SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
30Status Updates

Stats

Details

Technologies

Intl Class Technology # of Patents/ App Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 145936
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 24954
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 3346
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 22104
 
 
 
H04M TELEPHONIC COMMUNICATION 12127
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 11152
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION850
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 8186
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 629
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 5132

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2014/0201,208 Classifying Samples Using ClusteringJan 15, 13Jul 17, 14[G06F]
2014/0201,824 SYSTEMS AND METHODS FOR PROVIDING ACCESS TO DATA ACCOUNTS WITHIN USER PROFILES VIA CLOUD-BASED STORAGE SERVICESJan 15, 13Jul 17, 14[H04L]
2014/0189,784 SYSTEMS AND METHODS FOR ENFORCING DATA-LOSS-PREVENTION POLICIES USING MOBILE SENSORSJan 02, 13Jul 03, 14[G06F]
2014/0189,873 SYSTEM AND METHOD FOR VULNERABILITY RISK ANALYSISMay 21, 10Jul 03, 14[G06F]
2014/0181,983 IDENTIFYING PRIMARILY MONOSEMOUS KEYWORDS TO INCLUDE IN KEYWORD LISTS FOR DETECTION OF DOMAIN-SPECIFIC LANGUAGEDec 20, 12Jun 26, 14[G06F]
2014/0172,760 USER INTERFACE AND WORKFLOW FOR PERFORMING MACHINE LEARNINGFeb 19, 14Jun 19, 14[G06N]
2014/0173,113 Providing Optimized Quality of Service to Prioritized Virtual Machines and Applications Based on Quality of Shared ResourcesDec 19, 12Jun 19, 14[H04L]
2014/0156,588 SYSTEMS AND METHODS FOR PERFORMING CUSTOMIZED LARGE-SCALE DATA ANALYTICSSep 12, 13Jun 05, 14[G06F]
2014/0157,363 METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENTDec 05, 12Jun 05, 14[H04L]
2014/0150,081 SYSTEMS AND METHODS FOR ELIMINATING REDUNDANT SECURITY ANALYSES ON NETWORK DATA PACKETSNov 27, 12May 29, 14[H04L]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,788,681 Method and apparatus for autonomously managing a computer resource using a security certificateAug 25, 08Jul 22, 14[G06F]
8,788,785 Systems and methods for preventing heap-spray attacksJan 14, 11Jul 22, 14[G06F]
8,788,834 Systems and methods for altering the state of a computing device via a contacting sequenceMay 25, 10Jul 22, 14[G06F]
8,788,836 Method and apparatus for providing identity claim validationDec 22, 06Jul 22, 14[G06F]
8,788,845 Data access securityJun 15, 12Jul 22, 14[H04L, G06F]
8,789,174 Method and apparatus for examining network traffic and automatically detecting anomalous activity to secure a computerApr 13, 10Jul 22, 14[G06F]
8,789,177 Method and system for automatically obtaining web page content in the presence of redirectsApr 11, 11Jul 22, 14[G06F]
8,789,185 Method and apparatus for monitoring a computer system for malicious softwareSep 15, 08Jul 22, 14[H04L]
8,782,006 Method and apparatus for file sharing between continuous and scheduled backupsMar 29, 12Jul 15, 14[G06F]
8,782,011 System and method for scalable reference management in a deduplication based storage systemMar 04, 13Jul 15, 14[G06F]
8,782,403 Method and apparatus for securing confidential data for a user in a computerMar 28, 07Jul 15, 14[G06F]
8,782,519 Systems and methods for archiving and displaying lengthy documents based on content priority levelsOct 27, 11Jul 15, 14[G06F]
8,782,790 Signature creation for malicious network trafficFeb 19, 10Jul 15, 14[H04L]
8,782,791 Computer virus detection systems and methodsDec 01, 10Jul 15, 14[H04L, G06F]
8,782,792 Systems and methods for detecting malware on mobile platformsOct 27, 11Jul 15, 14[H04L]
8,775,333 Systems and methods for generating a threat classifier to determine a malicious processAug 18, 09Jul 08, 14[G06F]
8,775,377 Efficient data backup with change trackingJul 25, 12Jul 08, 14[G06F]
8,775,486 Global indexing within an enterprise object store file systemMay 05, 11Jul 08, 14[G06F]
8,775,678 Automated wireless synchronization and transformationDec 19, 07Jul 08, 14[G06F]
8,775,716 Methods and systems for defragmenting virtual machine prefetch data on physical storageNov 08, 12Jul 08, 14[G06F]
8,775,732 Method and system for passing information to disk arrays for efficient storage managementApr 29, 11Jul 08, 14[G06F]
8,775,751 Aggressive reclamation of tier-1 storage space in presence of copy-on-write-snapshotsDec 07, 10Jul 08, 14[G06F]
8,776,044 Systems and methods for providing computer cluster policies for implementation in computer cluster environmentsOct 26, 11Jul 08, 14[G06F]
8,776,168 Applying security policy based on behaviorally-derived user risk profilesOct 29, 09Jul 08, 14[H04L]
8,776,196 Systems and methods for automatically detecting and preventing phishing attacksJul 24, 12Jul 08, 14[H04L, G06F]
8,776,227 User interface based malware detectionDec 14, 10Jul 08, 14[G06F, G08B]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]
2008/0243,878 RemovalMar 29, 07Oct 02, 08[G06F]
2008/0244,078 WEB SERVICES INTERMEDIARYMar 26, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.