SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
35Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 164435
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 28847
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 3746
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 26113
 
 
 
H04M TELEPHONIC COMMUNICATION 13129
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 11153
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 9191
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION846
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 6134
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 635

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0208,421 SECURE AND SCALABLE DETECTION OF PRESELECTED DATA EMBEDDED IN ELECTRONICALLY TRANSMITTED MESSAGESJan 08, 14Jul 24, 14[H04L]
2014/0201,208 Classifying Samples Using ClusteringJan 15, 13Jul 17, 14[G06F]
2014/0201,824 SYSTEMS AND METHODS FOR PROVIDING ACCESS TO DATA ACCOUNTS WITHIN USER PROFILES VIA CLOUD-BASED STORAGE SERVICESJan 15, 13Jul 17, 14[H04L]
2014/0189,784 SYSTEMS AND METHODS FOR ENFORCING DATA-LOSS-PREVENTION POLICIES USING MOBILE SENSORSJan 02, 13Jul 03, 14[G06F]
2014/0189,873 SYSTEM AND METHOD FOR VULNERABILITY RISK ANALYSISMay 21, 10Jul 03, 14[G06F]
2014/0181,983 IDENTIFYING PRIMARILY MONOSEMOUS KEYWORDS TO INCLUDE IN KEYWORD LISTS FOR DETECTION OF DOMAIN-SPECIFIC LANGUAGEDec 20, 12Jun 26, 14[G06F]
2014/0172,760 USER INTERFACE AND WORKFLOW FOR PERFORMING MACHINE LEARNINGFeb 19, 14Jun 19, 14[G06N]
2014/0173,113 Providing Optimized Quality of Service to Prioritized Virtual Machines and Applications Based on Quality of Shared ResourcesDec 19, 12Jun 19, 14[H04L]
2014/0156,588 SYSTEMS AND METHODS FOR PERFORMING CUSTOMIZED LARGE-SCALE DATA ANALYTICSSep 12, 13Jun 05, 14[G06F]
2014/0157,363 METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENTDec 05, 12Jun 05, 14[H04L]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,812,436 Schedule based data lifecycle managementMay 04, 10Aug 19, 14[G06F]
8,812,567 Creating a unification directory that unifies a plurality of file system directoriesAug 17, 12Aug 19, 14[G06F]
8,812,860 Systems and methods for protecting data stored on removable storage devices by requiring external user authenticationDec 03, 10Aug 19, 14[H04L, G06F]
8,812,874 Content deduplication in enterprise rights managementMar 31, 09Aug 19, 14[G06F]
8,813,071 Storage reclamation systems and methodsJan 31, 11Aug 19, 14[G06F]
8,813,103 Methods and systems for handling component-object-model communicationsJan 07, 13Aug 19, 14[G06F]
8,813,174 Embedded security blades for cloud service providersDec 30, 11Aug 19, 14[H04L]
8,813,176 Method and apparatus for creating an information security policy based on a pre-configured templateJun 25, 12Aug 19, 14[H04L]
8,813,214 Method and system for providing secure peer-to-peer file transfersAug 12, 11Aug 19, 14[G06F]
8,805,406 Usage of geo-tagging information from media files to determine gaps in location information for mobile devicesAug 23, 12Aug 12, 14[H04W]
8,805,849 Enabling use of analytic functions for distributed storage system dataJun 20, 12Aug 12, 14[G06F]
8,805,888 Systems and methods for maintaining group membership recordsFeb 27, 13Aug 12, 14[G06F]
8,805,978 Distributed cluster reconfigurationFeb 28, 12Aug 12, 14[G06F]
8,805,995 Capturing data relating to a threatMay 26, 09Aug 12, 14[G06F]
8,805,996 Analysis of communications in social networksFeb 12, 10Aug 12, 14[G06F]
8,806,046 Application streaming and network file system optimization via integration with identity management solutionsMar 31, 08Aug 12, 14[G06F]
8,806,062 Adaptive compression using a sampling based heuristicMar 27, 09Aug 12, 14[H04L, G06F]
8,806,159 Data storage resource management systems and methodsApr 08, 11Aug 12, 14[G06F]
8,806,277 Systems and methods for fetching troubleshooting dataFeb 01, 12Aug 12, 14[G06F]
8,806,281 Systems and methods for displaying backup-status information for computing resourcesJan 23, 12Aug 12, 14[G06F]
8,806,599 Systems and methods for implementing multi-factor authenticationJun 11, 12Aug 12, 14[H04L]
8,806,625 Systems and methods for performing security scansOct 02, 12Aug 12, 14[G06F]
8,806,626 Using aggregated DNS information originating from multiple sources to detect anomalous DNS name resolutionsOct 29, 12Aug 12, 14[H04L, G06F]
8,806,638 Systems and methods for protecting networks from infected computing devicesDec 10, 10Aug 12, 14[G06F]
8,806,641 Systems and methods for detecting malware variantsNov 15, 11Aug 12, 14[G06F, G08B]
8,806,643 Identifying trojanized applications for mobile environmentsJan 25, 12Aug 12, 14[G06F]
8,806,644 Using expectation measures to identify relevant application analysis resultsMay 25, 12Aug 12, 14[H04L, G06F]
8,806,651 Method and apparatus for automating controlled computing environment protectionDec 18, 08Aug 12, 14[G06F]
8,799,222 Host based software block level replication using metadata indicating changed data objects at source and secondary nodesDec 17, 10Aug 05, 14[G06F]
8,799,223 Techniques for data backup managementMay 02, 11Aug 05, 14[G06F]
8,799,287 Method and apparatus for categorizing documents containing sensitive informationApr 06, 10Aug 05, 14[G06F]
8,799,494 Application streaming proactive failoverFeb 04, 08Aug 05, 14[H04L, G06F]
8,799,646 Methods and systems for authenticating devicesDec 23, 11Aug 05, 14[H04L]
8,800,030 Individualized time-to-live for reputation scores of computer filesSep 15, 09Aug 05, 14[H04L, G06F]
8,800,040 Methods and systems for prioritizing the monitoring of malicious uniform resource locators for new malware variantsDec 31, 08Aug 05, 14[H04L]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.