technology, Inc. |
Method and system for adaptive network security using network vulnerability assessment
|
US6266773B1
(en)
|
1998-12-31 |
2001-07-24 |
Intel. Corp. |
Computer security system
|
US6205552B1
(en)
|
1998-12-31 |
2001-03-20 |
Mci Worldcom, Inc. |
Method and apparatus for checking security vulnerability of networked devices
|
US6477651B1
(en)
|
1999-01-08 |
2002-11-05 |
Cisco Technology, Inc. |
Intrusion detection system and method having dynamically loaded signatures
|
US6487666B1
(en)
|
1999-01-15 |
2002-11-26 |
Cisco Technology, Inc. |
Intrusion detection signature analysis using regular expressions and logical operators
|
US6578147B1
(en)
|
1999-01-15 |
2003-06-10 |
Cisco Technology, Inc. |
Parallel intrusion detection sensors with load balancing for high speed networks
|
US6438600B1
(en)
|
1999-01-29 |
2002-08-20 |
International Business Machines Corporation |
Securely sharing log-in credentials among trusted browser-based applications
|
US6647139B1
(en)
|
1999-02-18 |
2003-11-11 |
Matsushita Electric Industrial Co., Ltd. |
Method of object recognition, apparatus of the same and recording medium therefor
|
US6510523B1
(en)
|
1999-02-22 |
2003-01-21 |
Sun Microsystems Inc. |
Method and system for providing limited access privileges with an untrusted terminal
|
US6839850B1
(en)
|
1999-03-04 |
2005-01-04 |
Prc, Inc. |
Method and system for detecting intrusion into and misuse of a data processing system
|
US6405318B1
(en)
|
1999-03-12 |
2002-06-11 |
Psionic Software, Inc. |
Intrusion detection system
|
US6725377B1
(en)
|
1999-03-12 |
2004-04-20 |
Networks Associates Technology, Inc. |
Method and system for updating anti-intrusion software
|
US6434615B1
(en)
|
1999-04-30 |
2002-08-13 |
Compaq Information Technologies Group, L.P. |
Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server
|
JP2000322573A
(ja)
|
1999-05-06 |
2000-11-24 |
Canon Inc |
画像処理方法及びその装置
|
US7096499B2
(en)
|
1999-05-11 |
2006-08-22 |
Cylant, Inc. |
Method and system for simplifying the structure of dynamic execution profiles
|
US6681331B1
(en)
|
1999-05-11 |
2004-01-20 |
Cylant, Inc. |
Dynamic software system intrusion detection
|
US6445822B1
(en)
|
1999-06-04 |
2002-09-03 |
Look Dynamics, Inc. |
Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network
|
US6397245B1
(en)
|
1999-06-14 |
2002-05-28 |
Hewlett-Packard Company |
System and method for evaluating the operation of a computer over a computer network
|
US6519647B1
(en)
|
1999-07-23 |
2003-02-11 |
Microsoft Corporation |
Methods and apparatus for synchronizing access control in a web server
|
US6563959B1
(en)
|
1999-07-30 |
2003-05-13 |
Pixlogic Llc |
Perceptual similarity image retrieval method
|
US6691232B1
(en)
|
1999-08-05 |
2004-02-10 |
Sun Microsystems, Inc. |
Security architecture with environment sensitive credential sufficiency evaluation
|
US6647400B1
(en)
|
1999-08-30 |
2003-11-11 |
Symantec Corporation |
System and method for analyzing filesystems to detect intrusions
|
US6324647B1
(en)
|
1999-08-31 |
2001-11-27 |
Michel K. Bowman-Amuah |
System, method and article of manufacture for security management in a development architecture framework
|
US6405364B1
(en)
|
1999-08-31 |
2002-06-11 |
Accenture Llp |
Building techniques in a development architecture framework
|
JP2001092972A
(ja)
|
1999-09-24 |
2001-04-06 |
Mamoru Minami |
画像認識方法
|
US6601190B1
(en)
|
1999-10-28 |
2003-07-29 |
Hewlett-Packard Development Company, L.P. |
Automatic capture and reporting of computer configuration data
|
US6606744B1
(en)
|
1999-11-22 |
2003-08-12 |
Accenture, Llp |
Providing collaborative installation management in a network-based supply chain environment
|
US6584454B1
(en)
|
1999-12-31 |
2003-06-24 |
Ge Medical Technology Services, Inc. |
Method and apparatus for community management in remote system servicing
|
US6535227B1
(en)
|
2000-02-08 |
2003-03-18 |
Harris Corporation |
System and method for assessing the security posture of a network and having a graphical user interface
|
US6792144B1
(en)
|
2000-03-03 |
2004-09-14 |
Koninklijke Philips Electronics N.V. |
System and method for locating an object in an image using models
|
US6775780B1
(en)
|
2000-03-16 |
2004-08-10 |
Networks Associates Technology, Inc. |
Detecting malicious software by analyzing patterns of system calls generated during emulation
|
US20010034847A1
(en)
|
2000-03-27 |
2001-10-25 |
Gaul,Jr. Stephen E. |
Internet/network security method and system for checking security of a client from a remote facility
|
US6519703B1
(en)
|
2000-04-14 |
2003-02-11 |
James B. Joyce |
Methods and apparatus for heuristic firewall
|
US6718383B1
(en)
|
2000-06-02 |
2004-04-06 |
Sun Microsystems, Inc. |
High availability networking with virtual IP address failover
|
US8341743B2
(en)
|
2000-07-14 |
2012-12-25 |
Ca, Inc. |
Detection of viral code using emulation of operating system functions
|
US6353385B1
(en)
|
2000-08-25 |
2002-03-05 |
Hyperon Incorporated |
Method and system for interfacing an intrusion detection system to a central alarm system
|
US7124440B2
(en)
|
2000-09-07 |
2006-10-17 |
Mazu Networks, Inc. |
Monitoring network traffic denial of service attacks
|
US20020032793A1
(en)
|
2000-09-08 |
2002-03-14 |
The Regents Of The University Of Michigan |
Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
|
US20020083331A1
(en)
|
2000-12-21 |
2002-06-27 |
802 Systems, Inc. |
Methods and systems using PLD-based network communication protocols
|
US7290283B2
(en)
|
2001-01-31 |
2007-10-30 |
Lancope, Inc. |
Network port profiling
|
WO2003003210A2
(en)
|
2001-06-27 |
2003-01-09 |
Arbor Networks |
Method and system for monitoring control signal traffic over a computer network
|
US6546493B1
(en)
|
2001-11-30 |
2003-04-08 |
Networks Associates Technology, Inc. |
System, method and computer program product for risk assessment scanning based on detected anomalous events
|
US6721806B2
(en)
|
2002-09-05 |
2004-04-13 |
International Business Machines Corporation |
Remote direct memory access enabled network interface controller switchover and switchback support
|