SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
30Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 145836
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 24853
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 3348
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 22109
 
 
 
H04M TELEPHONIC COMMUNICATION 12128
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 11151
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION850
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 8184
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 632
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 5131

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0189,784 SYSTEMS AND METHODS FOR ENFORCING DATA-LOSS-PREVENTION POLICIES USING MOBILE SENSORSJan 02, 13Jul 03, 14[G06F]
2014/0189,873 SYSTEM AND METHOD FOR VULNERABILITY RISK ANALYSISMay 21, 10Jul 03, 14[G06F]
2014/0181,983 IDENTIFYING PRIMARILY MONOSEMOUS KEYWORDS TO INCLUDE IN KEYWORD LISTS FOR DETECTION OF DOMAIN-SPECIFIC LANGUAGEDec 20, 12Jun 26, 14[G06F]
2014/0172,760 USER INTERFACE AND WORKFLOW FOR PERFORMING MACHINE LEARNINGFeb 19, 14Jun 19, 14[G06N]
2014/0173,113 Providing Optimized Quality of Service to Prioritized Virtual Machines and Applications Based on Quality of Shared ResourcesDec 19, 12Jun 19, 14[H04L]
2014/0156,588 SYSTEMS AND METHODS FOR PERFORMING CUSTOMIZED LARGE-SCALE DATA ANALYTICSSep 12, 13Jun 05, 14[G06F]
2014/0157,363 METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENTDec 05, 12Jun 05, 14[H04L]
2014/0150,081 SYSTEMS AND METHODS FOR ELIMINATING REDUNDANT SECURITY ANALYSES ON NETWORK DATA PACKETSNov 27, 12May 29, 14[H04L]
2014/0143,828 METHODS AND SYSTEMS FOR ENABLING COMMUNITY-TESTED SECURITY FEATURES FOR LEGACY APPLICATIONSJan 24, 14May 22, 14[H04L]
2014/0143,869 USING TELEMETRY TO REDUCE MALWARE DEFINITION PACKAGE SIZENov 20, 12May 22, 14[G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,782,006 Method and apparatus for file sharing between continuous and scheduled backupsMar 29, 12Jul 15, 14[G06F]
8,782,011 System and method for scalable reference management in a deduplication based storage systemMar 04, 13Jul 15, 14[G06F]
8,782,403 Method and apparatus for securing confidential data for a user in a computerMar 28, 07Jul 15, 14[G06F]
8,782,519 Systems and methods for archiving and displaying lengthy documents based on content priority levelsOct 27, 11Jul 15, 14[G06F]
8,782,790 Signature creation for malicious network trafficFeb 19, 10Jul 15, 14[H04L]
8,782,791 Computer virus detection systems and methodsDec 01, 10Jul 15, 14[H04L, G06F]
8,782,792 Systems and methods for detecting malware on mobile platformsOct 27, 11Jul 15, 14[H04L]
8,775,333 Systems and methods for generating a threat classifier to determine a malicious processAug 18, 09Jul 08, 14[G06F]
8,775,377 Efficient data backup with change trackingJul 25, 12Jul 08, 14[G06F]
8,775,486 Global indexing within an enterprise object store file systemMay 05, 11Jul 08, 14[G06F]
8,775,678 Automated wireless synchronization and transformationDec 19, 07Jul 08, 14[G06F]
8,775,716 Methods and systems for defragmenting virtual machine prefetch data on physical storageNov 08, 12Jul 08, 14[G06F]
8,775,732 Method and system for passing information to disk arrays for efficient storage managementApr 29, 11Jul 08, 14[G06F]
8,775,751 Aggressive reclamation of tier-1 storage space in presence of copy-on-write-snapshotsDec 07, 10Jul 08, 14[G06F]
8,776,044 Systems and methods for providing computer cluster policies for implementation in computer cluster environmentsOct 26, 11Jul 08, 14[G06F]
8,776,168 Applying security policy based on behaviorally-derived user risk profilesOct 29, 09Jul 08, 14[H04L]
8,776,196 Systems and methods for automatically detecting and preventing phishing attacksJul 24, 12Jul 08, 14[H04L, G06F]
8,776,227 User interface based malware detectionDec 14, 10Jul 08, 14[G06F, G08B]
8,769,182 Virtual tape library with the ability to perform multiple, simultaneous reads of a single virtual tapeApr 01, 10Jul 01, 14[G06F]
8,769,220 Method and apparatus for mitigating performance impact of background processing on interactive applicationsJul 17, 12Jul 01, 14[G06F]
8,769,223 System and method for setting an activation state for a device used in a backup operationMar 31, 08Jul 01, 14[G06F]
8,769,226 Discovering cluster resources to efficiently perform cluster backups and restoresJul 09, 12Jul 01, 14[G06F]
8,769,334 Techniques for providing instant disaster recoveryFeb 25, 13Jul 01, 14[G06F]
8,769,627 Systems and methods for validating ownership of deduplicated dataDec 08, 11Jul 01, 14[G06F]
8,769,672 Code injection preventionAug 04, 06Jul 01, 14[G06F]
8,769,674 Instant message scanningSep 05, 07Jul 01, 14[G06F]
8,769,676 Techniques for identifying suspicious applications using requested permissionsDec 22, 11Jul 01, 14[G06F]
8,769,685 Systems and methods for using file paths to identify potentially malicious computer filesFeb 03, 10Jul 01, 14[G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.