SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
42Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 14392
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 3082
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 6100
 
 
 
G05B CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS 136
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 128
 
 
 
G06T IMAGE DATA PROCESSING OR GENERATION, IN GENERAL 159
 
 
 
G07F COIN- FREED OR LIKE APPARATUS 126
 
 
 
H04J MULTIPLEX COMMUNICATION 137

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0279,884 SYSTEMS AND METHODS FOR DISTRIBUTING REPLICATION TASKS WITHIN COMPUTING CLUSTERSApr 04, 13Sep 18, 14[G06F]
2014/0281,273 Providing Local Cache Coherency in a Shared Storage EnvironmentMar 15, 13Sep 18, 14[G06F]
2014/0282,518 ENFORCING POLICY-BASED COMPLIANCE OF VIRTUAL MACHINE IMAGE CONFIGURATIONSMar 15, 13Sep 18, 14[G06F]
2014/0282,821 SYSTEMS AND METHODS FOR IDENTIFYING A SECURE APPLICATION WHEN CONNECTING TO A NETWORKMar 15, 13Sep 18, 14[H04L]
2014/0283,035 TECHNIQUES FOR PREDICTING AND PROTECTING SPEARPHISHING TARGETSMar 15, 13Sep 18, 14[H04L]
2014/0283,082 SYSTEMS AND METHODS FOR DETERMINING POTENTIAL IMPACTS OF APPLICATIONS ON THE SECURITY OF COMPUTING SYSTEMSMar 15, 13Sep 18, 14[G06F]
2014/0244,599 DEDUPLICATION STORAGE SYSTEM WITH EFFICIENT REFERENCE UPDATING AND SPACE RECLAMATIONFeb 22, 13Aug 28, 14[G06F]
2014/0237,537 METHOD AND TECHNIQUE FOR APPLICATION AND DEVICE CONTROL IN A VIRTUALIZED ENVIRONMENTFeb 19, 13Aug 21, 14[G06F]
2014/0208,421 SECURE AND SCALABLE DETECTION OF PRESELECTED DATA EMBEDDED IN ELECTRONICALLY TRANSMITTED MESSAGESJan 08, 14Jul 24, 14[H04L]
2014/0201,208 Classifying Samples Using ClusteringJan 15, 13Jul 17, 14[G06F]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,843,750 Monitoring content transmitted through secured communication channelsJan 28, 11Sep 23, 14[H04L]
8,843,903 Process tracking application layered systemJan 03, 06Sep 23, 14[G06F]
8,844,024 Systems and methods for using tiered signing certificates to manage the behavior of executablesMar 23, 09Sep 23, 14[G06F]
8,844,041 Detecting network devices and mapping topology using network introspection by collaborating endpointsFeb 26, 10Sep 23, 14[H04L, G06F]
8,844,059 Method and apparatus for preventing data loss through screen captureFeb 15, 11Sep 23, 14[G06F]
8,838,542 Optimized image archivingDec 19, 12Sep 16, 14[G06F]
8,838,913 System and method for locating a memory page in a guest virtual machineSep 15, 09Sep 16, 14[G06F]
8,839,138 Systems and methods for transitioning between user interface environmentsDec 21, 09Sep 16, 14[G06F]
8,839,350 Sending out-of-band notificationsJan 25, 12Sep 16, 14[G06F]
8,839,374 Systems and methods for identifying security risks in downloadsDec 15, 11Sep 16, 14[H04L, G06F]
8,839,428 Systems and methods for detecting malicious code in a script attackDec 15, 10Sep 16, 14[G06F]
8,839,432 Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computerApr 01, 10Sep 16, 14[G06F]
8,831,992 Apparatus and method for facilitating cryptographic key management servicesDec 12, 08Sep 09, 14[H04L, G06Q]
8,832,042 Method and system to scan data from a system that supports deduplicationMar 15, 10Sep 09, 14[G06F]
8,832,044 Techniques for managing data compression in a data protection systemMar 04, 09Sep 09, 14[G06F]
8,832,254 Systems and methods for managing registration and discovery of URI schemesOct 29, 12Sep 09, 14[G06F]
8,832,492 Systems and methods for managing applicationsJan 25, 13Sep 09, 14[H04L, G06F]
8,832,780 Data loss prevention of a shared network file systemJun 26, 12Sep 09, 14[H04L]
8,832,788 Automated human assisted authenticationNov 01, 11Sep 09, 14[H04L, G06F]
8,832,835 Detecting and remediating malware dropped by filesOct 28, 10Sep 09, 14[H04L, G06F, G08B]
8,832,848 Systems and methods for content-aware access controlJul 26, 12Sep 09, 14[H04L]
8,832,855 System for the distribution and deployment of applications with provisions for security and policy conformanceSep 06, 11Sep 09, 14[G06F]
8,824,677 Provably secure and efficient pseudorandom number generationMay 29, 09Sep 02, 14[H04L]
8,825,582 Rule-based virtualizationJun 24, 13Sep 02, 14[G06N, H04L]
8,825,602 Systems and methods for providing data protection in object-based storage environmentsMar 15, 10Sep 02, 14[G06F]
8,825,685 Selective file system caching based upon a configurable cache mapNov 16, 09Sep 02, 14[G06F]
8,825,773 Systems and methods for concealing information relating to a profile provided by a social networking serviceSep 20, 10Sep 02, 14[H04L, G06F]
8,825,836 Systems and methods for managing notification messages generated by one or more applicationsJan 18, 10Sep 02, 14[G06F]
8,825,870 Techniques for non-disruptive transitioning of CDP/R servicesJun 29, 07Sep 02, 14[G06F]
8,825,972 Method and system of producing a full backup image using an incremental backup methodNov 19, 10Sep 02, 14[G06F]
8,826,034 Selective revocation of heuristic exemption for content with digital signaturesSep 28, 07Sep 02, 14[G06F]
8,826,426 Systems and methods for generating reputation-based ratings for uniform resource locatorsMay 05, 11Sep 02, 14[H04L]
8,826,431 Using telemetry to reduce malware definition package sizeNov 20, 12Sep 02, 14[H04L, G06F]
8,826,439 Encoding machine code instructions for static feature based malware clusteringJan 26, 11Sep 02, 14[G06F]
8,826,443 Selective removal of protected content from web requests sent to an interactive websiteFeb 27, 09Sep 02, 14[G06F]
8,826,444 Systems and methods for using client reputation data to classify web domainsJul 09, 10Sep 02, 14[H04N, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.