|
US8352400B2
(en)
|
1991-12-23 |
2013-01-08 |
Hoffberg Steven M |
Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
|
|
US7966078B2
(en)
|
1999-02-01 |
2011-06-21 |
Steven Hoffberg |
Network media appliance system and method
|
|
US8856927B1
(en)
|
2003-07-22 |
2014-10-07 |
Acronis International Gmbh |
System and method for using snapshots for rootkit detection
|
|
US7593936B2
(en)
*
|
2003-08-11 |
2009-09-22 |
Triumfant, Inc. |
Systems and methods for automated computer support
|
|
US8074276B1
(en)
*
|
2004-04-19 |
2011-12-06 |
Parallels Holdings, Ltd. |
Method and system for administration of security services within a virtual execution environment (VEE) infrastructure
|
|
US7555596B2
(en)
*
|
2004-12-10 |
2009-06-30 |
Microsoft Corporation |
Systems and methods for attaching a virtual machine virtual hard disk to a host machine
|
|
US7685149B2
(en)
*
|
2005-03-28 |
2010-03-23 |
Microsoft Corporation |
Identifying and removing potentially unwanted software
|
|
JP4556144B2
(ja)
*
|
2005-06-17 |
2010-10-06 |
日本電気株式会社 |
情報処理装置、復旧装置、プログラム及び復旧方法
|
|
US7784098B1
(en)
*
|
2005-07-14 |
2010-08-24 |
Trend Micro, Inc. |
Snapshot and restore technique for computer system recovery
|
|
US7752436B2
(en)
*
|
2005-08-09 |
2010-07-06 |
Intel Corporation |
Exclusive access for secure audio program
|
|
US8161548B1
(en)
|
2005-08-15 |
2012-04-17 |
Trend Micro, Inc. |
Malware detection using pattern classification
|
|
US7779472B1
(en)
|
2005-10-11 |
2010-08-17 |
Trend Micro, Inc. |
Application behavior based malware detection
|
|
US7917481B1
(en)
*
|
2005-10-31 |
2011-03-29 |
Symantec Operating Corporation |
File-system-independent malicious content detection
|
|
US8935281B1
(en)
|
2005-10-31 |
2015-01-13 |
Symantec Operating Corporation |
Optimized content search of files
|
|
US8422678B2
(en)
*
|
2005-11-16 |
2013-04-16 |
Intel Corporation |
Method, apparatus and system for protecting security keys on a wireless platform
|
|
US20070168694A1
(en)
*
|
2006-01-18 |
2007-07-19 |
Phil Maddaloni |
System and method for identifying and removing pestware using a secondary operating system
|
|
US7840958B1
(en)
|
2006-02-17 |
2010-11-23 |
Trend Micro, Inc. |
Preventing spyware installation
|
|
US7941813B1
(en)
|
2006-02-17 |
2011-05-10 |
Parallels Holdings, Ltd. |
System and method for using virtual machine for driver installation sandbox
|
|
US7926054B2
(en)
*
|
2006-03-03 |
2011-04-12 |
Novell, Inc. |
System, method, and computer-readable medium for virtual machine instantiation from an external peripheral device
|
|
US7536541B2
(en)
*
|
2006-03-07 |
2009-05-19 |
Novell Inc. |
Parallelizing multiple boot images with virtual machines
|
|
US8387138B2
(en)
*
|
2006-03-21 |
2013-02-26 |
At&T Intellectual Property I, L.P. |
Security scanning system and method
|
|
US8205261B1
(en)
*
|
2006-03-31 |
2012-06-19 |
Emc Corporation |
Incremental virus scan
|
|
US9547485B2
(en)
*
|
2006-03-31 |
2017-01-17 |
Prowess Consulting, Llc |
System and method for deploying a virtual machine
|
|
US20070234337A1
(en)
*
|
2006-03-31 |
2007-10-04 |
Prowess Consulting, Llc |
System and method for sanitizing a computer program
|
|
US8296759B1
(en)
*
|
2006-03-31 |
2012-10-23 |
Vmware, Inc. |
Offloading operations to a replicate virtual machine
|
|
US8332940B2
(en)
*
|
2006-04-11 |
2012-12-11 |
Installfree, Inc. |
Techniques for securing a computing environment
|
|
US8321377B2
(en)
*
|
2006-04-17 |
2012-11-27 |
Microsoft Corporation |
Creating host-level application-consistent backups of virtual machines
|
|
US8181244B2
(en)
*
|
2006-04-20 |
2012-05-15 |
Webroot Inc. |
Backward researching time stamped events to find an origin of pestware
|
|
US8429746B2
(en)
*
|
2006-05-22 |
2013-04-23 |
Neuraliq, Inc. |
Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
|
|
US20140373144A9
(en)
*
|
2006-05-22 |
2014-12-18 |
Alen Capalik |
System and method for analyzing unauthorized intrusion into a computer network
|
|
EP1881404A1
(fr)
*
|
2006-07-20 |
2008-01-23 |
Gemplus |
Procédé de protection dynamique des données lors de l'exécution d'un code logiciel en langage intermédiaire dans un appareil numérique
|
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
|
US8392996B2
(en)
*
|
2006-08-08 |
2013-03-05 |
Symantec Corporation |
Malicious software detection
|
|
CN1909453B
(zh)
*
|
2006-08-22 |
2011-04-20 |
深圳市深信服电子科技有限公司 |
一种基于网关/网桥的防间谍软件侵犯方法
|
|
US8056134B1
(en)
*
|
2006-09-10 |
2011-11-08 |
Ogilvie John W |
Malware detection and identification via malware spoofing
|
|
US7802050B2
(en)
*
|
2006-09-29 |
2010-09-21 |
Intel Corporation |
Monitoring a target agent execution pattern on a VT-enabled system
|
|
JP4756603B2
(ja)
*
|
2006-10-10 |
2011-08-24 |
ルネサスエレクトロニクス株式会社 |
データプロセッサ
|
|
US8949826B2
(en)
*
|
2006-10-17 |
2015-02-03 |
Managelq, Inc. |
Control and management of virtual systems
|
|
US8234641B2
(en)
*
|
2006-10-17 |
2012-07-31 |
Managelq, Inc. |
Compliance-based adaptations in managed virtual systems
|
|
US9038062B2
(en)
*
|
2006-10-17 |
2015-05-19 |
Manageiq, Inc. |
Registering and accessing virtual systems for use in a managed system
|
|
US8458695B2
(en)
|
2006-10-17 |
2013-06-04 |
Manageiq, Inc. |
Automatic optimization for virtual systems
|
|
US8752045B2
(en)
|
2006-10-17 |
2014-06-10 |
Manageiq, Inc. |
Methods and apparatus for using tags to control and manage assets
|
|
US9697019B1
(en)
|
2006-10-17 |
2017-07-04 |
Manageiq, Inc. |
Adapt a virtual machine to comply with system enforced policies and derive an optimized variant of the adapted virtual machine
|
|
US9086917B1
(en)
|
2006-10-17 |
2015-07-21 |
Manageiq, Inc. |
Registering and accessing virtual systems for use in a managed system
|
|
US8949825B1
(en)
*
|
2006-10-17 |
2015-02-03 |
Manageiq, Inc. |
Enforcement of compliance policies in managed virtual systems
|
|
US8234640B1
(en)
*
|
2006-10-17 |
2012-07-31 |
Manageiq, Inc. |
Compliance-based adaptations in managed virtual systems
|
|
US8612971B1
(en)
|
2006-10-17 |
2013-12-17 |
Manageiq, Inc. |
Automatic optimization for virtual systems
|
|
US9015703B2
(en)
*
|
2006-10-17 |
2015-04-21 |
Manageiq, Inc. |
Enforcement of compliance policies in managed virtual systems
|
|
US20110047618A1
(en)
*
|
2006-10-18 |
2011-02-24 |
University Of Virginia Patent Foundation |
Method, System, and Computer Program Product for Malware Detection, Analysis, and Response
|
|
DE102006049646B3
(de)
|
2006-10-20 |
2008-06-19 |
Siemens Ag |
Verfahren und Sendevorrichtung zum gesicherten Erstellen und Versenden einer elektronischen Nachricht sowie Verfahren und Empfangsvorrichtung zum gesicherten Empfangen und Verarbeiten einer elektronischen Nachricht
|
|
US8584109B2
(en)
*
|
2006-10-27 |
2013-11-12 |
Microsoft Corporation |
Virtualization for diversified tamper resistance
|
|
JP4896677B2
(ja)
*
|
2006-11-20 |
2012-03-14 |
株式会社ソニー・コンピュータエンタテインメント |
ソフトウエアの改竄検査装置及び方法、コンピュータプログラム
|
|
EP1933248A1
(de)
*
|
2006-12-12 |
2008-06-18 |
secunet Security Networks Aktiengesellschaft |
Verfahren zur sicheren Datenverarbeitung auf einem Computersystem
|
|
US7987469B2
(en)
*
|
2006-12-14 |
2011-07-26 |
Intel Corporation |
RDMA (remote direct memory access) data transfer in a virtual environment
|
|
US8099786B2
(en)
|
2006-12-29 |
2012-01-17 |
Intel Corporation |
Embedded mechanism for platform vulnerability assessment
|
|
CN101211389B
(zh)
*
|
2006-12-31 |
2010-04-07 |
联想(北京)有限公司 |
一种硬件安全单元以及其服务请求的处理方法和系统
|
|
US8380987B2
(en)
*
|
2007-01-25 |
2013-02-19 |
Microsoft Corporation |
Protection agents and privilege modes
|
|
US7765374B2
(en)
*
|
2007-01-25 |
2010-07-27 |
Microsoft Corporation |
Protecting operating-system resources
|
|
US8391288B2
(en)
*
|
2007-01-31 |
2013-03-05 |
Hewlett-Packard Development Company, L.P. |
Security system for protecting networks from vulnerability exploits
|
|
US8856782B2
(en)
|
2007-03-01 |
2014-10-07 |
George Mason Research Foundation, Inc. |
On-demand disposable virtual work system
|
|
US20080320594A1
(en)
*
|
2007-03-19 |
2008-12-25 |
Xuxian Jiang |
Malware Detector
|
|
WO2008117500A1
(ja)
*
|
2007-03-27 |
2008-10-02 |
Nec Corporation |
仮想マシン運用システム、仮想マシン運用方法およびプログラム
|
|
US8127412B2
(en)
*
|
2007-03-30 |
2012-03-06 |
Cisco Technology, Inc. |
Network context triggers for activating virtualized computer applications
|
|
US20080250407A1
(en)
*
|
2007-04-05 |
2008-10-09 |
Microsoft Corporation |
Network group name for virtual machines
|
|
US8689288B2
(en)
*
|
2007-04-16 |
2014-04-01 |
Samsung Electronics Co., Ltd. |
Apparatus and method for protecting system in virtualized environment
|
|
US8011010B2
(en)
*
|
2007-04-17 |
2011-08-30 |
Microsoft Corporation |
Using antimalware technologies to perform offline scanning of virtual machine images
|
|
US8875272B2
(en)
*
|
2007-05-15 |
2014-10-28 |
International Business Machines Corporation |
Firewall for controlling connections between a client machine and a network
|
|
US8296848B1
(en)
*
|
2007-06-20 |
2012-10-23 |
Symantec Corporation |
Control flow redirection and analysis for detecting vulnerability exploitation
|
|
US8949827B2
(en)
*
|
2007-06-22 |
2015-02-03 |
Red Hat, Inc. |
Tracking a virtual machine
|
|
US8127290B2
(en)
*
|
2007-06-22 |
2012-02-28 |
Red Hat, Inc. |
Method and system for direct insertion of a virtual machine driver
|
|
US8539570B2
(en)
*
|
2007-06-22 |
2013-09-17 |
Red Hat, Inc. |
Method for managing a virtual machine
|
|
US9727440B2
(en)
|
2007-06-22 |
2017-08-08 |
Red Hat, Inc. |
Automatic simulation of virtual machine performance
|
|
US8984504B2
(en)
|
2007-06-22 |
2015-03-17 |
Red Hat, Inc. |
Method and system for determining a host machine by a virtual machine
|
|
US9354960B2
(en)
|
2010-12-27 |
2016-05-31 |
Red Hat, Inc. |
Assigning virtual machines to business application service groups based on ranking of the virtual machines
|
|
US8336108B2
(en)
*
|
2007-06-22 |
2012-12-18 |
Red Hat, Inc. |
Method and system for collaboration involving enterprise nodes
|
|
US8429748B2
(en)
*
|
2007-06-22 |
2013-04-23 |
Red Hat, Inc. |
Network traffic analysis using a dynamically updating ontological network description
|
|
US9678803B2
(en)
|
2007-06-22 |
2017-06-13 |
Red Hat, Inc. |
Migration of network entities to a cloud infrastructure
|
|
US9495152B2
(en)
|
2007-06-22 |
2016-11-15 |
Red Hat, Inc. |
Automatic baselining of business application service groups comprised of virtual machines
|
|
US9569330B2
(en)
|
2007-06-22 |
2017-02-14 |
Red Hat, Inc. |
Performing dependency analysis on nodes of a business application service group
|
|
US8191141B2
(en)
*
|
2007-06-22 |
2012-05-29 |
Red Hat, Inc. |
Method and system for cloaked observation and remediation of software attacks
|
|
US20090007100A1
(en)
*
|
2007-06-28 |
2009-01-01 |
Microsoft Corporation |
Suspending a Running Operating System to Enable Security Scanning
|
|
US8584094B2
(en)
*
|
2007-06-29 |
2013-11-12 |
Microsoft Corporation |
Dynamically computing reputation scores for objects
|
|
US8341277B2
(en)
*
|
2007-07-03 |
2012-12-25 |
International Business Machines Corporation |
System and method for connecting closed, secure production network
|
|
JP4938576B2
(ja)
*
|
2007-07-24 |
2012-05-23 |
日本電信電話株式会社 |
情報収集システムおよび情報収集方法
|
|
KR20090011481A
(ko)
|
2007-07-26 |
2009-02-02 |
삼성전자주식회사 |
단말 장치에서의 침입 탐지 방법 및 그 장치
|
|
US8671166B2
(en)
|
2007-08-09 |
2014-03-11 |
Prowess Consulting, Llc |
Methods and systems for deploying hardware files to a computer
|
|
US8122505B2
(en)
*
|
2007-08-17 |
2012-02-21 |
International Business Machines Corporation |
Method and apparatus for detection of malicious behavior in mobile ad-hoc networks
|
|
US8146098B2
(en)
*
|
2007-09-07 |
2012-03-27 |
Manageiq, Inc. |
Method and apparatus for interfacing with a computer user via virtual thumbnails
|
|
US8250641B2
(en)
*
|
2007-09-17 |
2012-08-21 |
Intel Corporation |
Method and apparatus for dynamic switching and real time security control on virtualized systems
|
|
US8307443B2
(en)
*
|
2007-09-28 |
2012-11-06 |
Microsoft Corporation |
Securing anti-virus software with virtualization
|
|
CN101350054B
(zh)
*
|
2007-10-15 |
2011-05-25 |
北京瑞星信息技术有限公司 |
计算机有害程序自动防护方法及装置
|
|
CN101350053A
(zh)
*
|
2007-10-15 |
2009-01-21 |
北京瑞星国际软件有限公司 |
防止网页浏览器被漏洞利用的方法和装置
|
|
CN101350052B
(zh)
*
|
2007-10-15 |
2010-11-03 |
北京瑞星信息技术有限公司 |
发现计算机程序的恶意行为的方法和装置
|
|
KR100985047B1
(ko)
*
|
2007-10-25 |
2010-10-04 |
주식회사 안철수연구소 |
쓰레드 스케줄링 시스템 및 그 방법
|
|
US8407688B2
(en)
|
2007-11-27 |
2013-03-26 |
Managelq, Inc. |
Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets
|
|
US8418173B2
(en)
|
2007-11-27 |
2013-04-09 |
Manageiq, Inc. |
Locating an unauthorized virtual machine and bypassing locator code by adjusting a boot pointer of a managed virtual machine in authorized environment
|
|
US8738905B2
(en)
*
|
2007-12-10 |
2014-05-27 |
International Business Machines Corporation |
Third party secured storage for web services and web applications
|
|
US8667595B2
(en)
*
|
2007-12-31 |
2014-03-04 |
Intel Corporation |
Method, apparatus and system for containing and localizing malware propagation
|
|
KR20100108417A
(ko)
*
|
2008-01-07 |
2010-10-06 |
스마트 테크놀러지스 유엘씨 |
다중 모니터 컴퓨터 시스템에서의 어플리케이션 관리 방법 및 이 방법을 채용한 다중 모니터 컴퓨터 시스템
|
|
US8104087B2
(en)
*
|
2008-01-08 |
2012-01-24 |
Triumfant, Inc. |
Systems and methods for automated data anomaly correction in a computer network
|
|
KR100881386B1
(ko)
|
2008-01-24 |
2009-02-02 |
주식회사 파수닷컴 |
프로세스 분리 실행을 통한 drm 클라이언트 충돌 방지 방법
|
|
US8468543B2
(en)
*
|
2008-01-25 |
2013-06-18 |
Fasoo.Com.Co.Ltd. |
System and method for preventing DRM client crash using process separate execution
|
|
US8201029B2
(en)
*
|
2008-01-31 |
2012-06-12 |
International Business Machines Corporation |
Method and apparatus for operating system event notification mechanism using file system interface
|
|
US8051111B2
(en)
|
2008-01-31 |
2011-11-01 |
Prowess Consulting, Llc |
Method and system for modularizing windows imaging format
|
|
US8719936B2
(en)
*
|
2008-02-01 |
2014-05-06 |
Northeastern University |
VMM-based intrusion detection system
|
|
GB2460393B
(en)
*
|
2008-02-29 |
2012-03-28 |
Advanced Risc Mach Ltd |
A data processing apparatus and method for controlling access to secure memory by virtual machines executing on processing circuitry
|
|
US20090241192A1
(en)
*
|
2008-03-21 |
2009-09-24 |
Thomas Andrew J |
Virtual machine configuration sharing between host and virtual machines and between virtual machines
|
|
US20090241194A1
(en)
*
|
2008-03-21 |
2009-09-24 |
Andrew James Thomas |
Virtual machine configuration sharing between host and virtual machines and between virtual machines
|
|
US8104083B1
(en)
*
|
2008-03-31 |
2012-01-24 |
Symantec Corporation |
Virtual machine file system content protection system and method
|
|
KR100931518B1
(ko)
*
|
2008-04-22 |
2009-12-14 |
주식회사 안철수연구소 |
가상 데스크탑을 이용한 프로그램 보호 방법
|
|
JP2009282751A
(ja)
*
|
2008-05-22 |
2009-12-03 |
Toyota Infotechnology Center Co Ltd |
プログラム検査システムおよび方法
|
|
US8443363B1
(en)
|
2008-05-30 |
2013-05-14 |
Symantec Corporation |
Coordinated virtualization activities
|
|
US8516478B1
(en)
*
|
2008-06-12 |
2013-08-20 |
Mcafee, Inc. |
Subsequent processing of scanning task utilizing subset of virtual machines predetermined to have scanner process and adjusting amount of subsequest VMs processing based on load
|
|
US8589474B2
(en)
*
|
2008-06-17 |
2013-11-19 |
Go Daddy Operating Company, LLC |
Systems and methods for software and file access via a domain name
|
|
US8522015B2
(en)
*
|
2008-06-27 |
2013-08-27 |
Microsoft Corporation |
Authentication of binaries in memory with proxy code execution
|
|
US8572692B2
(en)
*
|
2008-06-30 |
2013-10-29 |
Intel Corporation |
Method and system for a platform-based trust verifying service for multi-party verification
|
|
EP2304560B1
(en)
*
|
2008-07-21 |
2017-02-08 |
International Business Machines Corporation |
A method and system for improvements in or relating to off-line virtual environments
|
|
US8561137B2
(en)
*
|
2008-07-23 |
2013-10-15 |
Oracle International Corporation |
Techniques for identity authentication of virtualized machines
|
|
JP5446167B2
(ja)
*
|
2008-08-13 |
2014-03-19 |
富士通株式会社 |
ウイルス対策方法、コンピュータ、及びプログラム
|
|
CN101673215B
(zh)
*
|
2008-09-09 |
2012-12-12 |
联想(北京)有限公司 |
一种虚拟环境中用户管理装置及方法
|
|
US9098698B2
(en)
|
2008-09-12 |
2015-08-04 |
George Mason Research Foundation, Inc. |
Methods and apparatus for application isolation
|
|
US8799450B2
(en)
*
|
2008-10-14 |
2014-08-05 |
Mcafee, Inc. |
Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
|
|
US9450960B1
(en)
|
2008-11-05 |
2016-09-20 |
Symantec Corporation |
Virtual machine file system restriction system and method
|
|
US20100175108A1
(en)
*
|
2009-01-02 |
2010-07-08 |
Andre Protas |
Method and system for securing virtual machines by restricting access in connection with a vulnerability audit
|
|
US20100199351A1
(en)
*
|
2009-01-02 |
2010-08-05 |
Andre Protas |
Method and system for securing virtual machines by restricting access in connection with a vulnerability audit
|
|
US20100191784A1
(en)
*
|
2009-01-29 |
2010-07-29 |
Sobel William E |
Extending Secure Management of File Attribute Information to Virtual Hard Disks
|
|
US9177145B2
(en)
*
|
2009-03-24 |
2015-11-03 |
Sophos Limited |
Modified file tracking on virtual machines
|
|
US8510838B1
(en)
*
|
2009-04-08 |
2013-08-13 |
Trend Micro, Inc. |
Malware protection using file input/output virtualization
|
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
|
US9069983B1
(en)
*
|
2009-04-29 |
2015-06-30 |
Symantec Corporation |
Method and apparatus for protecting sensitive information from disclosure through virtual machines files
|
|
US20100312805A1
(en)
*
|
2009-05-08 |
2010-12-09 |
Noonan Iii Donal Charles |
System and method for capturing, managing, and distributing computer files
|
|
US20120060220A1
(en)
*
|
2009-05-15 |
2012-03-08 |
Invicta Networks, Inc. |
Systems and methods for computer security employing virtual computer systems
|
|
US8955108B2
(en)
*
|
2009-06-17 |
2015-02-10 |
Microsoft Corporation |
Security virtual machine for advanced auditing
|
|
US8839422B2
(en)
|
2009-06-30 |
2014-09-16 |
George Mason Research Foundation, Inc. |
Virtual browsing environment
|
|
DK2457153T3
(da)
*
|
2009-07-20 |
2017-02-06 |
Schneider Electric It Corp |
Metode og system til effektanalyse
|
|
US9569240B2
(en)
|
2009-07-21 |
2017-02-14 |
Adobe Systems Incorporated |
Method and system to provision and manage a computing application hosted by a virtual instance of a machine
|
|
US8332688B1
(en)
*
|
2009-07-21 |
2012-12-11 |
Adobe Systems Incorporated |
Failover and recovery of a computing application hosted by a virtual instance of a machine
|
|
US8732145B1
(en)
*
|
2009-07-22 |
2014-05-20 |
Intuit Inc. |
Virtual environment for data-described applications
|
|
US8613085B2
(en)
*
|
2009-07-22 |
2013-12-17 |
Broadcom Corporation |
Method and system for traffic management via virtual machine migration
|
|
US8661434B1
(en)
*
|
2009-08-05 |
2014-02-25 |
Trend Micro Incorporated |
Migration of computer security modules in a virtual machine environment
|
|
US8132057B2
(en)
*
|
2009-08-07 |
2012-03-06 |
International Business Machines Corporation |
Automated transition to a recovery kernel via firmware-assisted-dump flows providing automated operating system diagnosis and repair
|
|
US8635705B2
(en)
*
|
2009-09-25 |
2014-01-21 |
Intel Corporation |
Computer system and method with anti-malware
|
|
RU2427890C2
(ru)
*
|
2009-10-01 |
2011-08-27 |
ЗАО "Лаборатория Касперского" |
Система и способ сравнения файлов на основе шаблонов функциональности
|
|
US20110093902A1
(en)
*
|
2009-10-16 |
2011-04-21 |
At&T Intellectual Property I, L.P. |
System and Method to Process a Data Stream Having Different Content Types
|
|
KR101058993B1
(ko)
|
2009-10-26 |
2011-08-23 |
한국조폐공사 |
가상드라이브 방식의 스마트카드 테스트 장치 및 방법
|
|
US8640241B2
(en)
|
2009-11-16 |
2014-01-28 |
Quatum Corporation |
Data identification system
|
|
JP5140062B2
(ja)
*
|
2009-12-11 |
2013-02-06 |
株式会社日立製作所 |
仮想化環境におけるセキュリティ管理方法、仮想サーバ管理システム、および管理サーバ
|
|
WO2011069784A1
(en)
*
|
2009-12-11 |
2011-06-16 |
International Business Machines Corporation |
System and method of managing software content in virtual desktop environments
|
|
US8601284B2
(en)
|
2010-01-27 |
2013-12-03 |
International Business Machines Corporation |
Secure connected digital media platform
|
|
US20110191852A1
(en)
*
|
2010-01-30 |
2011-08-04 |
Scott Sanders |
Method to perform a security assessment on a clone of a virtual system
|
|
EP2354995B1
(en)
*
|
2010-02-09 |
2016-12-28 |
Siemens Aktiengesellschaft |
Software licensing in a virtual computing environment
|
|
US9703586B2
(en)
*
|
2010-02-17 |
2017-07-11 |
Microsoft Technology Licensing, Llc |
Distribution control and tracking mechanism of virtual machine appliances
|
|
US9665712B2
(en)
*
|
2010-02-22 |
2017-05-30 |
F-Secure Oyj |
Malware removal
|
|
US8621628B2
(en)
*
|
2010-02-25 |
2013-12-31 |
Microsoft Corporation |
Protecting user mode processes from improper tampering or termination
|
|
JP5440273B2
(ja)
*
|
2010-03-09 |
2014-03-12 |
富士通株式会社 |
スナップショット管理方法、スナップショット管理装置、及びプログラム
|
|
US8938782B2
(en)
*
|
2010-03-15 |
2015-01-20 |
Symantec Corporation |
Systems and methods for providing network access control in virtual environments
|
|
CA2737631C
(en)
|
2010-04-18 |
2014-07-15 |
Layer 7 Technologies Inc. |
Protected application stack and method and system of utilizing
|
|
US9811662B2
(en)
*
|
2010-05-03 |
2017-11-07 |
Panzura, Inc. |
Performing anti-virus checks for a distributed filesystem
|
|
US8839239B2
(en)
|
2010-06-15 |
2014-09-16 |
Microsoft Corporation |
Protection of virtual machines executing on a host device
|
|
US9106697B2
(en)
*
|
2010-06-24 |
2015-08-11 |
NeurallQ, Inc. |
System and method for identifying unauthorized activities on a computer system using a data structure model
|
|
US8789189B2
(en)
|
2010-06-24 |
2014-07-22 |
NeurallQ, Inc. |
System and method for sampling forensic data of unauthorized activities using executability states
|
|
US8667489B2
(en)
*
|
2010-06-29 |
2014-03-04 |
Symantec Corporation |
Systems and methods for sharing the results of analyses among virtual machines
|
|
US8782434B1
(en)
|
2010-07-15 |
2014-07-15 |
The Research Foundation For The State University Of New York |
System and method for validating program execution at run-time
|
|
KR101091777B1
(ko)
*
|
2010-07-16 |
2011-12-08 |
주식회사 파수닷컴 |
Drm 환경에서의 악성 코드 실시간 검사 장치 및 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체
|
|
US8458791B2
(en)
*
|
2010-08-18 |
2013-06-04 |
Southwest Research Institute |
Hardware-implemented hypervisor for root-of-trust monitoring and control of computer system
|
|
AU2011293160B2
(en)
*
|
2010-08-26 |
2015-04-09 |
Verisign, Inc. |
Method and system for automatic detection and analysis of malware
|
|
US8082585B1
(en)
*
|
2010-09-13 |
2011-12-20 |
Raymond R. Givonetti |
Protecting computers from malware using a hardware solution that is not alterable by any software
|
|
JP5508223B2
(ja)
*
|
2010-10-20 |
2014-05-28 |
株式会社日立製作所 |
個人識別システム及び方法
|
|
US9117091B2
(en)
|
2010-10-31 |
2015-08-25 |
Temporal Defense Systems, Llc |
System and method for securing virtual computing environments
|
|
US8910155B1
(en)
|
2010-11-02 |
2014-12-09 |
Symantec Corporation |
Methods and systems for injecting endpoint management agents into virtual machines
|
|
US20120144489A1
(en)
*
|
2010-12-07 |
2012-06-07 |
Microsoft Corporation |
Antimalware Protection of Virtual Machines
|
|
US8484465B1
(en)
|
2010-12-08 |
2013-07-09 |
Google Inc. |
Heterogeneous virtual machines sharing a security model
|
|
JP5739182B2
(ja)
|
2011-02-04 |
2015-06-24 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
制御システム、方法およびプログラム
|
|
RU2457533C1
(ru)
*
|
2011-02-10 |
2012-07-27 |
Государственное образовательное учреждение высшего профессионального образования Северо-Кавказский горно-металлургический институт (государственный технологический университет) (СКГМИ (ГТУ) |
Способ адаптивного управления пакетом антивирусных сканеров и система для его осуществления
|
|
JP5731223B2
(ja)
|
2011-02-14 |
2015-06-10 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体
|
|
JP5689333B2
(ja)
*
|
2011-02-15 |
2015-03-25 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
異常検知システム、異常検知装置、異常検知方法、プログラムおよび記録媒体
|
|
US8892788B2
(en)
|
2011-02-22 |
2014-11-18 |
Red Hat Israel, Ltd. |
Exposing a DMA engine to guests in a virtual machine system
|
|
US8959569B2
(en)
|
2011-03-18 |
2015-02-17 |
Juniper Networks, Inc. |
Security enforcement in virtualized systems
|
|
US9619262B2
(en)
*
|
2011-05-31 |
2017-04-11 |
Micro Focus Software Inc. |
Techniques for security auditing of cloud resources
|
|
US9298910B2
(en)
|
2011-06-08 |
2016-03-29 |
Mcafee, Inc. |
System and method for virtual partition monitoring
|
|
US8813233B1
(en)
*
|
2011-06-27 |
2014-08-19 |
Amazon Technologies, Inc. |
Machine image inspection
|
|
US10356106B2
(en)
|
2011-07-26 |
2019-07-16 |
Palo Alto Networks (Israel Analytics) Ltd. |
Detecting anomaly action within a computer network
|
|
US8566918B2
(en)
|
2011-08-15 |
2013-10-22 |
Bank Of America Corporation |
Method and apparatus for token-based container chaining
|
|
US8474056B2
(en)
*
|
2011-08-15 |
2013-06-25 |
Bank Of America Corporation |
Method and apparatus for token-based virtual machine recycling
|
|
US8752123B2
(en)
|
2011-08-15 |
2014-06-10 |
Bank Of America Corporation |
Apparatus and method for performing data tokenization
|
|
US9069943B2
(en)
|
2011-08-15 |
2015-06-30 |
Bank Of America Corporation |
Method and apparatus for token-based tamper detection
|
|
US8812830B2
(en)
|
2011-08-31 |
2014-08-19 |
Microsoft Corporation |
Attestation protocol for securely booting a guest operating system
|
|
US8850512B2
(en)
*
|
2011-10-13 |
2014-09-30 |
Mcafee, Inc. |
Security assessment of virtual machine environments
|
|
US20130111018A1
(en)
*
|
2011-10-28 |
2013-05-02 |
International Business Machines Coporation |
Passive monitoring of virtual systems using agent-less, offline indexing
|
|
US9313100B1
(en)
|
2011-11-14 |
2016-04-12 |
Amazon Technologies, Inc. |
Remote browsing session management
|
|
WO2013074041A1
(en)
|
2011-11-16 |
2013-05-23 |
V-Key Pte. Ltd. |
Cryptographic system and methodology for securing software cryptography
|
|
WO2013082437A1
(en)
|
2011-12-02 |
2013-06-06 |
Invincia, Inc. |
Methods and apparatus for control and detection of malicious content using a sandbox environment
|
|
US9330188B1
(en)
|
2011-12-22 |
2016-05-03 |
Amazon Technologies, Inc. |
Shared browsing sessions
|
|
CN102609299B
(zh)
*
|
2012-01-13 |
2015-03-11 |
深圳市深信服电子科技有限公司 |
虚拟化系统及其创建方法、装置
|
|
JP5814138B2
(ja)
*
|
2012-01-19 |
2015-11-17 |
株式会社エヌ・ティ・ティ・データ |
セキュリティ設定システム、セキュリティ設定方法およびプログラム
|
|
US9336321B1
(en)
|
2012-01-26 |
2016-05-10 |
Amazon Technologies, Inc. |
Remote browsing and searching
|
|
US8839087B1
(en)
|
2012-01-26 |
2014-09-16 |
Amazon Technologies, Inc. |
Remote browsing and searching
|
|
US8484732B1
(en)
|
2012-02-01 |
2013-07-09 |
Trend Micro Incorporated |
Protecting computers against virtual machine exploits
|
|
US9137210B1
(en)
|
2012-02-21 |
2015-09-15 |
Amazon Technologies, Inc. |
Remote browsing session management
|
|
US9116735B2
(en)
*
|
2012-03-07 |
2015-08-25 |
Microsoft Technology Licensing, Llc |
Offline provisioning of virtual machines
|
|
TWI450098B
(zh)
*
|
2012-06-19 |
2014-08-21 |
Acer Inc |
主控端電子裝置以及主控端操作方法
|
|
US8732791B2
(en)
*
|
2012-06-20 |
2014-05-20 |
Sophos Limited |
Multi-part internal-external process system for providing virtualization security protection
|
|
US10607007B2
(en)
|
2012-07-03 |
2020-03-31 |
Hewlett-Packard Development Company, L.P. |
Micro-virtual machine forensics and detection
|
|
US9092625B1
(en)
*
|
2012-07-03 |
2015-07-28 |
Bromium, Inc. |
Micro-virtual machine forensics and detection
|
|
US9122873B2
(en)
|
2012-09-14 |
2015-09-01 |
The Research Foundation For The State University Of New York |
Continuous run-time validation of program execution: a practical approach
|
|
US9069782B2
(en)
|
2012-10-01 |
2015-06-30 |
The Research Foundation For The State University Of New York |
System and method for security and privacy aware virtual machine checkpointing
|
|
FR2997811B1
(fr)
*
|
2012-11-05 |
2015-01-02 |
Viaccess Sa |
Dispositif de traitement de contenus multimedia mettant en oeuvre une pluralite de machines virtuelles.
|
|
CN103077261B
(zh)
*
|
2012-11-23 |
2015-12-02 |
厦门美亚中敏电子科技有限公司 |
一种虚拟环境智能修复的计算机动态仿真方法
|
|
US9922192B1
(en)
|
2012-12-07 |
2018-03-20 |
Bromium, Inc. |
Micro-virtual machine forensics and detection
|
|
US10341263B2
(en)
|
2012-12-10 |
2019-07-02 |
University Of Central Florida Research Foundation, Inc. |
System and method for routing network frames between virtual machines
|
|
US8763085B1
(en)
|
2012-12-19 |
2014-06-24 |
Trend Micro Incorporated |
Protection of remotely managed virtual machines
|
|
JP2013061994A
(ja)
*
|
2013-01-07 |
2013-04-04 |
Fujitsu Ltd |
ウイルス検出プログラム、ウイルス検出方法、監視プログラム、監視方法、及びコンピュータ
|
|
EP2946332B1
(en)
|
2013-01-16 |
2018-06-13 |
Palo Alto Networks (Israel Analytics) Ltd |
Automated forensics of computer systems using behavioral intelligence
|
|
US9560014B2
(en)
*
|
2013-01-23 |
2017-01-31 |
Mcafee, Inc. |
System and method for an endpoint hardware assisted network firewall in a security environment
|
|
KR101309657B1
(ko)
*
|
2013-03-13 |
2013-09-17 |
엘에스웨어(주) |
클라우드 컴퓨팅 환경에서의 호스트 기반 취약점 분석 시스템 및 방법
|
|
CN104219211B
(zh)
*
|
2013-06-03 |
2017-11-21 |
中国移动通信集团公司 |
一种云计算网络中网络安全的检测方法及装置
|
|
US10152463B1
(en)
|
2013-06-13 |
2018-12-11 |
Amazon Technologies, Inc. |
System for profiling page browsing interactions
|
|
US9578137B1
(en)
|
2013-06-13 |
2017-02-21 |
Amazon Technologies, Inc. |
System for enhancing script execution performance
|
|
US9280369B1
(en)
|
2013-07-12 |
2016-03-08 |
The Boeing Company |
Systems and methods of analyzing a software component
|
|
US9336025B2
(en)
|
2013-07-12 |
2016-05-10 |
The Boeing Company |
Systems and methods of analyzing a software component
|
|
US9396082B2
(en)
|
2013-07-12 |
2016-07-19 |
The Boeing Company |
Systems and methods of analyzing a software component
|
|
US9852290B1
(en)
|
2013-07-12 |
2017-12-26 |
The Boeing Company |
Systems and methods of analyzing a software component
|
|
US9280372B2
(en)
*
|
2013-08-12 |
2016-03-08 |
Amazon Technologies, Inc. |
Request processing techniques
|
|
US9479521B2
(en)
|
2013-09-30 |
2016-10-25 |
The Boeing Company |
Software network behavior analysis and identification system
|
|
US20160232350A1
(en)
*
|
2013-10-17 |
2016-08-11 |
Softcamp Co., Ltd. |
System and method for inspecting data through file format conversion
|
|
WO2015065330A1
(en)
*
|
2013-10-29 |
2015-05-07 |
Hewlett-Packard Development Company, L.P. |
Virtual machine introspection
|
|
CN103685235A
(zh)
*
|
2013-11-18 |
2014-03-26 |
汉柏科技有限公司 |
一种基于防火墙的三层网络虚拟化实现方法及系统
|
|
US9756069B1
(en)
*
|
2014-01-10 |
2017-09-05 |
Trend Micro Inc. |
Instant raw scan on host PC with virtualization technology
|
|
US20150205962A1
(en)
*
|
2014-01-23 |
2015-07-23 |
Cylent Systems, Inc. |
Behavioral analytics driven host-based malicious behavior and data exfiltration disruption
|
|
US10430614B2
(en)
|
2014-01-31 |
2019-10-01 |
Bromium, Inc. |
Automatic initiation of execution analysis
|
|
US20150304343A1
(en)
|
2014-04-18 |
2015-10-22 |
Intuit Inc. |
Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
|
|
JP6337498B2
(ja)
*
|
2014-02-18 |
2018-06-06 |
日本電気株式会社 |
復元装置、復元システム、復元方法、および、プログラム
|
|
US10757133B2
(en)
|
2014-02-21 |
2020-08-25 |
Intuit Inc. |
Method and system for creating and deploying virtual assets
|
|
US10121007B2
(en)
|
2014-02-21 |
2018-11-06 |
Intuit Inc. |
Method and system for providing a robust and efficient virtual asset vulnerability management and verification service
|
|
US9866581B2
(en)
|
2014-06-30 |
2018-01-09 |
Intuit Inc. |
Method and system for secure delivery of information to computing environments
|
|
TWI603266B
(zh)
|
2014-03-03 |
2017-10-21 |
廣達電腦股份有限公司 |
虛擬機器之資源調整方法及系統
|
|
US11294700B2
(en)
|
2014-04-18 |
2022-04-05 |
Intuit Inc. |
Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
|
|
RU2580030C2
(ru)
*
|
2014-04-18 |
2016-04-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ распределения задач антивирусной проверки между виртуальными машинами в виртуальной сети
|
|
US9356945B2
(en)
*
|
2014-07-17 |
2016-05-31 |
Check Point Advanced Threat Prevention Ltd |
Automatic content inspection system for exploit detection
|
|
US10102082B2
(en)
*
|
2014-07-31 |
2018-10-16 |
Intuit Inc. |
Method and system for providing automated self-healing virtual assets
|
|
JP2014225302A
(ja)
*
|
2014-09-08 |
2014-12-04 |
富士通株式会社 |
ウイルス検出プログラム、ウイルス検出方法、及びコンピュータ
|
|
US9716727B1
(en)
|
2014-09-30 |
2017-07-25 |
Palo Alto Networks, Inc. |
Generating a honey network configuration to emulate a target network environment
|
|
US9495188B1
(en)
|
2014-09-30 |
2016-11-15 |
Palo Alto Networks, Inc. |
Synchronizing a honey network configuration to reflect a target network environment
|
|
US10044675B1
(en)
|
2014-09-30 |
2018-08-07 |
Palo Alto Networks, Inc. |
Integrating a honey network with a target network to counter IP and peer-checking evasion techniques
|
|
US9860208B1
(en)
|
2014-09-30 |
2018-01-02 |
Palo Alto Networks, Inc. |
Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
|
|
US9882929B1
(en)
|
2014-09-30 |
2018-01-30 |
Palo Alto Networks, Inc. |
Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network
|
|
WO2016093182A1
(ja)
*
|
2014-12-09 |
2016-06-16 |
日本電信電話株式会社 |
特定装置、特定方法および特定プログラム
|
|
WO2016112219A1
(en)
|
2015-01-07 |
2016-07-14 |
CounterTack, Inc. |
System and method for monitoring a computer system using machine interpretable code
|
|
US9560078B2
(en)
|
2015-02-04 |
2017-01-31 |
Intel Corporation |
Technologies for scalable security architecture of virtualized networks
|
|
US9864701B1
(en)
*
|
2015-03-10 |
2018-01-09 |
Amazon Technologies, Inc. |
Resource mapping for an input/output device
|
|
US9563777B2
(en)
|
2015-04-29 |
2017-02-07 |
International Business Machines Corporation |
Security policy generation based on snapshots of similar virtual machines
|
|
US10567395B2
(en)
|
2015-05-10 |
2020-02-18 |
Check Point Advanced Threat Prevention Ltd |
Detection of potentially malicious web content by emulating user behavior and user environment
|
|
US10956571B2
(en)
*
|
2015-05-15 |
2021-03-23 |
Intel Corporation |
Kernel runtime integrity using processor assists
|
|
US10075461B2
(en)
|
2015-05-31 |
2018-09-11 |
Palo Alto Networks (Israel Analytics) Ltd. |
Detection of anomalous administrative actions
|
|
US11113086B1
(en)
|
2015-06-30 |
2021-09-07 |
Fireeye, Inc. |
Virtual system and method for securing external network connectivity
|
|
US10726127B1
(en)
|
2015-06-30 |
2020-07-28 |
Fireeye, Inc. |
System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
|
|
RU2618947C2
(ru)
*
|
2015-06-30 |
2017-05-11 |
Закрытое акционерное общество "Лаборатория Касперского" |
Способ предотвращения работы программ, содержащих нежелательный для пользователя функционал
|
|
US10642753B1
(en)
|
2015-06-30 |
2020-05-05 |
Fireeye, Inc. |
System and method for protecting a software component running in virtual machine using a virtualization layer
|
|
US10395029B1
(en)
*
|
2015-06-30 |
2019-08-27 |
Fireeye, Inc. |
Virtual system and method with threat protection
|
|
US9742796B1
(en)
|
2015-09-18 |
2017-08-22 |
Palo Alto Networks, Inc. |
Automatic repair of corrupt files for a detonation engine
|
|
US9977894B2
(en)
*
|
2015-11-18 |
2018-05-22 |
Red Hat, Inc. |
Virtual machine malware scanning
|
|
US10142365B2
(en)
*
|
2016-01-22 |
2018-11-27 |
The Boeing Company |
System and methods for responding to cybersecurity threats
|
|
CN105787382B
(zh)
*
|
2016-01-28 |
2018-12-21 |
东软集团股份有限公司 |
访问控制方法和装置
|
|
RU2628923C1
(ru)
*
|
2016-05-20 |
2017-08-22 |
Акционерное общество "Лаборатория Касперского" |
Система и способ распределения файлов между виртуальными машинами, входящими в распределённую систему виртуальных машин, для выполнения антивирусной проверки
|
|
CN105912931A
(zh)
*
|
2016-05-23 |
2016-08-31 |
北京北信源软件股份有限公司 |
一种虚拟化环境下修复离线虚拟机漏洞的方法及系统
|
|
WO2017219362A1
(zh)
*
|
2016-06-24 |
2017-12-28 |
阿贝尔环球国际有限公司 |
终端装置及其终端操作系统与云端装置及其云端操作系统
|
|
KR102208938B1
(ko)
|
2016-06-24 |
2021-01-27 |
지멘스 악티엔게젤샤프트 |
Plc 가상 패칭 및 보안 콘텍스트의 자동화된 배포
|
|
US10686829B2
(en)
|
2016-09-05 |
2020-06-16 |
Palo Alto Networks (Israel Analytics) Ltd. |
Identifying changes in use of user credentials
|
|
US9578066B1
(en)
*
|
2016-09-14 |
2017-02-21 |
Hytrust, Inc. |
Systems and method for assuring security governance in managed computer systems
|
|
US10503895B2
(en)
|
2017-04-11 |
2019-12-10 |
Red Hat, Inc. |
Runtime non-intrusive container security introspection and remediation
|
|
US10333987B2
(en)
*
|
2017-05-18 |
2019-06-25 |
Bank Of America Corporation |
Security enhancement tool for a target computer system operating within a complex web of interconnected systems
|
|
CN107463428B
(zh)
*
|
2017-06-29 |
2020-06-02 |
北京北信源软件股份有限公司 |
一种用于虚拟化环境下的补丁管理方法和装置
|
|
US10333951B1
(en)
*
|
2017-07-31 |
2019-06-25 |
EMC IP Holding Company LLC |
Method and system for implementing golden container storage
|
|
US10621357B2
(en)
*
|
2017-08-31 |
2020-04-14 |
Microsoft Technology Licensing, Llc |
Off node scanning
|
|
US10652213B2
(en)
|
2017-12-18 |
2020-05-12 |
Nicira, Inc. |
Agent-less micro-segmentation of a network
|
|
US11328055B2
(en)
|
2018-01-31 |
2022-05-10 |
Hewlett-Packard Development Company, L.P. |
Process verification
|
|
US10999304B2
(en)
|
2018-04-11 |
2021-05-04 |
Palo Alto Networks (Israel Analytics) Ltd. |
Bind shell attack detection
|
|
RU2690415C1
(ru)
*
|
2018-08-20 |
2019-06-03 |
Акционерное Общество "Нппкт" |
Технология автоматического запуска операционной системы на аппаратной платформе с элементами, не поддерживаемыми модулями операционной системы, при включении компьютера
|
|
US11184378B2
(en)
|
2019-01-30 |
2021-11-23 |
Palo Alto Networks (Israel Analytics) Ltd. |
Scanner probe detection
|
|
US11184376B2
(en)
|
2019-01-30 |
2021-11-23 |
Palo Alto Networks (Israel Analytics) Ltd. |
Port scan detection using destination profiles
|
|
US11070569B2
(en)
|
2019-01-30 |
2021-07-20 |
Palo Alto Networks (Israel Analytics) Ltd. |
Detecting outlier pairs of scanned ports
|
|
US11184377B2
(en)
|
2019-01-30 |
2021-11-23 |
Palo Alto Networks (Israel Analytics) Ltd. |
Malicious port scan detection using source profiles
|
|
US11316872B2
(en)
|
2019-01-30 |
2022-04-26 |
Palo Alto Networks (Israel Analytics) Ltd. |
Malicious port scan detection using port profiles
|
|
CN110764869A
(zh)
*
|
2019-09-11 |
2020-02-07 |
沪东中华造船(集团)有限公司 |
一种基于多个虚拟系统的船舶生产用能状况实时监控系统
|
|
US11271907B2
(en)
|
2019-12-19 |
2022-03-08 |
Palo Alto Networks, Inc. |
Smart proxy for a large scale high-interaction honeypot farm
|
|
US11265346B2
(en)
|
2019-12-19 |
2022-03-01 |
Palo Alto Networks, Inc. |
Large scale high-interactive honeypot farm
|
|
US11012492B1
(en)
|
2019-12-26 |
2021-05-18 |
Palo Alto Networks (Israel Analytics) Ltd. |
Human activity detection in computing device transmissions
|
|
US11604876B2
(en)
*
|
2020-01-28 |
2023-03-14 |
Rubrik, Inc. |
Malware protection for virtual machines
|
|
US11616805B2
(en)
*
|
2020-01-28 |
2023-03-28 |
Rubrik, Inc. |
Malware protection for virtual machines
|
|
CN115053222B
(zh)
|
2020-02-07 |
2025-08-15 |
百可德罗德公司 |
通过主机与虚拟来宾之间的受控交互来创建隔离工作区的方法和系统
|
|
US11640461B2
(en)
*
|
2020-03-06 |
2023-05-02 |
Rubrik, Inc. |
Secure runtime for virtual machines
|
|
US11875187B2
(en)
|
2020-03-06 |
2024-01-16 |
Rubrik, Inc. |
Secure runtime for virtual machines
|
|
EP3940565A1
(en)
*
|
2020-07-15 |
2022-01-19 |
Hewlett-Packard Development Company, L.P. |
System management states
|
|
US11762678B2
(en)
*
|
2020-07-16 |
2023-09-19 |
Twistlock, Ltd. |
Efficient virtual machine scanning
|
|
WO2022047415A1
(en)
*
|
2020-08-31 |
2022-03-03 |
Qomplx, Inc. |
System and method for secure evaluation of cyber detection products
|
|
US11509680B2
(en)
|
2020-09-30 |
2022-11-22 |
Palo Alto Networks (Israel Analytics) Ltd. |
Classification of cyber-alerts into security incidents
|
|
US11775655B2
(en)
|
2021-05-11 |
2023-10-03 |
International Business Machines Corporation |
Risk assessment of a container build
|
|
US12039017B2
(en)
|
2021-10-20 |
2024-07-16 |
Palo Alto Networks (Israel Analytics) Ltd. |
User entity normalization and association
|
|
EP4427452A4
(en)
*
|
2021-11-05 |
2025-09-03 |
Get A Head Inc |
APPARATUS AND METHODS FOR REMOTE MONITORING OF PROVIDERS OF CONSULTING OR MEDICAL SERVICES
|
|
US11799880B2
(en)
|
2022-01-10 |
2023-10-24 |
Palo Alto Networks (Israel Analytics) Ltd. |
Network adaptive alert prioritization system
|
|
US12438902B2
(en)
|
2022-11-09 |
2025-10-07 |
Rapid7, Inc. |
Event-driven monitoring of resources in a cloud computing environment
|