SYMANTEC CORPORATION

Patent Owner

Compare Create Portfolio
41Status Updates

Stats

Details

Patent Activity in the Last 10 Years

Technologies

Intl Class Technology Matters Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 179333
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 34050
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 4145
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 30113
 
 
 
H04M TELEPHONIC COMMUNICATION 14128
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 13159
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 10198
 
 
 
H04W WIRELESS COMMUNICATION NETWORKS 10128
 
 
 
H04K SECRET COMMUNICATION; JAMMING OF COMMUNICATION948
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 836

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2015/0040,179 Mobile Device Connection Control for Synchronization and Remote Data AccessJul 31, 13Feb 05, 15[H04L]
2015/0026,455 SYSTEMS AND METHODS FOR SECURING EMAIL IN MOBILE DEVICESJul 19, 13Jan 22, 15[H04L]
2015/0026,676 SYSTEMS AND METHODS FOR INSTANTLY RESTORING VIRTUAL MACHINES IN HIGH INPUT/OUTPUT LOAD ENVIRONMENTSJul 17, 13Jan 22, 15[G06F]
2015/0020,197 IDENTIFYING MISUSE OF LEGITIMATE OBJECTSJul 11, 13Jan 15, 15[G06F]
2015/0007,315 Techniques for Detecting a Security VulnerabilityJun 28, 13Jan 01, 15[G06F]
2015/0007,332 SYSTEMS AND METHODS FOR DIRECTING APPLICATION UPDATESJun 26, 13Jan 01, 15[G06F]
2014/0337,591 SYSTEMS AND METHODS FOR INCREASING RESTORE SPEEDS OF BACKUPS STORED IN DEDUPLICATED STORAGE SYSTEMSMay 07, 13Nov 13, 14[G06F]
2014/0331,320 TECHNIQUES FOR DETECTING MALICIOUS ACTIVITYMay 03, 13Nov 06, 14[G06F]
2014/0325,664 SYSTEMS AND METHODS FOR REPLACING APPLICATION METHODS AT RUNTIMEApr 24, 13Oct 30, 14[G06F]
2014/0304,764 METHOD AND APPARATUS FOR INTEGRATING SECURITY CONTEXT IN NETWORK ROUTING DECISIONSApr 03, 13Oct 09, 14[H04L]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
8,965,814 Selection of most effective machine learning kernel from a training set of documentsMar 15, 12Feb 24, 15[G06N]
8,965,855 Systems and methods for hotspot mitigation in object-based file systemsAug 16, 10Feb 24, 15[G06F]
8,966,188 RAM utilization in a virtual environmentDec 15, 10Feb 24, 15[G06F]
8,966,287 Systems and methods for secure third-party data storageMar 13, 13Feb 24, 15[H04L, G06F]
8,966,318 Method to validate availability of applications within a backup imageApr 27, 12Feb 24, 15[G06F]
8,958,399 Method and apparatus for providing connectivity controlSep 28, 06Feb 17, 15[H04W]
8,959,056 Method and apparatus for evaluating a backup policy in a computer networkFeb 08, 07Feb 17, 15[G06F]
8,959,058 Linking dynamic computer data protection to an external stateSep 02, 04Feb 17, 15[G06F]
8,959,060 Global indexing within an enterprise object store file systemOct 31, 13Feb 17, 15[G06F]
8,959,115 Permission tracking systems and methodsJul 09, 10Feb 17, 15[G06Q, G06F]
8,959,209 Systems and methods to indicate compatibilityJul 24, 12Feb 17, 15[G06F]
8,959,235 Techniques for determining an optimal connection duration for a connection between a client and a server across a networkJul 05, 11Feb 17, 15[G06F]
8,959,509 Techniques for virtual machine backup schedulingJun 02, 08Feb 17, 15[G06F]
8,959,588 Systems and methods for mitigating remote authentication service unavailabilityApr 27, 12Feb 17, 15[H04L, H04W]
8,959,609 Out-of-app based partner aware user authenticationJun 28, 13Feb 17, 15[H04L, G06F]
8,959,639 Method of detecting and blocking malicious activityJun 06, 08Feb 17, 15[G06F]
8,953,189 Method and apparatus for verifying print jobs to prevent confidential data lossAug 11, 09Feb 10, 15[G06K]
8,954,398 Systems and methods for managing deduplication reference dataJan 04, 13Feb 10, 15[G06F]
8,954,401 Systems and methods for providing increased scalability in deduplication storage systemsJan 14, 11Feb 10, 15[G06F]
8,954,435 Method and system for reclaiming storage on a shared storage device or independent of the mount state of a file systemApr 22, 11Feb 10, 15[G06F]
8,954,740 Session key proxy decryption method to secure content in a one-to-many relationshipOct 04, 10Feb 10, 15[H04L]
8,954,780 Systems and methods for transferring input/output operations within computer clustersOct 11, 12Feb 10, 15[G06F]
8,954,808 Systems and methods for performing input/output path failoversNov 30, 10Feb 10, 15[G06F]
8,955,068 Systems and methods for providing strong authentication for web-based applicationsMay 09, 12Feb 10, 15[G06F]
8,955,092 Systems and methods for eliminating redundant security analyses on network data packetsNov 27, 12Feb 10, 15[H04L]
8,955,096 Systems and methods for filtering internet accessApr 06, 10Feb 10, 15[H04L]
8,955,109 Educating computer users concerning social engineering security threatsApr 30, 10Feb 10, 15[G06F]
8,955,127 Systems and methods for detecting illegitimate messages on social networking platformsJul 24, 12Feb 10, 15[H04L, G06F]
8,955,138 Systems and methods for reevaluating apparently benign behavior on computing devicesJul 11, 13Feb 10, 15[H04L, G06F]
8,955,152 Systems and methods to manage an applicationJun 11, 12Feb 10, 15[H04L, G06F]
8,949,187 Systems and methods for creating and managing backups based on health informationMay 30, 08Feb 03, 15[G06F]
8,949,243 Systems and methods for determining a rating for an item from user reviewsDec 28, 11Feb 03, 15[G06F]
8,949,325 Dynamic discovery and utilization of current context informationJun 29, 07Feb 03, 15[G06F]
8,949,371 Time and space efficient method and system for detecting structured data in free textSep 29, 11Feb 03, 15[G06F]
8,949,653 Evaluating high-availability configurationOct 25, 12Feb 03, 15[G06F]
8,949,720 Systems and methods for managing access-control settingsMay 09, 11Feb 03, 15[G06F]
8,949,955 Method and apparatus for mobile time-based UI for VIPOct 29, 08Feb 03, 15[H04L, H04W, G06F]
8,949,979 Protecting local users from remote applicationsOct 01, 10Feb 03, 15[H04L]
8,949,981 Techniques for providing protection against unsafe links on a social networking websiteFeb 28, 11Feb 03, 15[G06F]
8,950,005 Method and system for protecting content of sensitive web applicationsNov 04, 11Feb 03, 15[H04L, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Filing Date Issue/Pub Date Intl Class
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceAug 31, 10Mar 01, 12[G06F]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsNov 30, 06Aug 10, 10[G06F]
2010/0161,146 VARIABLE ENERGY PRICING IN SHORTAGE CONDITIONSDec 23, 08Jun 24, 10[G05B]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesDec 02, 08Jun 03, 10[H04L, G06F]
2010/0017,889 Control of Website Usage Via Online Storage of Restricted Authentication CredentialsJul 17, 08Jan 21, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesJul 06, 07Jan 08, 09[G06F]
2008/0307,526 METHOD TO PERFORM BOTNET DETECTIONJun 07, 07Dec 11, 08[G08B]
2008/0295,153 SYSTEM AND METHOD FOR DETECTION AND COMMUNICATION OF COMPUTER INFECTION STATUS IN A NETWORKED ENVIRONMENTMay 24, 07Nov 27, 08[H04L]
2008/0243,477 MULTI-STAGED LANGUAGE CLASSIFICATIONMar 28, 08Oct 02, 08[G06F]
2008/0243,769 System and method for exporting data directly from deduplication storage to non-deduplication storageMar 30, 07Oct 02, 08[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.