SYMANTEC CORPORATION

Patent Owner

Follow Compare Add to Portfolio 23Status Updates

Stats

Details

Patent Activity in the Last 10 Years

Technologies

Intl Class Technology Matters Rank in Class
 
 
 
G06F ELECTRIC DIGITAL DATA PROCESSING 138355
 
 
 
H04L TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION 48750
 
 
 
G08B SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS 5437
 
 
 
G06Q DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR 41119
 
 
 
H04W WIRELESS COMMUNICATION NETWORKS 17140
 
 
 
H04M TELEPHONIC COMMUNICATION 15138
 
 
 
H04N PICTORIAL COMMUNICATION, e.g. TELEVISION 13205
 
 
 
G06K RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS 12169
 
 
 
G06N COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS 1240
 
 
 
G01R MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES 8146

Top Patents (by citation)

Upgrade to the Premium Level to View Top Patents for this Owner. Learn More

Recent Publications

Publication # Title Filing Date Pub Date Intl Class
2016/0191,463 SYSTEMS AND METHODS FOR AUTOMATICALLY APPLYING FIREWALL POLICIES WITHIN DATA CENTER APPLICATIONSDec 31, 14Jun 30, 16[H04L]
2016/0191,545 SYSTEMS AND METHODS FOR MONITORING VIRTUAL NETWORKSDec 31, 14Jun 30, 16[H04L]
2016/0149,930 SYSTEMS AND METHODS FOR PROTECTING AGAINST UNAUTHORIZED NETWORK INTRUSIONSNov 21, 14May 26, 16[H04L]
2016/0103,992 SYSTEMS AND METHODS FOR CLASSIFYING SECURITY EVENTS AS TARGETED ATTACKSOct 14, 14Apr 14, 16[H04L, G06F]
2016/0085,962 SYSTEMS AND METHODS FOR UPDATING POSSESSION FACTOR CREDENTIALSSep 22, 14Mar 24, 16[G06F]
2016/0070,905 SYSTEMS AND METHODS FOR DETECTING ATTEMPTS TO TRANSMIT SENSITIVE INFORMATION VIA DATA-DISTRIBUTION CHANNELSSep 10, 14Mar 10, 16[G06F]
2016/0063,218 SYSTEMS AND METHODS FOR HANDLING FRAUDULENT USES OF BRANDSAug 26, 14Mar 03, 16[H04L, G06F]
2016/0065,618 Method and Apparatus for Automating Security Provisioning of WorkloadsSep 02, 14Mar 03, 16[H04L, G06F]
2015/0363,198 DYNAMIC CALL TRACKING METHOD BASED ON CPU INTERRUPT INSTRUCTIONS TO IMPROVE DISASSEMBLY QUALITY OF INDIRECT CALLSJun 16, 14Dec 17, 15[G06F]
2015/0350,195 SEAMLESS AUTHENTICATION MECHANISM FOR USER PROCESSES AND WEB SERVICES RESIDING ON COMMON HOSTJun 02, 14Dec 03, 15[H04L]

View all Publication..

Recent Patents

Patent # Title Filing Date Issue Date Intl Class
9,395,966 Systems and methods for associating installed software components with software productsSep 27, 10Jul 19, 16[G06F]
9,396,328 Determining a contributing entity for a windowJan 07, 08Jul 19, 16[G06F]
9,396,498 Systems and methods for using social-networking accounts to identify characteristics that strangers share in commonNov 22, 11Jul 19, 16[H04L, G06Q, G06F]
9,398,042 Systems and methods for capturing input from users to prevent data lossMar 11, 15Jul 19, 16[H04L]
D761828 Display screen with graphical user interfaceFeb 28, 14Jul 19, 16[1404]
9,390,128 Datastore for storing file access event dataApr 16, 10Jul 12, 16[G06F]
9,390,450 Social file storageFeb 24, 12Jul 12, 16[G06Q, G06F]
9,383,989 Systems and methods for updating applicationsJun 16, 14Jul 05, 16[G06F]
9,384,066 Heuristics-based protocol labeling for industrial control systemsDec 27, 13Jul 05, 16[G06F]
9,384,336 Systems and methods for modifying security based on reputation informationOct 08, 12Jul 05, 16[G06F]
9,384,492 Method and apparatus for monitoring product purchasing activity on a networkDec 11, 08Jul 05, 16[H04L, G06Q]
9,384,654 Geolocation awareness item trackingDec 31, 14Jul 05, 16[G08B]
9,385,869 Systems and methods for trusting digitally signed files in the absence of verifiable signature conditionsMar 26, 14Jul 05, 16[H04L]
9,386,106 Community-based detection of a missing deviceDec 13, 13Jul 05, 16[H04L, G06F]
D760756 Display screen with graphical user interfaceFeb 28, 14Jul 05, 16[1404]
9,377,929 Techniques for presenting information on a graphical user interfaceDec 23, 13Jun 28, 16[G06F]
9,378,367 Systems and methods for identifying a source of a suspect eventMar 31, 14Jun 28, 16[G06F]
9,378,373 Software publisher trust extension applicationSep 24, 07Jun 28, 16[G06F]
9,378,385 Systems and methods for determining whether transmission of sensitive data is expectedMay 21, 14Jun 28, 16[G06F]
9,378,634 Leveraging neighbors' wireless access points in wireless-signal-variation-based physical intruder detection systemsDec 30, 14Jun 28, 16[H04W, H04B, G08B]
9,380,429 Systems and methods for assessing levels of personal riskJan 30, 15Jun 28, 16[H04M, H04L, G06Q, H04W, G06F]

View all patents..

Expired/Abandoned/Withdrawn Patents

Patent # Title Status Filing Date Issue/Pub Date Intl Class
2015/0231,039 Apparatus for Containing RegurgitationABANFeb 18, 14Aug 20, 15[A61J, B65D]
8,392,478 Method and system for efficiently reading a partitioned directory incident to a serialized processWithdrawnAug 16, 10Mar 05, 13[G06F]
8,296,819 Controlling identity disclosuresWithdrawnOct 31, 06Oct 23, 12[H04L]
2012/0054,729 Safely Updating Latent Applications to Reduce Attack SurfaceABANAug 31, 10Mar 01, 12[G06F]
8,031,535 Semiconductor memory apparatusExpiredDec 29, 08Oct 04, 11[G11C]
2011/0093,847 Application Hosting Service for Cloud Environments Using Dynamic Machine ImagesABANOct 15, 09Apr 21, 11[G06F]
7,774,188 Running a virtual machine directly from a physical machine using snapshotsWithdrawnNov 30, 06Aug 10, 10[G06F]
2010/0191,784 Extending Secure Management of File Attribute Information to Virtual Hard DisksABANJan 29, 09Jul 29, 10[G06F]
2010/0161,146 VARIABLE ENERGY PRICING IN SHORTAGE CONDITIONSABANDec 23, 08Jun 24, 10[G05B]
2010/0138,916 Apparatus and Method for Secure Administrator Access to Networked MachinesABANDec 02, 08Jun 03, 10[H04L, G06F]
2010/0138,927 Apparatus and Method for Preventing Unauthorized Access to Secure InformationABANDec 02, 08Jun 03, 10[G06F]
2010/0017,889 Control of Website Usage Via Online Storage of Restricted Authentication CredentialsABANJul 17, 08Jan 21, 10[H04L, G06F]
2009/0319,506 SYSTEM AND METHOD FOR EFFICIENTLY FINDING EMAIL SIMILARITY IN AN EMAIL REPOSITORYABANJun 19, 08Dec 24, 09[G06F]
7,631,217 Systems and methods for event driven recovery managementWithdrawnAug 30, 05Dec 08, 09[G06F]
2009/0214,030 Apparatus and Method for Processing Fragmented Cryptographic KeysABANDec 12, 08Aug 27, 09[H04L]
2009/0157,823 APPARATUS AND METHOD FOR FACILITATING SECURE EMAIL SERVICES USING MULTIPLE PROTOCOLSABANDec 13, 07Jun 18, 09[G06F]
2009/0089,383 SYSTEM AND METHOD FOR DETECTING CONTENT SIMILARITY WITHIN EMAILS DOCUMENTS EMPLOYING SELECTIVE TRUNCATIONABANMar 31, 08Apr 02, 09[G06F]
2009/0019,121 Message processingABANJul 10, 07Jan 15, 09[G06F]
2009/0013,405 Heuristic detection of malicious codeABANJul 06, 07Jan 08, 09[G06F]
2009/0013,408 Detection of exploits in filesABANJul 06, 07Jan 08, 09[G06F]

View all patents..

Top Inventors for This Owner

Upgrade to the Premium Level to View Top Inventors for this Owner. Learn More

We are sorry but your current selection exceeds the maximum number of comparisons () for this membership level. Upgrade to our Level for up to -1 comparisons!

We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.