Vulnerability assessment and authentication of a computer by a local scanner

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 7178166
SERIAL NO

09665018

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Providing a user with assurance that a computer is secure based on a vulnerability assessment completed by a browser-compatible scanner operating on the computer. If the scanner finds a vulnerability, the scanner can inform the user that the machine is or may be compromised, or repair the vulnerability. For example, the scanner may be able to repair the vulnerability of the workstation. In the alternative, the scanner can provide the scan results to a network server. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can decline to provide network services to the workstation.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY47416

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Brass, Philip C Roswell, GA 3 511
Doty, Theodore R Roswell, GA 3 511
Mewett, Scott Holloways Beach, AU 2 292
Taylor, Patrick Atlanta, GA 12 288

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
5121345 System and method for protecting integrity of computer data and software 156 1990
5359659 Method for securing software against corruption by computer viruses 200 1992
 
TREND MICRO INCORPORATED (9)
5440723 Automatic immune system for computers and computer networks 475 1993
5675711 Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses 127 1994
5452442 Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities 285 1995
5623600 Virus detection and removal apparatus for computer networks 460 1995
5907834 Method and apparatus for detecting a presence of a computer virus 75 1996
5983348 Computer network malicious code scanner 239 1997
6119165 Controlled distribution of application programs in a computer network 225 1997
6108799 Automated sample creation of polymorphic and non-polymorphic marcro viruses 177 1998
6272641 Computer network malicious code scanner method and apparatus 195 1999
 
CA, INC. (3)
5796942 Method and apparatus for automated network-wide surveillance and security breach intervention 358 1996
6098173 Method and system for enforcing a communication security policy 88 1998
2002/0083,334 Detection of viral code using emulation of operating system functions 40 2001
 
Bull HN Information Systems Inc. (1)
5274824 Keyring metaphor for user's security keys on a distributed multiprocess data system 42 1991
 
SAMSUNG ELECTRONICS CO., LTD. (1)
6278886 Device and method for inputting and transmitting messages in a predetermined sequence in a portable telephone 38 1998
 
RVT TECHNOLOGIES, INC. (2)
6003132 Method and apparatus for isolating a computer system upon detection of viruses and similar data 26 1997
6081894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 61 1997
 
Yodlee.com, Inc. (1)
6517587 Networked architecture for enabling automated gathering of information from Web servers 74 1999
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
6792144 System and method for locating an object in an image using models 54 2000
 
HEWLETT-PACKARD COMPANY (1)
5881236 System for installation of software on a remote computer system over a network using checksums and password protection 139 1996
 
DYNATRACE LLC (2)
6144961 Method and system for non-intrusive measurement of transaction response times on a network 80 1997
5878420 Network monitoring and management system 113 1997
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (8)
5204966 System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords 98 1990
5311593 Security system for a network concentrator 182 1992
5812763 Expert system having a plurality of security inspectors for detecting security flaws in a computer system 195 1993
5586260 Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms 504 1993
5774727 Parallel processing system for virtual processor implementation of machine-language instructions 31 1995
5845067 Method and apparatus for document management utilizing a messaging system 116 1996
5790799 System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code 57 1997
* 6397245 System and method for evaluating the operation of a computer over a computer network 53 1999
 
U.S. PHILIPS CORPORATION (1)
5872978 Method and apparatus for improved translation of program data into machine code format 53 1996
 
FISHER, MARY E. (1)
4975950 System and method of protecting integrity of computer data and software 147 1988
 
Milkway Networks Corporation (1)
5623601 Apparatus and method for providing a secure gateway for communication and data exchanges between networks 755 1994
 
TERADATA US, INC. (1)
5745692 Automated systems administration of remote computer servers 59 1995
 
FREEGATE CORPORATION (1)
6073172 Initializing and reconfiguring a secure network interface 106 1997
 
PALO ALTO NETWORKS, INC. (1)
6205552 Method and apparatus for checking security vulnerability of networked devices 131 1998
 
ACCENTURE GLOBAL SERVICES LIMITED (3)
6324647 System, method and article of manufacture for security management in a development architecture framework 295 1999
6405364 Building techniques in a development architecture framework 404 1999
6606744 Providing collaborative installation management in a network-based supply chain environment 1082 1999
 
TANDEM COMPUTERS INCORPORATED (1)
4672609 Memory system with operation error detection 46 1986
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
5748098 Event correlation 128 1995
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5475839 Method and structure for securing access to a computer system 161 1994
 
NFR SECURITY, INC. (1)
6530024 Adaptive feedback security system and method 238 1998
 
BRIGHT LIGHT TECHNOLOGIES, INC. (1)
6052709 Apparatus and method for controlling delivery of unsolicited electronic mail 630 1997
 
TEXAS INSTRUMENTS INCORPORATED (1)
5950012 Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes 143 1997
 
SYMANTEC CORPORATION (15)
5398196 Method and apparatus for detection of computer viruses 137 1993
5696822 Polymorphic virus detection module 212 1995
6067410 Emulation repair system 94 1996
5798706 Detecting unauthorized network communication 108 1996
5765030 Processor emulator module having a variable pre-fetch queue size for program execution 79 1996
5854916 State-based cache for antivirus software 83 1996
5826013 Polymorphic virus detection module 193 1997
5964889 Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator 74 1997
5978917 Detection and elimination of macro viruses 213 1997
6357008 Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases 296 1997
6122738 Computer file integrity verification 86 1998
* 6298445 Computer security 424 1998
5999723 State-based cache for antivirus software 55 1998
6574737 System for penetrating computer or computer network 162 1998
6647400 System and method for analyzing filesystems to detect intrusions 215 2000
 
NORTEL NETWORKS LIMITED (1)
6006016 Network fault correlation 253 1996
 
JATCO CORPORATION (1)
6338141 Method and apparatus for computer virus detection, analysis, and removal in real time 136 1998
 
Unified Access Communications (1)
* 6041347 Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network 190 1997
 
SRI INTERNATIONAL (6)
6321338 Network surveillance 503 1998
6704874 Network-based alert management 320 2000
6484203 Hierarchical event monitoring and analysis 284 2000
6711615 Network surveillance 133 2002
6708212 Network surveillance 142 2003
2004/0010,718 Network surveillance 75 2003
 
PURDUE RESEARCH FOUNDATION (1)
6725378 Network protection for denial of service attacks 113 1999
 
MICRON TECHNOLOGY, INC. (1)
4773028 Method and apparatus for improved monitoring and detection of improper device operation 92 1984
 
CHEMTRON RESEARCH LLC (1)
6035323 Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media 281 1997
 
SERVICENOW, INC. (1)
6070190 Client-based application availability and response monitoring and reporting for distributed computing environments 207 1998
 
JDS UNIPHASE CORPORATION (1)
5539659 Network analysis method 96 1994
 
TEXAS TECHNOLOGY VENTURES (1)
5964839 System and method for monitoring information flow and performing data collection 247 1998
 
Richard S. Carson & Assoc., Inc. (1)
6185689 Method for network self security assessment 281 1998
 
INTELLECTUAL VENTURES I LLC (1)
5987610 Computer virus screening methods and systems 487 1998
 
GOOGLE INC. (1)
5761504 Method for updating a software code in a communication system 41 1996
 
MICRO FOCUS SOFTWARE INC. (1)
6314520 Trusted workstation in a networked client/server computing system 55 1999
 
THE REGENTS OF THE UNIVERSITY OF MICHIGAN (2)
2002/0032,793 Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic 45 2001
2002/0035,698 Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time 70 2001
 
SHARP KABUSHIKI KAISHA (1)
* 6429952 Browser interface to scanner 88 1998
 
VMWARE, INC. (1)
6397242 Virtualization system including a virtual machine monitor for a computer with a segmented architecture 362 1998
 
OpenTV, Inc. (1)
5884033 Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions 520 1996
 
Bascom Global Internet Services, Inc. (1)
5987606 Method and system for content filtering information retrieved from an internet computer network 189 1997
 
WEBSENSE, INC. (1)
5983270 Method and apparatus for managing internetwork and intranetwork activity 369 1997
 
INTELLECTUAL VENTURES HOLDING 81 LLC (1)
6563959 Perceptual similarity image retrieval method 144 1999
 
Look Dynamics, Inc. (1)
6445822 Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network 65 1999
 
RPX CLEARINGHOUSE LLC (1)
5974237 Communications network monitoring 222 1996
 
THE BOEING COMPANY (2)
5522026 System for creating a single electronic checklist in response to multiple faults 89 1994
5454074 Electronic checklist system 124 1994
 
WISTRON CORPORATION (1)
5511184 Method and apparatus for protecting a computer system from computer viruses 75 1993
 
NETWORKS ASSOCIATES TECHNOLOGY, INC. (1)
6275942 System, method and computer program product for automatic response to computer system misuse using active response modules 243 1998
 
OPINCAR, WILLIAM A., SUNWEST TRADING CORPORATION (1)
5353393 Apparatus and method for manipulating scanned documents in a computer aided design system 38 1992
 
INSTANT ALERT SECURITY, LLC (1)
6104783 Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems 38 1996
 
EBAY INC. (1)
* 6829711 Personal website for electronic commerce on a smart java card with multiple security check points 55 1999
 
MCAFEE, INC. (3)
5649095 Method and apparatus for detecting computer viruses through the use of a scan information cache 90 1993
5557742 Method and system for detecting intrusion into and misuse of a data processing system 378 1994
5983350 Secure firewall supporting different levels of authentication based on address or encryption status 304 1996
 
HITACHI, LTD. (2)
5919258 Security system and method for computers connected to network 119 1997
5931946 Network system having external/internal audit system for computer security 137 1997
 
NETWORK SECURITY SYSTEMS, INC. (1)
* 2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 175 2001
 
ORACLE AMERICA, INC. (7)
5590331 Method and apparatus for generating platform-standard object files containing machine-independent code 89 1994
5848233 Method and apparatus for dynamic packet filter assignment 228 1996
6119234 Method and apparatus for client-host communication over a computer network 119 1997
6173413 Mechanism for maintaining constant permissions for multiple instances of a device within a cluster 56 1998
6510523 Method and system for providing limited access privileges with an untrusted terminal 114 1999
6691232 Security architecture with environment sensitive credential sufficiency evaluation 260 1999
6718383 High availability networking with virtual IP address failover 80 2000
 
IN-DEFENSE, INC. (1)
5822517 Method for detecting infection of software programs by memory resident software viruses 65 1996
 
SECURELOGIX CORPORATION (1)
6226372 Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities 142 1999
 
APPLE INC. (2)
5515508 Client server system and method of operation including a dynamically configurable protocol stack 236 1993
6477648 Trusted workstation in a networked client/server computing system 139 1997
 
Technology International, Inc. (1)
5210704 System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment 286 1990
 
MCAFEE, LLC (8)
5991856 System and method for computer operating system protection 67 1997
6029256 Method and system for allowing computer programs easy access to features of a virus scanning engine 105 1997
6035423 Method and system for providing automated updating and upgrading of antivirus applications using a computer network 314 1997
6230288 Method of treating whitespace during virus detection 77 1998
6266774 Method and system for securing, managing or optimizing a personal computer 208 1998
6725377 Method and system for updating anti-intrusion software 170 1999
6775780 Detecting malicious software by analyzing patterns of system calls generated during emulation 120 2000
6546493 System, method and computer program product for risk assessment scanning based on detected anomalous events 174 2001
 
FINJAN, INC. (3)
6167520 System and method for protecting a client during runtime from hostile downloadables 132 1997
6092194 System and method for protecting a computer and a network from hostile downloadables 410 1997
6154844 System and method for attaching a downloadable security profile to a downloadable 305 1997
 
TECHGUARD SECURITY, LLC (1)
6519703 Methods and apparatus for heuristic firewall 190 2000
 
GENERAL DYNAMICS MISSION SYSTEMS, INC. (1)
* 6088804 Adaptive system and method for responding to computer network security attacks 375 1998
 
ODS NETWORKS, INC. (1)
6347374 Event detection 465 1998
 
CANON KABUSHIKI KAISHA (2)
6668082 Image processing apparatus 80 1998
6618501 Object similarity calculation method and apparatus 23 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (23)
5032979 Distributed security auditing subsystem for an operating system 375 1990
5278901 Pattern-oriented intrusion-detection system and method 240 1992
5371852 Method and apparatus for making a cluster of computers appear as a single host on a network 676 1992
5630061 System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes 127 1993
5414833 Network security system and method using a parallel finite state machine adaptive active monitor and responder 406 1993
5974457 Intelligent realtime monitoring of data traffic 161 1993
5649185 Method and means for providing access to a library of digitized documents and images 245 1995
6477585 Filter mechanism for an event management service 97 1995
5832211 Propagating plain-text passwords from a main registry to a plurality of foreign registries 113 1995
5838903 Configurable password integrity servers for use in a shared resource environment 116 1995
5815574 Provision of secure access to external resources from a distributed computing environment 138 1995
5764887 System and method for supporting distributed computing mechanisms in a local area network server environment 128 1995
6377994 Method and apparatus for controlling server access to a resource in a client/server system 91 1996
5864665 Auditing login activity in a distributed computing environment 91 1996
5892903 Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system 448 1996
* 5872915 Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web 132 1996
6009467 System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions 57 1997
5961644 Method and apparatus for testing the integrity of computer security alarm systems 58 1997
6118940 Method and apparatus for benchmarking byte code sequences 98 1997
6161109 Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy 35 1998
6199181 Method and system for maintaining restricted operating environments for application programs or operating systems 205 1998
* 6438600 Securely sharing log-in credentials among trusted browser-based applications 97 1999
6721806 Remote direct memory access enabled network interface controller switchover and switchback support 84 2002
 
CHECK POINT SOFTWARE TECHNOLOGIES LTD. (2)
5606668 System for securing inbound and outbound data packet flow in a computer network 539 1993
5835726 System for securing the flow of and selectively modifying packets in a computer network 551 1996
 
CISCO TECHNOLOGY, INC. (11)
6282546 System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 291 1998
6324656 System and method for rules-driven multi-phase network vulnerability assessment 309 1998
* 6301668 Method and system for adaptive network security using network vulnerability assessment 444 1998
6415321 Domain mapping method and system 155 1998
6499107 Method and system for adaptive network security using intelligent packet analysis 324 1998
6477651 Intrusion detection system and method having dynamically loaded signatures 114 1999
6487666 Intrusion detection signature analysis using regular expressions and logical operators 387 1999
6578147 Parallel intrusion detection sensors with load balancing for high speed networks 196 1999
6405318 Intrusion detection system 314 1999
6816973 Method and system for adaptive network security using intelligent packet analysis 109 2002
6792546 Intrusion detection signature analysis using regular expressions and logical operators 133 2002
 
Check Point Software Technologies, Inc. (1)
5987611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 958 1997
 
Proactive Networks (1)
6453346 Method and apparatus for intelligent storage and reduction of network information 102 1998
 
HYPER SEARCH LLC (1)
6271840 Graphical search engine visual index 280 1998
 
GOOGLE LLC (2)
5696486 Method and apparatus for policy-based alarm notification in a distributed network management environment 261 1995
5832208 Anti-virus agent for use with databases and mail servers 352 1996
 
FUJITSU LIMITED (2)
4400769 Virtual machine system 107 1980
5706210 Network monitoring device 86 1995
 
ALIBABA GROUP HOLDING LIMITED (1)
* 5875296 Distributed file system web server user authentication with cookies 507 1997
 
CUFER ASSET LTD. L.L.C. (1)
5857191 Web application server with secure common gateway interface 154 1996
 
ATOS IT SOLUTIONS AND SERVICES GMBH (1)
* 6850915 Method for controlling distribution and use of software products with net-work-connected computers 6 2000
 
ROUND ROCK RESEARCH, LLC (1)
5940591 Apparatus and method for providing network security 265 1996
 
AUTHORIZE.NET LLC (1)
5345595 Apparatus and method for detecting fraudulent telecommunication activity 258 1992
 
INTEL CORPORATION (4)
5347450 Message routing in a multiprocessor computer system 108 1993
6088803 System for virus-checking network data during download to a client device 357 1997
6266773 Computer security system 65 1998
* 6418472 System and method for using internet based caller ID for controlling access to an object stored in a computer 94 1999
 
HARRIS CORPORATION (2)
5787177 Integrated network security access control system 40 1996
6535227 System and method for assessing the security posture of a network and having a graphical user interface 180 2000
 
BLOCK FINANCIAL LLC (1)
6014645 Real-time financial card application system 508 1996
 
Intracept, Inc. (1)
6085224 Method and system for responding to hidden data and programs in a datastream 167 1997
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (4)
5828833 Method and system for allowing remote procedure calls through a network firewall 255 1996
6314525 Means for allowing two or more network interface controller cards to appear as one card to an operating system 134 1997
* 6434615 Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server 42 1999
6601190 Automatic capture and reporting of computer configuration data 43 1999
 
Hyperon Incorporated (1)
6353385 Method and system for interfacing an intrusion detection system to a central alarm system 78 2000
 
Multi-Tech Systems, Inc. (1)
5309562 Method and apparatus for establishing protocol spoofing from a modem 83 1991
 
PLATO, INC. (1)
6195687 Method and apparatus for master-slave control in a educational classroom communication network 63 1998
 
ARBOR NETWORKS, INC. (1)
2003/0037,136 Method and system for monitoring control signal traffic over a computer network 61 2002
 
CCS, INC. (1)
6668084 Image recognition method 25 2000
 
POWER MANAGEMENT ENTERPRISES, LLC (3)
6021510 Antivirus accelerator 149 1997
6016553 Method, software and apparatus for saving, using and recovering data 211 1998
6094731 Antivirus accelerator for computer networks 202 1998
 
INDIANA BUSINESS MODERNIZATION AND TECHNOLOGY CORP. (1)
6061795 Network desktop management security system and method 61 1997
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (1)
6463426 Information search and retrieval system 126 1998
 
802 Systems LLC (1)
2002/0083,331 Methods and systems using PLD-based network communication protocols 74 2000
 
NEC CORPORATION (1)
6396845 Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic 45 1998
 
PERSONALOGO LLC (1)
6661904 Method and system for automated electronic conveyance of hidden data 69 1999
 
JPMORGAN CHASE BANK, N.A. (1)
6070244 Computer network security management system 316 1997
 
MICROSOFT TECHNOLOGY LICENSING, LLC (5)
5999711 Method and system for providing certificates holding authentication and authorization information for users/machines 131 1994
5899999 Iterative convolution filter particularly suited for use in an image classification and retrieval system 201 1996
5764890 Method and system for adding a secure network server to an existing computer network 221 1997
* 6275938 Security enhancement for untrusted executable code 286 1997
6519647 Methods and apparatus for synchronizing access control in a web server 122 1999
 
MEMCO SOFTWARE LTD. (1)
5925126 Method for security shield implementation in computer system's software 147 1997
 
TUT SYSTEMS, INC. (1)
6496858 Remote reconfiguration of a secure network interface 180 1999
 
DATADIRECT NETWORKS, INC. (1)
6453345 Network security and surveillance system 368 1997
 
JAMBETTA MUSIC INC (1)
6324627 Virtual data storage (VDS) system 81 1999
 
GENERAL ELECTRIC COMPANY (1)
* 6584454 Method and apparatus for community management in remote system servicing 220 1999
 
Quantum Leap Innovations, Inc. (1)
5842002 Computer virus trap 241 1997
 
VERIZON PATENT AND LICENSING INC. (1)
5734697 Method and apparatus for improving telecommunications system performance 43 1995
 
AXENT TECHNOLOGIES 1, INC. (1)
6279113 Dynamic signature inspection-based network intrusion detection 606 1998
 
IMAGELOCK, INC. (A NEVADA CORPORATION) (1)
6628824 Method and apparatus for image identification and comparison 57 1999
 
CYLANT TECHNOLOGY, LLC (1)
6681331 Dynamic software system intrusion detection 150 1999
 
COMPUTER ASSOCIATES THINK, INC. (1)
6026442 Method and apparatus for surveillance in communications networks 80 1997
 
Ericsson Messaging Systems Inc. (1)
5864803 Signal processing and training by a neural network for phoneme recognition 35 1997
 
PRC Inc. (2)
6408391 Dynamic system defense for information warfare 175 1998
6839850 Method and system for detecting intrusion into and misuse of a data processing system 173 1999
 
RSA SECURITY INC. (1)
6460141 Security and access management system for web-enabled and non-web-enabled applications and content on a computer network 651 1998
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6711127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 159 1998
 
CVSI, INC. (1)
4819234 Operating system debugger 141 1987
 
RPX CORPORATION (3)
5991881 Network surveillance system 543 1996
5922051 System and method for traffic management in a network management system 149 1997
* 5919257 Networked workstation intrusion detection system 378 1997
 
E-CONTACT TECHNOLOGIES LLC (1)
6470449 Time-stamped tamper-proof data storage 62 1994
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
6647139 Method of object recognition, apparatus of the same and recording medium therefor 42 2000
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
* 2008/0282,320 Security Compliance Methodology and Tool 4 2008
* 2010/0083,382 Method and System for Managing Computer Security Information 52 2009
 
ADOBE SYSTEMS INCORPORATED (1)
* 9558356 Data driven system for responding to security vulnerability 0 2015
 
LOOKOUT, INC. (59)
8467768 System and method for remotely securing or recovering a mobile device 18 2009
8397301 System and method for identifying and assessing vulnerabilities on a mobile communication device 36 2009
9367680 System and method for mobile communication device application advisement 26 2010
8533844 System and method for security data collection and analysis 43 2010
8347386 System and method for server-coupled malware prevention 37 2010
8538815 System and method for mobile device replacement 1 2010
8984628 System and method for adverse mobile application identification 9 2011
8738765 Mobile device DNS optimization 0 2011
9232491 Mobile device geolocation 0 2011
8788881 System and method for mobile device push communications 1 2011
8510843 Security status and information display system 2 2011
8505095 System and method for monitoring and analyzing multiple interfaces and multiple protocols 2 2011
8365252 Providing access levels to services based on mobile device security state 3 2011
8381303 System and method for attack and malware prevention 0 2011
* 9235704 System and method for a scanning API 2 2011
* 2012/0110,174 SYSTEM AND METHOD FOR A SCANNING API 216 2011
8855601 System and method for remotely-initiated audio communication 0 2012
8745739 System and method for server-coupled application re-analysis to obtain characterization assessment 1 2012
8752176 System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment 2 2012
9043919 Crawling multiple markets and correlating 2 2012
8655307 System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security 31 2012
8875289 System and method for preventing malware on a mobile communication device 0 2012
9407443 Component analysis of software applications on computing devices 0 2012
9208215 User classification based on data gathered from a computing device 2 2012
8855599 Method and apparatus for auxiliary communications with mobile communications device 0 2012
9424409 Method and system for protecting privacy and enhancing security on an electronic device 1 2013
8881292 Evaluating whether data is safe or malicious 0 2013
8683593 Server-assisted analysis of data for a mobile device 0 2013
8561144 Enforcing security based on a security state assessment of a mobile device 0 2013
9215074 Expressing intent to control behavior of application components 2 2013
8826441 Event-based security state assessment and display for mobile devices 5 2013
9374369 Multi-factor authentication and comprehensive login system for client-server networks 1 2013
8682400 Systems and methods for device broadcast of location information when battery is low 0 2013
8929874 Systems and methods for remotely controlling a lost mobile communications device 0 2013
9042876 System and method for uploading location information based on device movement 8 2013
9740852 System and method for assessing an application to be installed on a mobile communications device 0 2013
9065846 Analyzing data gathered through different protocols 0 2013
9100389 Assessing an application based on application data associated with the application 0 2013
8635109 System and method for providing offers for mobile devices 1 2013
8997181 Assessing the security state of a mobile communications device 0 2013
9179434 Systems and methods for locking and disabling a device in response to a request 0 2013
9167550 Systems and methods for applying a security policy to a device based on location 0 2013
9100925 Systems and methods for displaying location information of a device 0 2013
8825007 Systems and methods for applying a security policy to a device based on a comparison of locations 0 2013
8774788 Systems and methods for transmitting a communication based on a device leaving or entering an area 0 2013
9642008 System and method for creating and assigning a policy for a mobile communications device based on personal data 0 2013
9408143 System and method for using context models to control operation of a mobile communications device 1 2013
9753796 Distributed monitoring, evaluation, and response for multiple devices 0 2013
9319292 Client activity DNS optimization 6 2014
9294500 System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects 0 2014
9569643 Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer 0 2014
9223973 System and method for attack and malware prevention 0 2014
9245119 Security status assessment using mobile device security information database 0 2014
9407640 Assessing a security state of a mobile communications device to determine access to specific tasks 0 2015
9344431 System and method for assessing an application based on data from multiple devices 0 2015
9589129 Determining source of side-loaded software 0 2015
9781148 Methods and systems for sharing risk responses between collections of mobile communications devices 0 2015
9769749 Modifying mobile device settings for resource conservation 0 2016
9779253 Methods and systems for sharing risk responses to improve the functioning of mobile communications devices 0 2016
 
EMC IP HOLDING COMPANY LLC (2)
9038178 Detection of malware beaconing activities 3 2012
* 9195826 Graph-based method to detect malware command-and-control infrastructure 2 2013
 
CLOUDFARE, INC. (1)
9049247 Internet-based proxy service for responding to server offline errors 0 2010
 
Saint Corporation (1)
* 9077745 Method of resolving port binding conflicts, and system and method of remote vulnerability assessment 1 2010
 
TVIIM, LLC (2)
* 8239917 Systems and methods for enterprise security with collaborative peer to peer architecture 5 2007
* 2008/0307,488 Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture 28 2007
 
TWITTER, INC. (2)
* 7653814 System and method for securely hyperlinking graphic objects 3 2002
* 2003/0110,384 System and method for securely hyperlinking graphic objects 17 2002
 
TRIPWIRE, INC. (1)
* 2005/0154,733 Real-time change detection for network systems 17 2004
 
TRUSTWAVE HOLDINGS, INC. (2)
* 9774617 Distributed client side user monitoring and attack system 0 2013
* 2014/0189,863 Distributed Client Side User Monitoring and Attack System 0 2013
 
RIVERBED TECHNOLOGY, INC. (2)
* 7836498 Device to protect victim sites during denial of service attacks 7 2001
* 2002/0031,134 Device to protect victim sites during denial of service attacks 36 2001
 
MCAFEE, LLC (15)
* 7549168 Network-based risk-assessment tool for remotely detecting local computer vulnerabilities 9 2006
8862752 System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof 0 2007
8793802 System, method, and computer program product for preventing data leakage utilizing a map of data 0 2007
* 8086582 System, method and computer program product for scanning and indexing data for different purposes 4 2007
* 8671087 System, method and computer program product for scanning and indexing data for different purposes 0 2011
* 2012/0079,117 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING AND INDEXING DATA FOR DIFFERENT PURPOSES 2 2011
8793763 System and method for interfacing with heterogeneous network data gathering tools 11 2011
8789140 System and method for interfacing with heterogeneous network data gathering tools 1 2011
* 8700767 System and method for network vulnerability detection and reporting 10 2012
* 8661126 System and method for network vulnerability detection and reporting 12 2012
* 2012/0144,494 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 26 2012
* 2012/0144,493 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 21 2012
8621060 System and method for network vulnerability detection and reporting 12 2012
8615582 System and method for network vulnerability detection and reporting 16 2012
9094434 System and method for automated policy audit and remediation management 0 2013
 
Washington Research Foundation (1)
* 2006/0239,665 Gas chromatograph having a radiant oven for analytical devices 1 2005
 
SCA IPLA HOLDINGS INC (5)
* 7328453 Systems and methods for the prevention of unauthorized use and manipulation of digital content 111 2002
* 2004/0030,912 Systems and methods for the prevention of unauthorized use and manipulation of digital content 69 2002
8117667 Systems and methods for the prevention of unauthorized use and manipulation of digital content 6 2008
* 2008/0178,299 Systems and methods for the prevention of unauthorized use and manipulation of digital content 14 2008
8844048 Systems and methods for the prevention of unauthorized use and manipulation of digital content 0 2012
 
AVAYA INC. (2)
* 8707395 Technique for providing secure network access 1 2005
* 2007/0011,725 Technique for providing secure network access 24 2005
 
MICROSOFT TECHNOLOGY LICENSING, LLC (136)
7624356 Task-sensitive methods and systems for displaying command sets 23 2000
7913159 System and method for real-time validation of structured data files 24 2003
7516145 System and method for incrementally transforming and rendering hierarchical data files 18 2003
* 2004/0193,661 System and method for incrementally transforming and rendering hierarchical data files 4 2003
* 8156558 Mechanism for evaluating security risks 11 2003
* 2004/0230,835 Mechanism for evaluating security risks 26 2003
7581177 Conversion of structured documents 25 2003
7451392 Rendering an HTML electronic form by applying XSLT to XML using a solution 94 2003
8819072 Promoting data from structured data files 10 2004
7430711 Systems and methods for editing XML documents 32 2004
* 2005/0183,006 Systems and methods for editing XML documents 21 2004
7568101 Digital signatures with an embedded view 35 2004
7774620 Executing applications at appropriate trust levels 28 2004
* 7676843 Executing applications at appropriate trust levels 31 2004
7712048 Task-sensitive methods and systems for displaying command sets 19 2004
7610562 Task-sensitive methods and systems for displaying command sets 24 2004
7512896 Task-sensitive methods and systems for displaying command sets 22 2004
* 2005/0005,248 Task-sensitive methods and systems for displaying command sets 87 2004
* 2004/0268,260 Task-sensitive methods and systems for displaying command sets 27 2004
* 2004/0268,259 Task-sensitive methods and systems for displaying command sets 38 2004
7818677 Single window navigation methods and systems 36 2004
7779027 Methods, systems, architectures and data structures for delivering software via a network 35 2004
* 2005/0033,728 Methods, systems, architectures and data structures for delivering software via a network 109 2004
7673227 User interface for integrated spreadsheets and word processing tables 29 2004
7692636 Systems and methods for handwriting to a screen 26 2004
7516399 Structured-document path-language expression methods and systems 30 2004
* 2006/0074,930 Structured-document path-language expression methods and systems 2 2004
7549115 System and method for integrated spreadsheets and word processing tables 38 2004
7506242 System and method for integrating spreadsheets and word processing tables 13 2004
* 2005/0055,626 System and method for integrated spreadsheets and word processing tables 6 2004
* 2005/0050,088 System and method for integrating spreadsheets and word processing tables 16 2004
7506243 System and method for integrating spreadsheets and word processing tables 16 2004
* 2005/0125,377 System and method for integrating spreadsheets and word processing tables 35 2004
8487879 Systems and methods for interacting with a computer through handwriting to a screen 8 2004
* 2006/0074,969 Workflow interaction 10 2004
7712022 Mutually exclusive options in electronic forms 27 2004
* 2006/0107,197 Role-dependent action for an electronic form 13 2004
* 2006/0107,252 Mutually exclusive options in electronic forms 2 2004
7721190 Methods and systems for server side form processing 27 2004
7509353 Methods and systems for exchanging and rendering forms 6 2004
* 2006/0106,858 Methods and systems for server side form processing 0 2004
7904801 Recursive sections in electronic forms 12 2004
* 2006/0129,583 Recursive sections in electronic forms 38 2004
7437376 Scalable object model 26 2004
7937651 Structural editing operations for network forms 20 2005
7743063 Methods and systems for delivering software via a network 27 2005
7689929 Methods and systems of providing information to computer users 27 2005
7725834 Designer-created aspect for an electronic form template 29 2005
* 2006/0197,982 Designer-created aspect for an electronic form template 6 2005
* 2006/0235,829 Query to an electronic form 3 2005
8812613 Virtual application manager 0 2005
7908339 Transaction based virtual file system optimized for high-latency network connections 20 2005
7543228 Template for rendering an electronic form 38 2005
8200975 Digital signatures for network forms 11 2005
7664834 Distributed operating system management 39 2005
7613996 Enabling selection of an inferred schema part 35 2005
* 2007/0036,433 Recognizing data conforming to a rule 72 2005
7979856 Network-based software extensions 21 2005
8001459 Enabling electronic documents for limited-capability computing devices 11 2005
* 2007/0130,500 Enabling electronic documents for limited-capability computing devices 35 2005
7624086 Pre-install compliance system 47 2006
7490109 System and method for offline editing of data files 34 2006
9357031 Applications as a service 1 2006
8898319 Applications and services as a bundle 0 2006
8811396 System for and method of securing a network utilizing credentials 0 2006
8234238 Computer hardware and software diagnostic and report system 18 2006
9317506 Accelerated data transfer using common prior data segments 1 2006
* 7840514 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 18 2006
* 2008/0127,294 Secure virtual private network 26 2006
7900134 Authoring arbitrary XML documents using DHTML and XSLT 19 2006
* 2007/0074,106 Authoring Arbitrary XML Documents Using DHTML and XSLT 73 2006
8117552 Incrementally designing electronic forms and hierarchical schemas 10 2006
* 2007/0100,877 Building Electronic Forms 74 2006
* 2007/0101,280 Closer Interface for Designing Electronic Forms and Hierarchical Schemas 73 2006
8423821 Virtual recovery server 16 2006
7844686 Warm standby appliance 19 2006
* 8959568 Enterprise security assessment sharing 7 2007
* 8955105 Endpoint enabled for enterprise security assessment sharing 1 2007
8413247 Adaptive data collection for root-cause analysis and intrusion detection 13 2007
* 2008/0229,421 Adaptive data collection for root-cause analysis and intrusion detection 53 2007
* 2008/0229,422 Enterprise security assessment sharing 36 2007
* 2008/0229,414 Endpoint enabled for enterprise security assessment sharing 5 2007
* 2008/0229,419 Automated identification of firewall malware scanner deficiencies 7 2007
7865477 System and method for real-time validation of structured data files 20 2007
* 2008/0040,635 System and Method for Real-Time Validation of Structured Data Files 20 2007
8014976 Secure digital forensics 2 2007
* 2009/0112,521 Secure digital forensics 0 2007
8645515 Environment manager 0 2007
8316448 Automatic filter generation and generalization 5 2007
8307239 Disaster recovery appliance 24 2007
8175418 Method of and system for enhanced data storage 19 2007
8074217 Methods and systems for delivering software 28 2007
7971139 Correlation, association, or correspondence of electronic forms 18 2007
8122436 Privacy enhanced error reports 15 2007
* 2009/0132,861 Privacy Enhanced Error Reports 15 2007
7925621 Installing a solution 19 2008
* 2008/0189,335 Installing A Solution 16 2008
8892993 Translation file 4 2008
8136164 Manual operations in an enterprise security assessment sharing system 1 2008
* 2009/0217,381 MANUAL OPERATIONS IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 8 2008
8589323 Computer hardware and software diagnostic and report system incorporating an expert system and agents 3 2008
8918729 Designing electronic forms 4 2008
* 2008/0222,514 Systems and Methods for Editing XML Documents 20 2008
8910255 Authentication for distributed secure content management system 2 2008
* 2009/0300,739 Authentication for distributed secure content management system 84 2008
* 8739289 Hardware interface for enabling direct access and security assessment sharing 1 2008
* 2009/0254,984 HARDWARE INTERFACE FOR ENABLING DIRECT ACCESS AND SECURITY ASSESSMENT SHARING 3 2008
8689335 Mapping between users and machines in an enterprise security assessment sharing system 2 2008
* 2009/0328,222 MAPPING BETWEEN USERS AND MACHINES IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 41 2008
* 2009/0178,131 GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 8 2008
8910268 Enterprise security assessment sharing for consumers using globally distributed infrastructure 1 2008
8881223 Enterprise security assessment sharing for off-premise users using globally distributed infrastructure 3 2008
8296178 Services using globally distributed infrastructure for secure content management 11 2008
* 2009/0178,108 ENTERPRISE SECURITY ASSESSMENT SHARING FOR OFF-PREMISE USERS USING GLOBALLY DISTRIBUTED INFRASTRUCTURE 10 2008
* 2009/0177,514 SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 96 2008
8935742 Authentication in a globally distributed infrastructure for secure content management 3 2008
* 2009/0178,109 Authentication in a globally distributed infrastructure for secure content management 19 2008
8078960 Rendering an HTML electronic form by applying XSLT to XML using a solution 12 2008
* 8275984 TLS key and CGI session ID pairing 4 2008
* 2010/0153,702 TLS KEY AND CGI SESSION ID PAIRING 10 2008
9507610 Task-sensitive methods and systems for displaying command sets 0 2010
* 8099378 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 19 2010
* 2011/0047,118 SECURE VIRTUAL PRIVATE NETWORK UTILIZING A DIAGNOSTICS POLICY AND DIAGNOSTICS ENGINE TO ESTABLISH A SECURE NETWORK CONNECTION 17 2010
8745171 Warm standby appliance 0 2010
9229917 Electronic form user interfaces 1 2011
9210234 Enabling electronic documents for limited-capability computing devices 1 2011
8429522 Correlation, association, or correspondence of electronic forms 7 2011
8422833 Method of and system for enhanced data storage 0 2012
9268760 Correlation, association, or correspondence of electronic forms 0 2013
9448858 Environment manager 0 2013
9569194 Virtual application manager 0 2014
9645900 Warm standby appliance 0 2014
9092374 Method of and system for enhanced data storage 0 2014
9160735 System for and method of securing a network utilizing credentials 0 2014
9239821 Translation file 0 2014
9584480 System for and method of securing a network utilizing credentials 0 2015
 
MU DYNAMICS, INC. (2)
8547974 Generating communication protocol test cases based on network traffic 3 2011
8463860 Scenario based scale testing 3 2011
 
INTELLECTUAL VENTURES II LLC (2)
* 7383579 Systems and methods for determining anti-virus protection status 9 2002
* 7707636 Systems and methods for determining anti-virus protection status 3 2008
 
BANK OF AMERICA CORPORATION (2)
* 8099787 Knowledge-based and collaborative system for security assessment of web applications 1 2007
* 2009/0049,553 Knowledge-Based and Collaborative System for Security Assessment of Web Applications 6 2007
 
CLOUDFLARE, INC. (17)
9634993 Internet-based proxy service to modify internet responses 0 2010
9369437 Internet-based proxy service to modify internet responses 0 2010
9009330 Internet-based proxy service to limit internet visitor connection speed 0 2010
9634994 Custom responses for resource unavailable errors 0 2011
* 8850580 Validating visitor internet-based security threats 1 2011
* 2011/0283,359 Validating Visitor Internet-Based Security Threats 33 2011
9565166 Internet-based proxy service to modify internet responses 0 2011
9342620 Loading of web resources 1 2012
* 8856924 Mitigating a denial-of-service attack in a cloud-based proxy service 3 2012
8646064 Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service 1 2012
8613089 Identifying a denial-of-service attack in a cloud-based proxy service 15 2012
9628509 Identifying a denial-of-service attack in a cloud-based proxy service 1 2013
9641549 Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service 0 2014
9548966 Validating visitor internet-based security threats 0 2014
9661020 Mitigating a denial-of-service attack in a cloud-based proxy service 0 2014
9628581 Internet-based proxy service for responding to server offline errors 0 2015
9769240 Loading of web resources 0 2016
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (5)
* 2006/0265,746 Method and system for managing computer security information 32 2006
* 9264443 Browser based method of assessing web application vulnerability 0 2008
* 2010/0050,263 BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY 15 2008
8141157 Method and system for managing computer security information 10 2009
* 9832218 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server 0 2016
 
SPIRENT COMMUNICATIONS, INC. (14)
8095983 Platform for analyzing the security of communication protocols and channels 9 2006
* 7958560 Portable program for generating attacks on communication protocols and channels 15 2006
* 2007/0174,917 Platform for analyzing the security of communication protocols and channels 30 2006
8316447 Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems 2 2006
* 2008/0072,322 Reconfigurable Message-Delivery Preconditions for Delivering Attacks to Analyze the Security of Networked Systems 23 2006
9172611 System and method for discovering assets and functional relationships in a network 2 2008
8074097 Meta-instrumentation for security analysis 2 2010
9106514 Hybrid network software provision 0 2010
8464219 Scalable control system for test execution and monitoring utilizing multiple processors 10 2011
8433811 Test driven deployment and monitoring of heterogeneous network systems 3 2011
8359653 Portable program for generating attacks on communication protocols and channels 1 2011
8631499 Platform for analyzing the security of communication protocols and channels 2 2012
8590048 Analyzing the security of communication protocols and channels for a pass through device 0 2012
8972543 Managing clients utilizing reverse transactions 1 2012
 
STREAMZAP, INC. (2)
* 8418062 Control of media centric websites by hand-held remote 1 2005
* 2005/0235,210 Control of media centric websites by hand-held remote 19 2005
 
SECURITYSCORECARD, INC. (4)
9641547 Entity IP mapping 0 2015
9501647 Calculating and benchmarking an entity's cybersecurity risk score 0 2015
9372994 Entity IP mapping 0 2015
9294498 Online portal for improving cybersecurity risk scores 2 2015
 
GEORGE MASON UNIVERSITY (2)
* 7555778 Minimum-cost network hardening 4 2005
* 2006/0085,858 Minimum-cost network hardening 28 2005
 
CISCO TECHNOLOGY, INC. (2)
* 9436820 Controlling access to resources in a network 3 2004
* 9432393 Global clustering of incidents based on malware similarity and online trustfulness 0 2015
 
Check Point Software Technologies, Inc. (2)
7725737 System and methodology providing secure workspace environment 24 2005
* 2007/0101,435 System and Methodology Providing Secure Workspace Environment 184 2005
 
INFOSYS LIMITED (1)
* 2015/0172,310 METHOD AND SYSTEM TO IDENTIFY KEY LOGGING ACTIVITIES 0 2014
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 7788723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 21 2005
* 2006/0265,750 Method and apparatus for providing computer security 49 2005
 
RedCannon Security, Inc. (1)
8613091 Method and apparatus for creating a secure anywhere system 2 2004
 
DELL PRODUCTS L.P. (2)
* 9369495 Sensor aware security policies with embedded controller hardened enforcement 1 2015
9792455 Sensor aware security policies with embedded controller hardened enforcement 0 2016
 
Redcannon, Inc. (2)
* 2007/0266,421 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CENTRALLY MANAGING POLICIES ASSIGNABLE TO A PLURALITY OF PORTABLE END-POINT SECURITY DEVICES OVER A NETWORK 39 2006
* 2008/0098,478 System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device 45 2006
 
QUALYS, INC. (2)
* 9613099 Dynamic hierarchical tagging system and method 0 2011
* 2012/0158,725 Dynamic hierarchical tagging system and method 13 2011
 
SecurityProfiling, LLC (6)
9117069 Real-time vulnerability monitoring 2 2013
9118708 Multi-path remediation 0 2014
9118709 Anti-vulnerability system, method, and computer program product 0 2014
9100431 Computer program product and apparatus for multi-path remediation 0 2014
9118711 Anti-vulnerability system, method, and computer program product 1 2014
9225686 Anti-vulnerability system, method, and computer program product 0 2015
 
AHNLAB, INC. (1)
* 2013/0254,893 APPARATUS AND METHOD FOR REMOVING MALICIOUS CODE 0 2011
 
INTEL CORPORATION (1)
* 8099786 Embedded mechanism for platform vulnerability assessment 1 2006
 
RPX CORPORATION (2)
* 7797752 Method and apparatus to secure a computing environment 20 2003
* 8595820 Surround security system 3 2010
 
SYMANTEC CORPORATION (1)
* 8356352 Security scanner for user-generated web content 6 2008
 
CITRIX SYSTEMS, INC. (13)
* 8613048 Method and apparatus for providing authorized remote access to application sessions 9 2004
* 2006/0070,131 METHOD AND APPARATUS FOR PROVIDING AUTHORIZED REMOTE ACCESS TO APPLICATION SESSIONS 69 2004
8065423 Method and system for assigning access control levels in providing access to networked content files 20 2006
* 2006/0190,455 Method and system for assigning access control levels in providing access to networked content files 39 2006
8533846 Method and system for dynamically associating access rights with a resource 2 2006
* 2008/0109,912 METHOD AND SYSTEM FOR DYNAMICALLY ASSOCIATING ACCESS RIGHTS WITH A RESOURCE 39 2006
8286230 Method and apparatus for associating tickets in a ticket hierarchy 1 2010
* 2010/0229,228 METHOD AND APPARATUS FOR ASSOCIATING TICKETS IN A TICKET HIERARCHY 0 2010
8312261 Method and system for verification of an endpoint security scan 0 2011
8352606 Method and system for assigning access control levels in providing access to networked content files 3 2011
9311502 Method and system for assigning access control levels in providing access to networked content files 1 2013
9401931 Method and system for dynamically associating access rights with a resource 0 2013
9401906 Method and apparatus for providing authorized remote access to application sessions 0 2013
 
PULSE SECURE, LLC (5)
* 8001610 Network defense system utilizing endpoint health indicators and user identity 29 2005
7882538 Local caching of endpoint security information 17 2006
7886335 Reconciliation of multiple sets of network access control policies 23 2007
8225102 Local caching of one-time user passwords 4 2010
8185933 Local caching of endpoint security information 1 2011
 
WEBROOT INC. (7)
7591016 System and method for scanning memory for pestware offset signatures 5 2005
* 7571476 System and method for scanning memory for pestware 6 2005
7349931 System and method for scanning obfuscated files for pestware 62 2005
* 2006/0236,397 System and method for scanning obfuscated files for pestware 5 2005
* 2006/0236,396 System and method for scanning memory for pestware offset signatures 6 2005
7971249 System and method for scanning memory for pestware offset signatures 2 2009
9754102 Malware management through kernel detection during a boot sequence 0 2014
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 Aug 13, 2018
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00