SYMANTEC CORPORATION

Patent Owner

Follow Compare Add to Portfolio 22Status Updates

Stats

Details

Patent Activity in the Last 10 Years

Technologies

Intl Class Technology Matters Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 137555
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 47951
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 5241
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 38128
 
 
 
H04W WIRELESS COMMUNICATION NETWORKS 16150
 
 
 
H04M TELEPHONIC COMMUNICATION 14134
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 13203
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 12173
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 1143
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 8146

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2016/0149,930 SYSTEMS AND METHODS FOR PROTECTING AGAINST UNAUTHORIZED NETWORK INTRUSIONSNov 21, 14May 26, 16[H04L]
2016/0103,992 SYSTEMS AND METHODS FOR CLASSIFYING SECURITY EVENTS AS TARGETED ATTACKSOct 14, 14Apr 14, 16[H04L, G06F]
2016/0085,962 SYSTEMS AND METHODS FOR UPDATING POSSESSION FACTOR CREDENTIALSSep 22, 14Mar 24, 16[G06F]
2016/0070,905 SYSTEMS AND METHODS FOR DETECTING ATTEMPTS TO TRANSMIT SENSITIVE INFORMATION VIA DATA-DISTRIBUTION CHANNELSSep 10, 14Mar 10, 16[G06F]
2016/0063,218 SYSTEMS AND METHODS FOR HANDLING FRAUDULENT USES OF BRANDSAug 26, 14Mar 03, 16[H04L, G06F]
2016/0065,618 Method and Apparatus for Automating Security Provisioning of WorkloadsSep 02, 14Mar 03, 16[H04L, G06F]
2015/0363,198 DYNAMIC CALL TRACKING METHOD BASED ON CPU INTERRUPT INSTRUCTIONS TO IMPROVE DISASSEMBLY QUALITY OF INDIRECT CALLSJun 16, 14Dec 17, 15[G06F]
2015/0350,195 SEAMLESS AUTHENTICATION MECHANISM FOR USER PROCESSES AND WEB SERVICES RESIDING ON COMMON HOSTJun 02, 14Dec 03, 15[H04L]
2015/0341,342 AUTOMATED STEP-UP DIGITAL CERTIFICATE INSTALLATION PROCESSMay 23, 14Nov 26, 15[H04L]
2015/0324,303 SYSTEMS AND METHODS FOR SECURE HYBRID THIRD-PARTY DATA STORAGEMay 22, 15Nov 12, 15[H04L, G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
9,350,755 Method and apparatus for detecting malicious software transmission through a web portalMar 20, 09May 24, 16[H04L]
9,350,761 System for the distribution and deployment of applications, with provisions for security and policy conformanceAug 01, 14May 24, 16[H04L]
9,342,381 Method and system for establishing a DLP-compliant environmentDec 27, 11May 17, 16[H04L, G06F]
9,342,550 Systems and methods for preventing data loss via temporary-file generating applicationsJul 17, 13May 17, 16[G06F]
D756371 Display screen with graphical user interfaceDec 02, 13May 17, 16[1404]
D756372 Display screen with graphical user interfaceDec 02, 13May 17, 16[1404]
9,336,384 Systems and methods for replacing application methods at runtimeApr 24, 13May 10, 16[H04L, G06F]
9,338,012 Systems and methods for identifying code signing certificate misuseOct 04, 13May 10, 16[H04L]
9,338,164 Two-way authentication using two-dimensional codesApr 14, 14May 10, 16[H04L]
9,330,254 Systems and methods for preventing the installation of unapproved applicationsAug 19, 14May 03, 16[G06F]
9,330,258 Systems and methods for identifying uniform resource locators that link to potentially malicious resourcesSep 30, 13May 03, 16[H04L, G06F]
9,330,260 Detecting auto-start malware by checking its aggressive load point behaviorsJul 25, 13May 03, 16[H04L, G06F]
9,330,273 Systems and methods for increasing compliance with data loss prevention policiesMay 02, 14May 03, 16[H04L, G06F]
9,330,274 Methods and systems for applying parental-control policies to media filesMar 13, 09May 03, 16[H04W, G06F]
9,331,856 Systems and methods for validating digital signaturesFeb 10, 14May 03, 16[H04L, G06F]
9,332,003 Systems and methods for discovering website certificate informationMay 03, 14May 03, 16[H04L]
9,332,022 Systems and methods for detecting suspicious internet addressesJul 07, 14May 03, 16[H04L]
9,332,023 Uploading signatures to gateway level unified threat management devices after endpoint level behavior based detection of zero day threatsAug 25, 14May 03, 16[H04L, G06F]
9,332,025 Systems and methods for detecting suspicious filesDec 23, 13May 03, 16[H04L]
9,332,030 Systems and methods for thwarting illegitimate initialization attemptsSep 12, 14May 03, 16[H04L, G06F]
9,332,033 Methods and systems for enabling community-tested security features for legacy applicationsJan 24, 14May 03, 16[H04L, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Status Filing Date Issue/Pub Date Intl Class
2015/0231,039 Apparatus for Containing RegurgitationABANFeb 18, 14Aug 20, 15[A61J, B65D]
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processWithdrawnAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresWithdrawnOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceABANAug 31, 10Mar 01, 12[G06F]
8,031,535 Semiconductor memory apparatusExpiredDec 29, 08Oct 04, 11[G11C]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesABANOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsWithdrawnNov 30, 06Aug 10, 10[G06F]
2010/0191,784 Extending Secure Management of File Attribute Information to Virtual Hard DisksABANJan 29, 09Jul 29, 10[G06F]
2010/0161,146 VARIABLE ENERGY PRICING IN SHORTAGE CONDITIONSABANDec 23, 08Jun 24, 10[G05B]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesABANDec 02, 08Jun 03, 10[H04L, G06F]
2010/0138,927 Apparatus and Method for Preventing Unauthorized Access to Secure InformationABANDec 02, 08Jun 03, 10[G06F]
2010/0017,889 Control of Website Usage Via Online Storage of Restricted Authentication CredentialsABANJul 17, 08Jan 21, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYABANJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementWithdrawnAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysABANDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSABANDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONABANMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingABANJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeABANJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesABANJul 06, 07Jan 08, 09[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.