SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
33Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 172834
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 32350
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 4150
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 29116
 
 
 
H04M TELEPHONIC COMMUNICATION 14127
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 12159
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 10196
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION849
 
 
 
H04W WIRELESS COMMUNICATION NETWORKS 8130
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 734

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0337,591 SYSTEMS AND METHODS FOR INCREASING RESTORE SPEEDS OF BACKUPS STORED IN DEDUPLICATED STORAGE SYSTEMSMay 07, 13Nov 13, 14[G06F]
2014/0331,320 TECHNIQUES FOR DETECTING MALICIOUS ACTIVITYMay 03, 13Nov 06, 14[G06F]
2014/0304,764 METHOD AND APPARATUS FOR INTEGRATING SECURITY CONTEXT IN NETWORK ROUTING DECISIONSApr 03, 13Oct 09, 14[H04L]
2014/0304,786 RESILIENT AND RESTORABLE DYNAMIC DEVICE IDENTIFICATIONApr 03, 13Oct 09, 14[G06F]
2014/0279,884 SYSTEMS AND METHODS FOR DISTRIBUTING REPLICATION TASKS WITHIN COMPUTING CLUSTERSApr 04, 13Sep 18, 14[G06F]
2014/0281,273 Providing Local Cache Coherency in a Shared Storage EnvironmentMar 15, 13Sep 18, 14[G06F]
2014/0282,518 ENFORCING POLICY-BASED COMPLIANCE OF VIRTUAL MACHINE IMAGE CONFIGURATIONSMar 15, 13Sep 18, 14[G06F]
2014/0282,821 SYSTEMS AND METHODS FOR IDENTIFYING A SECURE APPLICATION WHEN CONNECTING TO A NETWORKMar 15, 13Sep 18, 14[H04L]
2014/0283,035 TECHNIQUES FOR PREDICTING AND PROTECTING SPEARPHISHING TARGETSMar 15, 13Sep 18, 14[H04L]
2014/0283,082 SYSTEMS AND METHODS FOR DETERMINING POTENTIAL IMPACTS OF APPLICATIONS ON THE SECURITY OF COMPUTING SYSTEMSMar 15, 13Sep 18, 14[G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,911,507 Systems and methods for mitigating mobile device lossNov 22, 11Dec 16, 14[H04L, H04W, G06F]
8,914,324 De-duplication storage system with improved reference update efficiencyOct 16, 09Dec 16, 14[G06F]
8,914,345 Systems and methods for host communication in a clustered file systemOct 08, 12Dec 16, 14[G06F]
8,914,412 Determining file ownership of active and inactive files based on file access historyApr 07, 11Dec 16, 14[G06Q, G06F]
8,914,633 Systems and methods for validating client authentication using protected timing dataJul 21, 11Dec 16, 14[H04L]
8,914,767 Systems and methods for using quick response codes to activate software applicationsMar 12, 12Dec 16, 14[G06F]
8,914,888 Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified processOct 21, 09Dec 16, 14[G06F]
8,908,866 Method and apparatus to provide authentication and privacy with low complexity devicesApr 13, 12Dec 09, 14[H04L, G06F]
8,909,845 Systems and methods for identifying candidate duplicate memory pages in a virtual environmentNov 15, 10Dec 09, 14[G06F]
8,910,155 Methods and systems for injecting endpoint management agents into virtual machinesNov 02, 10Dec 09, 14[H04L, G06F]
8,910,160 Handling of virtual machine migration while performing clustering operationsJun 11, 12Dec 09, 14[G06F]
8,910,172 Application resource switchover systems and methodsDec 29, 10Dec 09, 14[G06F]
8,902,736 Selecting an alternative path for an input/output requestApr 07, 11Dec 02, 14[H04L, G06F]
8,903,120 System and method for providing an image having an embedded matrix codeDec 21, 11Dec 02, 14[G06K]
8,903,777 Application backup using unified backup methodologiesMar 17, 09Dec 02, 14[G06F]
8,903,860 Method and system for identification of data owner in an unstructured data environmentMar 15, 10Dec 02, 14[G06T, G06Q, G06F]
8,903,941 Method and apparatus for safe web browsingSep 14, 09Dec 02, 14[G06F]
8,903,986 Real-time identification of URLs accessed by automated processesApr 05, 10Dec 02, 14[G06F]
8,904,117 Non-shared write-back caches in a cluster environmentDec 21, 12Dec 02, 14[G06F]
8,904,125 Systems and methods for creating reference-based synthetic backupsSep 03, 09Dec 02, 14[G06F]
8,904,136 Optimized shrinking of virtual disksMar 15, 11Dec 02, 14[G06F]
8,904,137 Deduplication system space recycling through inode manipulationMay 12, 11Dec 02, 14[G06F]
8,904,169 Just in time trust establishment and propagationSep 15, 09Dec 02, 14[H04L]
8,904,503 Systems and methods for providing access to data accounts within user profiles via cloud-based storage servicesJan 15, 13Dec 02, 14[H04L, G06F]
8,904,520 Communication-based reputation systemMar 19, 09Dec 02, 14[H04L]
8,904,538 Systems and methods for user-directed malware remediationMar 13, 12Dec 02, 14[G06F]
8,904,540 Method and apparatus for evaluating hygiene of a computerDec 17, 08Dec 02, 14[G06F]
8,898,115 Systems and methods for using data archiving to expedite server migrationFeb 12, 13Nov 25, 14[G06F]
8,898,120 Systems and methods for distributed data deduplicationOct 09, 11Nov 25, 14[G06F]
8,898,663 Storage visibility in virtual environmentsDec 16, 09Nov 25, 14[G06F]
8,898,777 Systems and methods for detecting user activities to identify deceptive activityOct 14, 11Nov 25, 14[H04L, G06F]
8,898,779 Data loss prevention of information using structured document templates and formsFeb 03, 12Nov 25, 14[H04L, G06F]
8,898,806 Systems and methods for protecting servicesDec 15, 11Nov 25, 14[H04L, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.