SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
46Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 164635
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 29347
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 3944
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 27113
 
 
 
H04M TELEPHONIC COMMUNICATION 13128
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 11159
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 10189
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION847
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 735
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 6136

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0244,599 DEDUPLICATION STORAGE SYSTEM WITH EFFICIENT REFERENCE UPDATING AND SPACE RECLAMATIONFeb 22, 13Aug 28, 14[G06F]
2014/0237,537 METHOD AND TECHNIQUE FOR APPLICATION AND DEVICE CONTROL IN A VIRTUALIZED ENVIRONMENTFeb 19, 13Aug 21, 14[G06F]
2014/0208,421 SECURE AND SCALABLE DETECTION OF PRESELECTED DATA EMBEDDED IN ELECTRONICALLY TRANSMITTED MESSAGESJan 08, 14Jul 24, 14[H04L]
2014/0201,208 Classifying Samples Using ClusteringJan 15, 13Jul 17, 14[G06F]
2014/0201,824 SYSTEMS AND METHODS FOR PROVIDING ACCESS TO DATA ACCOUNTS WITHIN USER PROFILES VIA CLOUD-BASED STORAGE SERVICESJan 15, 13Jul 17, 14[H04L]
2014/0189,784 SYSTEMS AND METHODS FOR ENFORCING DATA-LOSS-PREVENTION POLICIES USING MOBILE SENSORSJan 02, 13Jul 03, 14[G06F]
2014/0189,873 SYSTEM AND METHOD FOR VULNERABILITY RISK ANALYSISMay 21, 10Jul 03, 14[G06F]
2014/0181,983 IDENTIFYING PRIMARILY MONOSEMOUS KEYWORDS TO INCLUDE IN KEYWORD LISTS FOR DETECTION OF DOMAIN-SPECIFIC LANGUAGEDec 20, 12Jun 26, 14[G06F]
2014/0172,760 USER INTERFACE AND WORKFLOW FOR PERFORMING MACHINE LEARNINGFeb 19, 14Jun 19, 14[G06N]
2014/0173,113 Providing Optimized Quality of Service to Prioritized Virtual Machines and Applications Based on Quality of Shared ResourcesDec 19, 12Jun 19, 14[H04L]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,838,542 Optimized image archivingDec 19, 12Sep 16, 14[G06F]
8,838,913 System and method for locating a memory page in a guest virtual machineSep 15, 09Sep 16, 14[G06F]
8,839,138 Systems and methods for transitioning between user interface environmentsDec 21, 09Sep 16, 14[G06F]
8,839,350 Sending out-of-band notificationsJan 25, 12Sep 16, 14[G06F]
8,839,374 Systems and methods for identifying security risks in downloadsDec 15, 11Sep 16, 14[H04L, G06F]
8,839,428 Systems and methods for detecting malicious code in a script attackDec 15, 10Sep 16, 14[G06F]
8,839,432 Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computerApr 01, 10Sep 16, 14[G06F]
8,831,992 Apparatus and method for facilitating cryptographic key management servicesDec 12, 08Sep 09, 14[H04L, G06Q]
8,832,042 Method and system to scan data from a system that supports deduplicationMar 15, 10Sep 09, 14[G06F]
8,832,044 Techniques for managing data compression in a data protection systemMar 04, 09Sep 09, 14[G06F]
8,832,254 Systems and methods for managing registration and discovery of URI schemesOct 29, 12Sep 09, 14[G06F]
8,832,492 Systems and methods for managing applicationsJan 25, 13Sep 09, 14[H04L, G06F]
8,832,780 Data loss prevention of a shared network file systemJun 26, 12Sep 09, 14[H04L]
8,832,788 Automated human assisted authenticationNov 01, 11Sep 09, 14[H04L, G06F]
8,832,835 Detecting and remediating malware dropped by filesOct 28, 10Sep 09, 14[H04L, G06F, G08B]
8,832,848 Systems and methods for content-aware access controlJul 26, 12Sep 09, 14[H04L]
8,832,855 System for the distribution and deployment of applications with provisions for security and policy conformanceSep 06, 11Sep 09, 14[G06F]
8,824,677 Provably secure and efficient pseudorandom number generationMay 29, 09Sep 02, 14[H04L]
8,825,582 Rule-based virtualizationJun 24, 13Sep 02, 14[G06N, H04L]
8,825,602 Systems and methods for providing data protection in object-based storage environmentsMar 15, 10Sep 02, 14[G06F]
8,825,685 Selective file system caching based upon a configurable cache mapNov 16, 09Sep 02, 14[G06F]
8,825,773 Systems and methods for concealing information relating to a profile provided by a social networking serviceSep 20, 10Sep 02, 14[H04L, G06F]
8,825,836 Systems and methods for managing notification messages generated by one or more applicationsJan 18, 10Sep 02, 14[G06F]
8,825,870 Techniques for non-disruptive transitioning of CDP/R servicesJun 29, 07Sep 02, 14[G06F]
8,825,972 Method and system of producing a full backup image using an incremental backup methodNov 19, 10Sep 02, 14[G06F]
8,826,034 Selective revocation of heuristic exemption for content with digital signaturesSep 28, 07Sep 02, 14[G06F]
8,826,426 Systems and methods for generating reputation-based ratings for uniform resource locatorsMay 05, 11Sep 02, 14[H04L]
8,826,431 Using telemetry to reduce malware definition package sizeNov 20, 12Sep 02, 14[H04L, G06F]
8,826,439 Encoding machine code instructions for static feature based malware clusteringJan 26, 11Sep 02, 14[G06F]
8,826,443 Selective removal of protected content from web requests sent to an interactive websiteFeb 27, 09Sep 02, 14[G06F]
8,826,444 Systems and methods for using client reputation data to classify web domainsJul 09, 10Sep 02, 14[H04N, G06F]
8,818,950 Method and apparatus for localized protected imaging of a file systemJan 22, 04Aug 26, 14[G06F]
8,818,961 User restoration of workflow objects and elements from an archived databaseOct 30, 09Aug 26, 14[G06F]
8,818,970 Partitioning a directory while accessing the directoryApr 08, 11Aug 26, 14[G06F]
8,819,049 Frame injection blockingOct 03, 05Aug 26, 14[G06F]
8,819,370 Techniques for storage lifecycle policy managementSep 28, 12Aug 26, 14[G06F]
8,819,413 Method and apparatus for collaborative claim verificationDec 22, 06Aug 26, 14[H04L]
8,819,655 Systems and methods for computer program update protectionSep 17, 07Aug 26, 14[G06F]
8,819,657 Method and apparatus for maintaining data consistency in a virtualized application during software update installationSep 18, 08Aug 26, 14[G06F]
8,819,666 Systems and methods for updating a software productSep 25, 13Aug 26, 14[G06F]
8,819,768 Split password vaultDec 30, 11Aug 26, 14[H04L]
8,819,804 Distributed enforcement of browser rulesOct 29, 10Aug 26, 14[H04L, G06F]
8,819,819 Method and system for automatically obtaining webpage content in the presence of javascriptApr 24, 12Aug 26, 14[H04L, G06F]
8,819,823 Method and apparatus for notifying a recipient of a threat within previously communicated dataJun 02, 08Aug 26, 14[H04L, G06F, G08B]
8,819,828 Systems and methods for identifying malware threat vectorsApr 26, 12Aug 26, 14[G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.