SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
34Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 176732
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 33452
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 4146
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 30118
 
 
 
H04M TELEPHONIC COMMUNICATION 14129
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 12160
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 10191
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION949
 
 
 
H04W WIRELESS COMMUNICATION NETWORKS 8133
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 735

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2015/0026,455 SYSTEMS AND METHODS FOR SECURING EMAIL IN MOBILE DEVICESJul 19, 13Jan 22, 15[H04L]
2015/0026,676 SYSTEMS AND METHODS FOR INSTANTLY RESTORING VIRTUAL MACHINES IN HIGH INPUT/OUTPUT LOAD ENVIRONMENTSJul 17, 13Jan 22, 15[G06F]
2015/0020,197 IDENTIFYING MISUSE OF LEGITIMATE OBJECTSJul 11, 13Jan 15, 15[G06F]
2015/0007,315 Techniques for Detecting a Security VulnerabilityJun 28, 13Jan 01, 15[G06F]
2015/0007,332 SYSTEMS AND METHODS FOR DIRECTING APPLICATION UPDATESJun 26, 13Jan 01, 15[G06F]
2014/0337,591 SYSTEMS AND METHODS FOR INCREASING RESTORE SPEEDS OF BACKUPS STORED IN DEDUPLICATED STORAGE SYSTEMSMay 07, 13Nov 13, 14[G06F]
2014/0331,320 TECHNIQUES FOR DETECTING MALICIOUS ACTIVITYMay 03, 13Nov 06, 14[G06F]
2014/0325,664 SYSTEMS AND METHODS FOR REPLACING APPLICATION METHODS AT RUNTIMEApr 24, 13Oct 30, 14[G06F]
2014/0304,764 METHOD AND APPARATUS FOR INTEGRATING SECURITY CONTEXT IN NETWORK ROUTING DECISIONSApr 03, 13Oct 09, 14[H04L]
2014/0304,786 RESILIENT AND RESTORABLE DYNAMIC DEVICE IDENTIFICATIONApr 03, 13Oct 09, 14[G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,938,369 Systems and methods for ensuring that critical computing decisions are intentionally madeMar 15, 11Jan 20, 15[G06F]
8,938,420 Systems and methods for natural batching of I/O operations on a replication logJul 26, 12Jan 20, 15[G06F]
8,938,479 Systems and methods for dynamically selecting a logical location for an indexApr 01, 10Jan 20, 15[G06F]
8,938,492 Enabling efficient review of media objects associated with a client deviceSep 11, 09Jan 20, 15[G06F]
8,938,508 Correlating web and email attributes to detect spamJul 22, 10Jan 20, 15[G06F]
8,938,639 Systems and methods for performing fast failoversFeb 24, 12Jan 20, 15[G06F]
8,938,643 Cloning using streaming restoreApr 22, 11Jan 20, 15[G06F]
8,938,782 Systems and methods for providing network access control in virtual environmentsMar 15, 10Jan 20, 15[G06F]
8,938,808 Systems and methods for using virtualization to implement information rights managementMar 01, 10Jan 20, 15[H04L, G06F]
8,935,154 Systems and methods for determining authorship of an unclassified notification messageApr 13, 12Jan 13, 15[G06F]
8,935,215 Optimized index usage for data restoreApr 29, 11Jan 13, 15[G06F]
8,935,284 Systems and methods for associating website browsing behavior with a spam mailing listJul 15, 10Jan 13, 15[G06F]
8,935,563 Systems and methods for facilitating substantially continuous availability of multi-tier applications within computer clustersJun 15, 12Jan 13, 15[G06F]
8,935,695 Systems and methods for managing multipathing configurations for virtual machinesJul 12, 12Jan 13, 15[G06F]
8,935,752 System and method for identity consolidationMar 23, 09Jan 13, 15[H04L, G06F]
8,935,784 Protecting subscribers of web feeds from malware attacksMar 15, 13Jan 13, 15[G06F]
8,930,309 Interval-controlled replicationFeb 29, 12Jan 06, 15[G06F]
8,930,333 Lockahead for simultaneous readers and writers in a clustered file systemMay 03, 11Jan 06, 15[G06F]
8,930,423 Method and system for restoring encrypted files from a virtual machine imageDec 30, 08Jan 06, 15[H04K, H04L, G06F]
8,930,462 Techniques for enforcing data sharing policies on a collaboration platformJul 05, 11Jan 06, 15[G06F]
8,930,528 Method and system for partitioning directoriesAug 16, 10Jan 06, 15[G06F]
8,930,539 Method and apparatus for optimizing resource utilization within a cluster and facilitating high availability for an applicationMar 26, 09Jan 06, 15[G06F]
8,930,620 Host discovery and handling of ALUA preferences and state transitionsNov 12, 10Jan 06, 15[G06F]
8,930,654 Method and apparatus for mapping virtual drivesMay 22, 14Jan 06, 15[G06F]
8,930,762 Optimal tracking of cluster-wide shared storage connectivity for graceful error handlingDec 18, 12Jan 06, 15[G06F]
8,931,041 Method and system for visibility and control over access transactions between clouds using resource authorization messagesJul 29, 11Jan 06, 15[H04L, G06F]
8,931,061 Techniques for providing access to data in dynamic shared accountsMar 19, 12Jan 06, 15[H04L, G06F]
8,931,086 Method and apparatus for reducing false positive detection of malwareSep 26, 08Jan 06, 15[H04L, G06F]
8,931,097 Method, computer software, and system for providing end to end security protection of an online transactionApr 09, 12Jan 06, 15[G06Q, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.