SYMANTEC CORPORATION

Patent Owner

Compare
22Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents Rank
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 130326
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 22246
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 3344
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 1677
 
 
 
H04M TELEPHONIC COMMUNICATION 12122
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 11138
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION843
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 8156
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 5123
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 522

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0101,113 Locality Aware, Two-Level Fingerprint CachingOct 08, 12Apr 10, 14[G06F]
2014/0089,279 AUTOMATED SEPARATION OF CORPORATE AND PRIVATE DATA FOR BACKUP AND ARCHIVINGDec 04, 13Mar 27, 14[G06F]
2014/0075,554 SYSTEMS AND METHODS FOR PERFORMING SELECTIVE DEEP PACKET INSPECTIONSep 13, 12Mar 13, 14[G06F]
2014/0067,763 TECHNIQUES FOR RECOVERING A VIRTUAL MACHINESep 05, 12Mar 06, 14[G06F]
2014/0068,273 Secure App Ecosystem with Key and Data Exchange According to Enterprise Information Control PolicyAug 29, 12Mar 06, 14[G06F]
2014/0068,767 SYSTEMS AND METHODS FOR DETECTING ILLEGITIMATE APPLICATIONSSep 05, 12Mar 06, 14[G06F]
2014/0059,005 GLOBAL INDEXING WITHIN AN ENTERPRISE OBJECT STORE FILE SYSTEMOct 31, 13Feb 27, 14[G06F]
2014/0026,129 SYSTEMS AND METHODS FOR UPDATING A SOFTWARE PRODUCTSep 25, 13Jan 23, 14[G06F]
2014/0026,199 Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation SystemSep 25, 13Jan 23, 14[H04L]
2014/0019,414 RESTORE SOFTWARE WITH AGGREGATED VIEW OF SITE COLLECTIONSJul 13, 12Jan 16, 14[G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,694,468 Systems and methods for performing backupsJun 09, 10Apr 08, 14[G06F]
8,694,659 Systems and methods for enhancing domain-name-server responsesApr 06, 10Apr 08, 14[G06F]
8,694,745 Physical to virtual disks creation (P2V) method, by harvesting data from critical sectorsSep 15, 10Apr 08, 14[G06F]
8,694,983 Systems and methods for providing guidance on the potential impact of application and operating-system changes on a computing systemMay 16, 12Apr 08, 14[G06F]
8,695,090 Data loss protection through application data access classificationOct 31, 08Apr 08, 14[G06F, G08B]
8,688,601 Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive informationJul 26, 11Apr 01, 14[G06F]
8,688,642 Systems and methods for managing application availabilityFeb 26, 10Apr 01, 14[G06F]
8,688,643 Systems and methods for adaptively preferring mirrors for read operationsAug 16, 10Apr 01, 14[G06F]
8,688,657 Systems and methods for data loss preventionSep 12, 11Apr 01, 14[G06F]
8,689,001 Method and system for protecting user identification informationJun 29, 07Apr 01, 14[H04L]
8,689,106 Method and apparatus for displaying logical information on storage and network devicesSep 28, 06Apr 01, 14[G06F]
8,689,294 Systems and methods for managing offline authenticationNov 11, 11Apr 01, 14[G06F]
8,689,341 Anti-phishing system based on end user data submission quarantine periods for new websitesMay 21, 08Apr 01, 14[H04L]
8,682,814 User interface and workflow for performing machine learningMar 01, 11Mar 25, 14[G06F]
8,683,156 Format-preserving deduplication of dataDec 07, 11Mar 25, 14[G06F]
8,683,258 Fast I/O failure detection and cluster wide failoverSep 30, 11Mar 25, 14[G06F]
8,683,576 Systems and methods for detecting a process to establish a backdoor connection with a computing deviceSep 30, 09Mar 25, 14[G11C, G06F]
8,683,585 Using file reputations to identify malicious file sources in real timeFeb 10, 11Mar 25, 14[G06F, G08B]
8,683,595 Systems and methods for detecting potentially malicious content within near field communication messagesJun 13, 12Mar 25, 14[G06F]
8,683,598 Mechanism to evaluate the security posture of a computer systemFeb 02, 12Mar 25, 14[G06F, G08B]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0175,391 APPARATUS AND METHOD FOR CRYPTOGRAPHIC PROTECTION OF DIRECTORIES AND FILESSep 27, 07Jul 24, 08[H04L, G06F]
2008/0168,144 Method of, and a System for, Processing EmailsApr 04, 06Jul 10, 08[G06F]
2008/0141,376 DETERMINING MALICIOUSNESS OF SOFTWAREOct 23, 07Jun 12, 08[G06F]
2008/0134,333 Detecting exploits in electronic objectsDec 04, 06Jun 05, 08[G06F]
2008/0077,978 ABSTRACT PASSWORD AND INPUT METHODSep 24, 07Mar 27, 08[G06F]
2008/0072,325 THREAT DETECTING PROXY SERVERSep 13, 07Mar 20, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!