IL143573A0
(en)
|
1998-12-09 |
2002-04-21 |
Network Ice Corp |
A method and apparatus for providing network and computer system security
|
US6773769B1
(en)
*
|
1999-05-18 |
2004-08-10 |
3M Innovative Properties Company |
Macroporous ink receiving media
|
US7346929B1
(en)
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US8006243B2
(en)
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
AU2001257400A1
(en)
|
2000-04-28 |
2001-11-12 |
Internet Security Systems, Inc. |
System and method for managing security events on a network
|
EP1657663A3
(en)
|
2000-05-19 |
2006-06-07 |
Netscape Communications Corporation |
Adaptive multi-tier authentification system
|
US7174454B2
(en)
|
2002-11-19 |
2007-02-06 |
America Online, Inc. |
System and method for establishing historical usage-based hardware trust
|
US9213836B2
(en)
*
|
2000-05-28 |
2015-12-15 |
Barhon Mayer, Batya |
System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
|
US20040034794A1
(en)
*
|
2000-05-28 |
2004-02-19 |
Yaron Mayer |
System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
|
US6901346B2
(en)
|
2000-08-09 |
2005-05-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US7380270B2
(en)
*
|
2000-08-09 |
2008-05-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance
|
US6993448B2
(en)
|
2000-08-09 |
2006-01-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US7178166B1
(en)
*
|
2000-09-19 |
2007-02-13 |
Internet Security Systems, Inc. |
Vulnerability assessment and authentication of a computer by a local scanner
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US6996845B1
(en)
*
|
2000-11-28 |
2006-02-07 |
S.P.I. Dynamics Incorporated |
Internet security analysis system and process
|
US7340776B2
(en)
|
2001-01-31 |
2008-03-04 |
International Business Machines Corporation |
Method and system for configuring and scheduling security audits of a computer network
|
US7590745B2
(en)
*
|
2001-03-02 |
2009-09-15 |
International Business Machines Corporation |
System and method for analyzing a router in a shared network system
|
US7882555B2
(en)
*
|
2001-03-16 |
2011-02-01 |
Kavado, Inc. |
Application layer security method and system
|
US7325252B2
(en)
*
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US7657419B2
(en)
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US20020199122A1
(en)
*
|
2001-06-22 |
2002-12-26 |
Davis Lauren B. |
Computer security vulnerability analysis methodology
|
US7003561B1
(en)
*
|
2001-06-29 |
2006-02-21 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
|
US7146642B1
(en)
*
|
2001-06-29 |
2006-12-05 |
Mcafee, Inc. |
System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
|
US7096503B1
(en)
*
|
2001-06-29 |
2006-08-22 |
Mcafee, Inc. |
Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
|
US7100160B2
(en)
*
|
2001-10-19 |
2006-08-29 |
Hewlett-Packard Development Company, L.P. |
Method and system for implementing host-dependent SCSI behavior in a heterogeneous host environment
|
US7673137B2
(en)
|
2002-01-04 |
2010-03-02 |
International Business Machines Corporation |
System and method for the managed security control of processes on a computer system
|
US7664845B2
(en)
*
|
2002-01-15 |
2010-02-16 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7543056B2
(en)
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7257630B2
(en)
*
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7243148B2
(en)
*
|
2002-01-15 |
2007-07-10 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7152105B2
(en)
*
|
2002-01-15 |
2006-12-19 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
JP4190765B2
(ja)
*
|
2002-01-18 |
2008-12-03 |
株式会社コムスクエア |
セキュリティレベル情報提供方法及びシステム
|
DE10202249A1
(de)
*
|
2002-01-23 |
2003-08-07 |
Xs Comp Hard Und Software Gmbh |
Sicherheitseinheit und Verfahren für Kommunikationsnetzwerke
|
US7975296B2
(en)
*
|
2002-02-07 |
2011-07-05 |
Oracle International Corporation |
Automated security threat testing of web pages
|
US7058970B2
(en)
*
|
2002-02-27 |
2006-06-06 |
Intel Corporation |
On connect security scan and delivery by a network security authority
|
US6973496B2
(en)
*
|
2002-03-05 |
2005-12-06 |
Archduke Holdings, Inc. |
Concealing a network connected device
|
JP2003288282A
(ja)
*
|
2002-03-28 |
2003-10-10 |
Fujitsu Ltd |
不正アクセス防止プログラム
|
FR2838535B1
(fr)
*
|
2002-04-12 |
2004-07-23 |
Intranode Sa |
Procede et dispositif d'un audit de securite dans un reseau de telecommunication, plate forme et systeme correspondants
|
US20030212779A1
(en)
*
|
2002-04-30 |
2003-11-13 |
Boyter Brian A. |
System and Method for Network Security Scanning
|
IL149583A0
(en)
*
|
2002-05-09 |
2003-07-06 |
Kavado Israel Ltd |
Method for automatic setting and updating of a security policy
|
US7379857B2
(en)
*
|
2002-05-10 |
2008-05-27 |
Lockheed Martin Corporation |
Method and system for simulating computer networks to facilitate testing of computer network security
|
US20040006715A1
(en)
*
|
2002-07-05 |
2004-01-08 |
Skrepetos Nicholas C. |
System and method for providing security to a remote computer over a network browser interface
|
US7370092B2
(en)
*
|
2002-09-12 |
2008-05-06 |
Computer Sciences Corporation |
System and method for enhanced software updating and revision
|
US8001271B1
(en)
*
|
2002-10-21 |
2011-08-16 |
Arbor Networks, Inc. |
Method and apparatus for locating naming discrepancies
|
KR20040035572A
(ko)
*
|
2002-10-22 |
2004-04-29 |
최운호 |
정보 인프라에서의 종합 침해사고 대응시스템 및 그운영방법
|
US20040093419A1
(en)
*
|
2002-10-23 |
2004-05-13 |
Weihl William E. |
Method and system for secure content delivery
|
US8230497B2
(en)
*
|
2002-11-04 |
2012-07-24 |
Hewlett-Packard Development Company, L.P. |
Method of identifying software vulnerabilities on a computer system
|
US7353539B2
(en)
*
|
2002-11-04 |
2008-04-01 |
Hewlett-Packard Development Company, L.P. |
Signal level propagation mechanism for distribution of a payload to vulnerable systems
|
US20040103309A1
(en)
*
|
2002-11-27 |
2004-05-27 |
Tracy Richard P. |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing threat vulnerability feed
|
US6980927B2
(en)
*
|
2002-11-27 |
2005-12-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
|
US6983221B2
(en)
*
|
2002-11-27 |
2006-01-03 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US8091117B2
(en)
*
|
2003-02-14 |
2012-01-03 |
Preventsys, Inc. |
System and method for interfacing with heterogeneous network data gathering tools
|
WO2004086180A2
(en)
*
|
2003-03-21 |
2004-10-07 |
Computer Associates Think, Inc. |
Auditing system and method
|
US20040187029A1
(en)
*
|
2003-03-21 |
2004-09-23 |
Ting David M. T. |
System and method for data and request filtering
|
US20040193918A1
(en)
*
|
2003-03-28 |
2004-09-30 |
Kenneth Green |
Apparatus and method for network vulnerability detection and compliance assessment
|
US8201256B2
(en)
*
|
2003-03-28 |
2012-06-12 |
Trustwave Holdings, Inc. |
Methods and systems for assessing and advising on electronic compliance
|
US7328454B2
(en)
*
|
2003-04-24 |
2008-02-05 |
At&T Delaware Intellectual Property, Inc. |
Systems and methods for assessing computer security
|
US8024795B2
(en)
*
|
2003-05-09 |
2011-09-20 |
Q1 Labs, Inc. |
Network intelligence system
|
US7496662B1
(en)
|
2003-05-12 |
2009-02-24 |
Sourcefire, Inc. |
Systems and methods for determining characteristics of a network and assessing confidence
|
US7926113B1
(en)
|
2003-06-09 |
2011-04-12 |
Tenable Network Security, Inc. |
System and method for managing network vulnerability analysis systems
|
US8266699B2
(en)
|
2003-07-01 |
2012-09-11 |
SecurityProfiling Inc. |
Multiple-path remediation
|
US9118711B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9118709B2
(en)
*
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US7657938B2
(en)
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
US20050138426A1
(en)
*
|
2003-11-07 |
2005-06-23 |
Brian Styslinger |
Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests
|
US20050114658A1
(en)
*
|
2003-11-20 |
2005-05-26 |
Dye Matthew J. |
Remote web site security system
|
US7370101B1
(en)
*
|
2003-12-19 |
2008-05-06 |
Sun Microsystems, Inc. |
Automated testing of cluster data services
|
GB2410647A
(en)
*
|
2004-01-31 |
2005-08-03 |
Hewlett Packard Development Co |
Identifying and Patching Vulnerabilities in a Network
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US7519954B1
(en)
|
2004-04-08 |
2009-04-14 |
Mcafee, Inc. |
System and method of operating system identification
|
US7761918B2
(en)
*
|
2004-04-13 |
2010-07-20 |
Tenable Network Security, Inc. |
System and method for scanning a network
|
GB2414889A
(en)
*
|
2004-04-30 |
2005-12-07 |
Hewlett Packard Development Co |
Network administration
|
US7665119B2
(en)
|
2004-09-03 |
2010-02-16 |
Secure Elements, Inc. |
Policy-based selection of remediation
|
US7539681B2
(en)
*
|
2004-07-26 |
2009-05-26 |
Sourcefire, Inc. |
Methods and systems for multi-pattern searching
|
US20060085852A1
(en)
*
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US7793338B1
(en)
|
2004-10-21 |
2010-09-07 |
Mcafee, Inc. |
System and method of network endpoint security
|
KR100609708B1
(ko)
*
|
2004-11-20 |
2006-08-08 |
한국전자통신연구원 |
악성코드 프로토콜 분석 및 유해 트래픽을 생성하는 방법및 장치
|
US20060161816A1
(en)
*
|
2004-12-22 |
2006-07-20 |
Gula Ronald J |
System and method for managing events
|
US7310669B2
(en)
*
|
2005-01-19 |
2007-12-18 |
Lockdown Networks, Inc. |
Network appliance for vulnerability assessment auditing over multiple networks
|
US8266320B1
(en)
*
|
2005-01-27 |
2012-09-11 |
Science Applications International Corporation |
Computer network defense
|
US9325728B1
(en)
|
2005-01-27 |
2016-04-26 |
Leidos, Inc. |
Systems and methods for implementing and scoring computer network defense exercises
|
US8095983B2
(en)
|
2005-03-15 |
2012-01-10 |
Mu Dynamics, Inc. |
Platform for analyzing the security of communication protocols and channels
|
US7958560B1
(en)
|
2005-03-15 |
2011-06-07 |
Mu Dynamics, Inc. |
Portable program for generating attacks on communication protocols and channels
|
US7930363B2
(en)
*
|
2005-10-12 |
2011-04-19 |
Powerreviews, Inc. |
Application service provider delivery system
|
US8046833B2
(en)
|
2005-11-14 |
2011-10-25 |
Sourcefire, Inc. |
Intrusion event correlation with network discovery information
|
US7733803B2
(en)
|
2005-11-14 |
2010-06-08 |
Sourcefire, Inc. |
Systems and methods for modifying network map attributes
|
JP4722730B2
(ja)
*
|
2006-03-10 |
2011-07-13 |
富士通株式会社 |
セキュリティ管理プログラム、セキュリティ管理装置、およびセキュリティ管理方法
|
US7948988B2
(en)
*
|
2006-07-27 |
2011-05-24 |
Sourcefire, Inc. |
Device, system and method for analysis of fragments in a fragment train
|
US7701945B2
(en)
*
|
2006-08-10 |
2010-04-20 |
Sourcefire, Inc. |
Device, system and method for analysis of segments in a transmission control protocol (TCP) session
|
US7958230B2
(en)
|
2008-09-19 |
2011-06-07 |
Mu Dynamics, Inc. |
Test driven deployment and monitoring of heterogeneous network systems
|
US8316447B2
(en)
|
2006-09-01 |
2012-11-20 |
Mu Dynamics, Inc. |
Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
|
US9172611B2
(en)
|
2006-09-01 |
2015-10-27 |
Spirent Communications, Inc. |
System and method for discovering assets and functional relationships in a network
|
US7954161B1
(en)
|
2007-06-08 |
2011-05-31 |
Mu Dynamics, Inc. |
Mechanism for characterizing soft failures in systems under attack
|
EP2076866A2
(en)
*
|
2006-10-06 |
2009-07-08 |
Sourcefire, Inc. |
Device, system and method for use of micro-policies in intrusion detection/prevention
|
GB2443459A
(en)
*
|
2006-10-31 |
2008-05-07 |
Hewlett Packard Development Co |
Data packet incuding computing platform indication
|
US20080181215A1
(en)
*
|
2007-01-26 |
2008-07-31 |
Brooks Bollich |
System for remotely distinguishing an operating system
|
US8069352B2
(en)
*
|
2007-02-28 |
2011-11-29 |
Sourcefire, Inc. |
Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
|
US8302196B2
(en)
*
|
2007-03-20 |
2012-10-30 |
Microsoft Corporation |
Combining assessment models and client targeting to identify network security vulnerabilities
|
US8365289B2
(en)
*
|
2007-04-12 |
2013-01-29 |
Core Sdi, Incorporated |
System and method for providing network penetration testing
|
US8127353B2
(en)
|
2007-04-30 |
2012-02-28 |
Sourcefire, Inc. |
Real-time user awareness for a computer network
|
US8850587B2
(en)
*
|
2007-05-04 |
2014-09-30 |
Wipro Limited |
Network security scanner for enterprise protection
|
US7774637B1
(en)
|
2007-09-05 |
2010-08-10 |
Mu Dynamics, Inc. |
Meta-instrumentation for security analysis
|
US8871096B2
(en)
*
|
2007-09-10 |
2014-10-28 |
Res Usa, Llc |
Magnetic separation combined with dynamic settling for fischer-tropsch processes
|
US8250658B2
(en)
*
|
2007-09-20 |
2012-08-21 |
Mu Dynamics, Inc. |
Syntax-based security analysis using dynamically generated test cases
|
US8650651B2
(en)
*
|
2008-02-08 |
2014-02-11 |
International Business Machines Corporation |
Method and apparatus for security assessment of a computing platform
|
US8474043B2
(en)
|
2008-04-17 |
2013-06-25 |
Sourcefire, Inc. |
Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
|
KR20090121579A
(ko)
*
|
2008-05-22 |
2009-11-26 |
주식회사 이베이지마켓 |
서버의 취약점을 점검하기 위한 시스템 및 그 방법
|
US8272055B2
(en)
|
2008-10-08 |
2012-09-18 |
Sourcefire, Inc. |
Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
|
WO2010045596A1
(en)
*
|
2008-10-16 |
2010-04-22 |
Qualys, Inc. |
Systems and methods for assessing the compliance of a computer across a network
|
US8713687B2
(en)
*
|
2008-12-17 |
2014-04-29 |
Symantec Corporation |
Methods and systems for enabling community-tested security features for legacy applications
|
US8490196B2
(en)
*
|
2009-08-05 |
2013-07-16 |
Core Security Technologies |
System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
|
US9836376B2
(en)
|
2009-09-24 |
2017-12-05 |
Contec, Llc |
Method and system for automated test of end-user devices
|
KR101259897B1
(ko)
*
|
2009-10-19 |
2013-05-02 |
한국전자통신연구원 |
원격 보안취약성 진단장치 및 그 방법
|
US8438270B2
(en)
|
2010-01-26 |
2013-05-07 |
Tenable Network Security, Inc. |
System and method for correlating network identities and addresses
|
US8302198B2
(en)
|
2010-01-28 |
2012-10-30 |
Tenable Network Security, Inc. |
System and method for enabling remote registry service security audits
|
US20110191854A1
(en)
*
|
2010-01-29 |
2011-08-04 |
Anastasios Giakouminakis |
Methods and systems for testing and analyzing vulnerabilities of computing systems based on exploits of the vulnerabilities
|
KR101055267B1
(ko)
*
|
2010-03-05 |
2011-08-09 |
한국전자통신연구원 |
액티브엑스 컨트롤의 배포 사이트 식별 방법과 보안 취약점 검출 방법 및 면역화 방법
|
US8707440B2
(en)
*
|
2010-03-22 |
2014-04-22 |
Tenable Network Security, Inc. |
System and method for passively identifying encrypted and interactive network sessions
|
WO2011130510A1
(en)
|
2010-04-16 |
2011-10-20 |
Sourcefire, Inc. |
System and method for near-real time network attack detection, and system and method for unified detection via detection routing
|
US8547974B1
(en)
|
2010-05-05 |
2013-10-01 |
Mu Dynamics |
Generating communication protocol test cases based on network traffic
|
US8463860B1
(en)
|
2010-05-05 |
2013-06-11 |
Spirent Communications, Inc. |
Scenario based scale testing
|
US8549650B2
(en)
|
2010-05-06 |
2013-10-01 |
Tenable Network Security, Inc. |
System and method for three-dimensional visualization of vulnerability and asset data
|
US8433790B2
(en)
|
2010-06-11 |
2013-04-30 |
Sourcefire, Inc. |
System and method for assigning network blocks to sensors
|
US8671182B2
(en)
|
2010-06-22 |
2014-03-11 |
Sourcefire, Inc. |
System and method for resolving operating system or service identity conflicts
|
JP5725529B2
(ja)
*
|
2010-07-21 |
2015-05-27 |
日本電気株式会社 |
Web脆弱性補修システム、Web脆弱性補修方法、及びプログラム
|
US20120102368A1
(en)
*
|
2010-10-21 |
2012-04-26 |
Unisys Corp. |
Communicating errors between an operating system and interface layer
|
US9106514B1
(en)
|
2010-12-30 |
2015-08-11 |
Spirent Communications, Inc. |
Hybrid network software provision
|
US9076013B1
(en)
*
|
2011-02-28 |
2015-07-07 |
Amazon Technologies, Inc. |
Managing requests for security services
|
US8601034B2
(en)
|
2011-03-11 |
2013-12-03 |
Sourcefire, Inc. |
System and method for real time data awareness
|
US8464219B1
(en)
|
2011-04-27 |
2013-06-11 |
Spirent Communications, Inc. |
Scalable control system for test execution and monitoring utilizing multiple processors
|
WO2012170423A1
(en)
*
|
2011-06-05 |
2012-12-13 |
Core Sdi Incorporated |
System and method for providing automated computer security compromise as a service
|
US8925091B2
(en)
*
|
2011-09-01 |
2014-12-30 |
Dell Products, Lp |
System and method for evaluation in a collaborative security assurance system
|
US9811667B2
(en)
*
|
2011-09-21 |
2017-11-07 |
Mcafee, Inc. |
System and method for grouping computer vulnerabilities
|
US9367707B2
(en)
|
2012-02-23 |
2016-06-14 |
Tenable Network Security, Inc. |
System and method for using file hashes to track data leakage and document propagation in a network
|
EP2642395B1
(de)
*
|
2012-03-21 |
2018-12-19 |
ServiceTrace e.K. |
Verfahren und Vorrichtung zum Ausführen von Workflow-Skripten
|
US8972543B1
(en)
|
2012-04-11 |
2015-03-03 |
Spirent Communications, Inc. |
Managing clients utilizing reverse transactions
|
US9043920B2
(en)
|
2012-06-27 |
2015-05-26 |
Tenable Network Security, Inc. |
System and method for identifying exploitable weak points in a network
|
US9088606B2
(en)
|
2012-07-05 |
2015-07-21 |
Tenable Network Security, Inc. |
System and method for strategic anti-malware monitoring
|
US20140101767A1
(en)
*
|
2012-10-10 |
2014-04-10 |
Matthew Cohen |
Systems and methods for testing and managing defensive network devices
|
US9467464B2
(en)
|
2013-03-15 |
2016-10-11 |
Tenable Network Security, Inc. |
System and method for correlating log data to discover network vulnerabilities and assets
|
JP6157189B2
(ja)
*
|
2013-04-16 |
2017-07-05 |
Kddi株式会社 |
識別装置、識別方法および識別プログラム
|
US9380019B2
(en)
*
|
2013-08-26 |
2016-06-28 |
Verisign, Inc. |
Command performance monitoring
|
WO2016053261A1
(en)
*
|
2014-09-29 |
2016-04-07 |
Hewlett Packard Enterprise Development Lp |
Detection of email-related vulnerabilities
|
US9479525B2
(en)
*
|
2014-10-23 |
2016-10-25 |
International Business Machines Corporation |
Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server
|
WO2017015276A1
(en)
*
|
2015-07-22 |
2017-01-26 |
Avg Netherlands B.V |
Content access validation system and method
|
US10628764B1
(en)
*
|
2015-09-15 |
2020-04-21 |
Synack, Inc. |
Method of automatically generating tasks using control computer
|
US20170124152A1
(en)
|
2015-11-02 |
2017-05-04 |
LeapYear Technologies, Inc. |
Differentially private processing and database storage
|
US10567396B2
(en)
*
|
2015-12-15 |
2020-02-18 |
Webroot Inc. |
Real-time scanning of IP addresses
|
US10779056B2
(en)
*
|
2016-04-14 |
2020-09-15 |
Contec, Llc |
Automated network-based test system for set top box devices
|
US10462456B2
(en)
|
2016-04-14 |
2019-10-29 |
Contec, Llc |
Automated network-based test system for set top box devices
|
US10284456B2
(en)
|
2016-11-10 |
2019-05-07 |
Contec, Llc |
Systems and methods for testing electronic devices using master-slave test architectures
|
US10608990B2
(en)
*
|
2016-11-15 |
2020-03-31 |
Nicira, Inc. |
Accessing nodes deployed on an isolated network
|
EP3531650B8
(en)
|
2018-02-23 |
2022-06-22 |
Rohde & Schwarz GmbH & Co. KG |
System, method, and computer program for testing security of a device under test
|
US11055432B2
(en)
|
2018-04-14 |
2021-07-06 |
LeapYear Technologies, Inc. |
Budget tracking in a differentially private database system
|
US11252172B1
(en)
*
|
2018-05-10 |
2022-02-15 |
State Farm Mutual Automobile Insurance Company |
Systems and methods for automated penetration testing
|
EP3637739B1
(en)
*
|
2018-10-12 |
2023-12-06 |
Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. |
Method for validating ownership of a domain name, coordinating agent and validation agent
|
JP6989781B2
(ja)
*
|
2018-11-05 |
2022-01-12 |
日本電信電話株式会社 |
検査支援装置、検査支援方法、及び検査支援プログラム
|
US10430605B1
(en)
*
|
2018-11-29 |
2019-10-01 |
LeapYear Technologies, Inc. |
Differentially private database permissions system
|
US11755769B2
(en)
|
2019-02-01 |
2023-09-12 |
Snowflake Inc. |
Differentially private query budget refunding
|
US10642847B1
(en)
|
2019-05-09 |
2020-05-05 |
LeapYear Technologies, Inc. |
Differentially private budget tracking using Renyi divergence
|
US11328084B2
(en)
|
2020-02-11 |
2022-05-10 |
LeapYear Technologies, Inc. |
Adaptive differentially private count
|
US11487904B2
(en)
*
|
2020-10-21 |
2022-11-01 |
Charter Communications Operating, Llc |
Methods and systems for underlying operating system shell discovery
|
CN115189933A
(zh)
*
|
2022-07-06 |
2022-10-14 |
上海交通大学 |
针对Docker的自动化配置安全检测方法和系统
|