Vulnerability assessment and authentication of a computer by a local scanner

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 7178166
SERIAL NO

09665018

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Providing a user with assurance that a computer is secure based on a vulnerability assessment completed by a browser-compatible scanner operating on the computer. If the scanner finds a vulnerability, the scanner can inform the user that the machine is or may be compromised, or repair the vulnerability. For example, the scanner may be able to repair the vulnerability of the workstation. In the alternative, the scanner can provide the scan results to a network server. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can decline to provide network services to the workstation.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY45476

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Brass, Philip C Roswell, GA 3 489
Doty, Theodore R Roswell, GA 3 489
Mewett, Scott Holloways Beach, AU 2 281
Taylor, Patrick Atlanta, GA 12 274

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (3)
5121345 System and method for protecting integrity of computer data and software 154 1990
5359659 Method for securing software against corruption by computer viruses 193 1992
6271840 Graphical search engine visual index 271 1998
 
TREND MICRO INCORPORATED (9)
5440723 Automatic immune system for computers and computer networks 452 1993
5675711 Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses 122 1994
5452442 Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities 277 1995
5623600 Virus detection and removal apparatus for computer networks 448 1995
5907834 Method and apparatus for detecting a presence of a computer virus 73 1996
5983348 Computer network malicious code scanner 232 1997
6119165 Controlled distribution of application programs in a computer network 223 1997
6108799 Automated sample creation of polymorphic and non-polymorphic marcro viruses 159 1998
6272641 Computer network malicious code scanner method and apparatus 176 1999
 
CA, INC. (3)
5796942 Method and apparatus for automated network-wide surveillance and security breach intervention 350 1996
6098173 Method and system for enforcing a communication security policy 88 1998
2002/0083,334 Detection of viral code using emulation of operating system functions 40 2001
 
Bull HN Information Systems Inc. (1)
5274824 Keyring metaphor for user's security keys on a distributed multiprocess data system 42 1991
 
SAMSUNG ELECTRONICS CO., LTD. (1)
6278886 Device and method for inputting and transmitting messages in a predetermined sequence in a portable telephone 38 1998
 
RVT TECHNOLOGIES, INC. (2)
6003132 Method and apparatus for isolating a computer system upon detection of viruses and similar data 26 1997
6081894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 61 1997
 
Yodlee.com, Inc. (1)
6517587 Networked architecture for enabling automated gathering of information from Web servers 73 1999
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
6792144 System and method for locating an object in an image using models 54 2000
 
HEWLETT-PACKARD COMPANY (1)
5881236 System for installation of software on a remote computer system over a network using checksums and password protection 138 1996
 
DYNATRACE LLC (2)
6144961 Method and system for non-intrusive measurement of transaction response times on a network 80 1997
5878420 Network monitoring and management system 112 1997
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (8)
5204966 System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords 95 1990
5311593 Security system for a network concentrator 179 1992
5812763 Expert system having a plurality of security inspectors for detecting security flaws in a computer system 193 1993
5586260 Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms 502 1993
5774727 Parallel processing system for virtual processor implementation of machine-language instructions 31 1995
5845067 Method and apparatus for document management utilizing a messaging system 116 1996
5790799 System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code 55 1997
* 6397245 System and method for evaluating the operation of a computer over a computer network 53 1999
 
U.S. PHILIPS CORPORATION (1)
5872978 Method and apparatus for improved translation of program data into machine code format 53 1996
 
FISHER, MARY E. (1)
4975950 System and method of protecting integrity of computer data and software 147 1988
 
Milkway Networks Corporation (1)
5623601 Apparatus and method for providing a secure gateway for communication and data exchanges between networks 747 1994
 
TERADATA US, INC. (1)
5745692 Automated systems administration of remote computer servers 59 1995
 
FREEGATE CORPORATION (1)
6073172 Initializing and reconfiguring a secure network interface 103 1997
 
PALO ALTO NETWORKS, INC. (1)
6205552 Method and apparatus for checking security vulnerability of networked devices 128 1998
 
ACCENTURE GLOBAL SERVICES LIMITED (3)
6324647 System, method and article of manufacture for security management in a development architecture framework 286 1999
6405364 Building techniques in a development architecture framework 400 1999
6606744 Providing collaborative installation management in a network-based supply chain environment 1041 1999
 
TANDEM COMPUTERS INCORPORATED (1)
4672609 Memory system with operation error detection 46 1986
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
5748098 Event correlation 127 1995
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5475839 Method and structure for securing access to a computer system 156 1994
 
NFR SECURITY, INC. (1)
6530024 Adaptive feedback security system and method 235 1998
 
BRIGHT LIGHT TECHNOLOGIES, INC. (1)
6052709 Apparatus and method for controlling delivery of unsolicited electronic mail 617 1997
 
TEXAS INSTRUMENTS INCORPORATED (1)
5950012 Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes 141 1997
 
SYMANTEC CORPORATION (15)
5398196 Method and apparatus for detection of computer viruses 136 1993
5696822 Polymorphic virus detection module 207 1995
6067410 Emulation repair system 91 1996
5798706 Detecting unauthorized network communication 108 1996
5765030 Processor emulator module having a variable pre-fetch queue size for program execution 78 1996
5854916 State-based cache for antivirus software 82 1996
5826013 Polymorphic virus detection module 189 1997
5964889 Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator 74 1997
5978917 Detection and elimination of macro viruses 194 1997
6357008 Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases 272 1997
6122738 Computer file integrity verification 80 1998
* 6298445 Computer security 402 1998
5999723 State-based cache for antivirus software 55 1998
6574737 System for penetrating computer or computer network 162 1998
6647400 System and method for analyzing filesystems to detect intrusions 211 2000
 
NORTEL NETWORKS LIMITED (1)
6006016 Network fault correlation 252 1996
 
JATCO CORPORATION (1)
6338141 Method and apparatus for computer virus detection, analysis, and removal in real time 134 1998
 
Unified Access Communications (1)
* 6041347 Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network 189 1997
 
SRI INTERNATIONAL (6)
6321338 Network surveillance 488 1998
6704874 Network-based alert management 312 2000
6484203 Hierarchical event monitoring and analysis 283 2000
6711615 Network surveillance 132 2002
6708212 Network surveillance 140 2003
2004/0010,718 Network surveillance 74 2003
 
PURDUE RESEARCH FOUNDATION (1)
6725378 Network protection for denial of service attacks 111 1999
 
MICRON TECHNOLOGY, INC. (1)
4773028 Method and apparatus for improved monitoring and detection of improper device operation 92 1984
 
CHEMTRON RESEARCH LLC (1)
6035323 Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media 276 1997
 
SERVICENOW, INC. (1)
6070190 Client-based application availability and response monitoring and reporting for distributed computing environments 206 1998
 
TEXAS TECHNOLOGY VENTURES (1)
5964839 System and method for monitoring information flow and performing data collection 240 1998
 
JDS UNIPHASE CORPORATION (1)
5539659 Network analysis method 96 1994
 
Richard S. Carson & Assoc., Inc. (1)
6185689 Method for network self security assessment 273 1998
 
INTELLECTUAL VENTURES I LLC (1)
5987610 Computer virus screening methods and systems 463 1998
 
GOOGLE INC. (3)
5696486 Method and apparatus for policy-based alarm notification in a distributed network management environment 256 1995
5761504 Method for updating a software code in a communication system 41 1996
5832208 Anti-virus agent for use with databases and mail servers 347 1996
 
MICRO FOCUS SOFTWARE INC. (1)
6314520 Trusted workstation in a networked client/server computing system 55 1999
 
THE REGENTS OF THE UNIVERSITY OF MICHIGAN (2)
2002/0032,793 Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic 44 2001
2002/0035,698 Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time 68 2001
 
SHARP KABUSHIKI KAISHA (1)
* 6429952 Browser interface to scanner 85 1998
 
VMWARE, INC. (1)
6397242 Virtualization system including a virtual machine monitor for a computer with a segmented architecture 359 1998
 
OPENTV, INC. (1)
5884033 Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions 510 1996
 
Bascom Global Internet Services, Inc. (1)
5987606 Method and system for content filtering information retrieved from an internet computer network 180 1997
 
WEBSENSE, INC. (1)
5983270 Method and apparatus for managing internetwork and intranetwork activity 354 1997
 
INTELLECTUAL VENTURES HOLDING 81 LLC (1)
6563959 Perceptual similarity image retrieval method 139 1999
 
Look Dynamics, Inc. (1)
6445822 Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network 64 1999
 
RPX CLEARINGHOUSE LLC (1)
5974237 Communications network monitoring 219 1996
 
The Boeing Company (2)
5522026 System for creating a single electronic checklist in response to multiple faults 84 1994
5454074 Electronic checklist system 120 1994
 
WISTRON CORPORATION (1)
5511184 Method and apparatus for protecting a computer system from computer viruses 74 1993
 
NETWORKS ASSOCIATES TECHNOLOGY, INC. (1)
6275942 System, method and computer program product for automatic response to computer system misuse using active response modules 240 1998
 
OPINCAR, WILLIAM A., SUNWEST TRADING CORPORATION (1)
5353393 Apparatus and method for manipulating scanned documents in a computer aided design system 36 1992
 
INSTANT ALERT SECURITY, LLC (1)
6104783 Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems 37 1996
 
EBAY INC. (1)
* 6829711 Personal website for electronic commerce on a smart java card with multiple security check points 46 1999
 
MCAFEE, INC. (11)
5649095 Method and apparatus for detecting computer viruses through the use of a scan information cache 85 1993
5557742 Method and system for detecting intrusion into and misuse of a data processing system 375 1994
5983350 Secure firewall supporting different levels of authentication based on address or encryption status 296 1996
5991856 System and method for computer operating system protection 67 1997
6029256 Method and system for allowing computer programs easy access to features of a virus scanning engine 105 1997
6035423 Method and system for providing automated updating and upgrading of antivirus applications using a computer network 306 1997
6230288 Method of treating whitespace during virus detection 76 1998
6266774 Method and system for securing, managing or optimizing a personal computer 206 1998
6725377 Method and system for updating anti-intrusion software 164 1999
6775780 Detecting malicious software by analyzing patterns of system calls generated during emulation 116 2000
6546493 System, method and computer program product for risk assessment scanning based on detected anomalous events 173 2001
 
HITACHI, LTD. (2)
5919258 Security system and method for computers connected to network 119 1997
5931946 Network system having external/internal audit system for computer security 136 1997
 
NETWORK SECURITY SYSTEMS, INC. (1)
* 2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 170 2001
 
ORACLE AMERICA, INC. (7)
5590331 Method and apparatus for generating platform-standard object files containing machine-independent code 89 1994
5848233 Method and apparatus for dynamic packet filter assignment 221 1996
6119234 Method and apparatus for client-host communication over a computer network 117 1997
6173413 Mechanism for maintaining constant permissions for multiple instances of a device within a cluster 56 1998
6510523 Method and system for providing limited access privileges with an untrusted terminal 111 1999
6691232 Security architecture with environment sensitive credential sufficiency evaluation 251 1999
6718383 High availability networking with virtual IP address failover 79 2000
 
IN-DEFENSE, INC. (1)
5822517 Method for detecting infection of software programs by memory resident software viruses 65 1996
 
SECURELOGIX CORPORATION (1)
6226372 Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities 135 1999
 
APPLE INC. (2)
5515508 Client server system and method of operation including a dynamically configurable protocol stack 236 1993
6477648 Trusted workstation in a networked client/server computing system 137 1997
 
Technology International, Inc. (1)
5210704 System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment 285 1990
 
FINJAN, INC. (3)
6167520 System and method for protecting a client during runtime from hostile downloadables 130 1997
6092194 System and method for protecting a computer and a network from hostile downloadables 397 1997
6154844 System and method for attaching a downloadable security profile to a downloadable 296 1997
 
TECHGUARD SECURITY, L.L.C. (1)
6519703 Methods and apparatus for heuristic firewall 184 2000
 
GENERAL DYNAMICS MISSION SYSTEMS, INC. (1)
* 6088804 Adaptive system and method for responding to computer network security attacks 357 1998
 
ODS NETWORKS, INC. (1)
6347374 Event detection 459 1998
 
CANON KABUSHIKI KAISHA (2)
6668082 Image processing apparatus 80 1998
6618501 Object similarity calculation method and apparatus 23 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (23)
5032979 Distributed security auditing subsystem for an operating system 374 1990
5278901 Pattern-oriented intrusion-detection system and method 235 1992
5371852 Method and apparatus for making a cluster of computers appear as a single host on a network 672 1992
5630061 System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes 126 1993
5414833 Network security system and method using a parallel finite state machine adaptive active monitor and responder 399 1993
5974457 Intelligent realtime monitoring of data traffic 160 1993
5649185 Method and means for providing access to a library of digitized documents and images 239 1995
6477585 Filter mechanism for an event management service 95 1995
5832211 Propagating plain-text passwords from a main registry to a plurality of foreign registries 110 1995
5838903 Configurable password integrity servers for use in a shared resource environment 115 1995
5815574 Provision of secure access to external resources from a distributed computing environment 133 1995
5764887 System and method for supporting distributed computing mechanisms in a local area network server environment 125 1995
6377994 Method and apparatus for controlling server access to a resource in a client/server system 87 1996
5864665 Auditing login activity in a distributed computing environment 90 1996
5892903 Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system 437 1996
* 5872915 Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web 131 1996
6009467 System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions 57 1997
5961644 Method and apparatus for testing the integrity of computer security alarm systems 58 1997
6118940 Method and apparatus for benchmarking byte code sequences 98 1997
6161109 Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy 35 1998
6199181 Method and system for maintaining restricted operating environments for application programs or operating systems 202 1998
* 6438600 Securely sharing log-in credentials among trusted browser-based applications 95 1999
6721806 Remote direct memory access enabled network interface controller switchover and switchback support 82 2002
 
CHECK POINT SOFTWARE TECHNOLOGIES LTD. (2)
5606668 System for securing inbound and outbound data packet flow in a computer network 533 1993
5835726 System for securing the flow of and selectively modifying packets in a computer network 544 1996
 
CISCO TECHNOLOGY, INC. (11)
6282546 System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 287 1998
6324656 System and method for rules-driven multi-phase network vulnerability assessment 305 1998
* 6301668 Method and system for adaptive network security using network vulnerability assessment 435 1998
6415321 Domain mapping method and system 152 1998
6499107 Method and system for adaptive network security using intelligent packet analysis 321 1998
6477651 Intrusion detection system and method having dynamically loaded signatures 112 1999
6487666 Intrusion detection signature analysis using regular expressions and logical operators 366 1999
6578147 Parallel intrusion detection sensors with load balancing for high speed networks 192 1999
6405318 Intrusion detection system 308 1999
6816973 Method and system for adaptive network security using intelligent packet analysis 109 2002
6792546 Intrusion detection signature analysis using regular expressions and logical operators 129 2002
 
Check Point Software Technologies, Inc. (1)
5987611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 913 1997
 
Proactive Networks (1)
6453346 Method and apparatus for intelligent storage and reduction of network information 101 1998
 
FUJITSU LIMITED (2)
4400769 Virtual machine system 107 1980
5706210 Network monitoring device 78 1995
 
ALIBABA GROUP HOLDING LIMITED (1)
* 5875296 Distributed file system web server user authentication with cookies 497 1997
 
CUFER ASSET LTD. L.L.C. (1)
5857191 Web application server with secure common gateway interface 152 1996
 
ATOS IT SOLUTIONS AND SERVICES GMBH (1)
* 6850915 Method for controlling distribution and use of software products with net-work-connected computers 6 2000
 
ROUND ROCK RESEARCH, LLC (1)
5940591 Apparatus and method for providing network security 261 1996
 
AUTHORIZE.NET LLC (1)
5345595 Apparatus and method for detecting fraudulent telecommunication activity 256 1992
 
INTEL CORPORATION (4)
5347450 Message routing in a multiprocessor computer system 108 1993
6088803 System for virus-checking network data during download to a client device 334 1997
6266773 Computer security system 63 1998
* 6418472 System and method for using internet based caller ID for controlling access to an object stored in a computer 91 1999
 
HARRIS CORPORATION (2)
5787177 Integrated network security access control system 40 1996
6535227 System and method for assessing the security posture of a network and having a graphical user interface 175 2000
 
BLOCK FINANCIAL LLC (1)
6014645 Real-time financial card application system 495 1996
 
Intracept, Inc. (1)
6085224 Method and system for responding to hidden data and programs in a datastream 162 1997
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (4)
5828833 Method and system for allowing remote procedure calls through a network firewall 251 1996
6314525 Means for allowing two or more network interface controller cards to appear as one card to an operating system 131 1997
* 6434615 Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server 42 1999
6601190 Automatic capture and reporting of computer configuration data 43 1999
 
Hyperon Incorporated (1)
6353385 Method and system for interfacing an intrusion detection system to a central alarm system 78 2000
 
Multi-Tech Systems, Inc. (1)
5309562 Method and apparatus for establishing protocol spoofing from a modem 83 1991
 
PLATO, INC. (1)
6195687 Method and apparatus for master-slave control in a educational classroom communication network 63 1998
 
ARBOR NETWORKS, INC. (1)
2003/0037,136 Method and system for monitoring control signal traffic over a computer network 57 2002
 
CCS INC. (1)
6668084 Image recognition method 24 2000
 
POWER MANAGEMENT ENTERPRISES, LLC (3)
6021510 Antivirus accelerator 148 1997
6016553 Method, software and apparatus for saving, using and recovering data 209 1998
6094731 Antivirus accelerator for computer networks 199 1998
 
INDIANA BUSINESS MODERNIZATION AND TECHNOLOGY CORP. (1)
6061795 Network desktop management security system and method 61 1997
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (1)
6463426 Information search and retrieval system 123 1998
 
802 Systems LLC (1)
2002/0083,331 Methods and systems using PLD-based network communication protocols 72 2000
 
NEC CORPORATION (1)
6396845 Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic 45 1998
 
PERSONALOGO LLC (1)
6661904 Method and system for automated electronic conveyance of hidden data 67 1999
 
JPMORGAN CHASE BANK, NATIONAL ASSOCIATION (1)
6070244 Computer network security management system 312 1997
 
MICROSOFT TECHNOLOGY LICENSING, LLC (5)
5999711 Method and system for providing certificates holding authentication and authorization information for users/machines 130 1994
5899999 Iterative convolution filter particularly suited for use in an image classification and retrieval system 201 1996
5764890 Method and system for adding a secure network server to an existing computer network 220 1997
* 6275938 Security enhancement for untrusted executable code 279 1997
6519647 Methods and apparatus for synchronizing access control in a web server 122 1999
 
MEMCO SOFTWARE LTD. (1)
5925126 Method for security shield implementation in computer system's software 140 1997
 
TUT SYSTEMS, INC. (1)
6496858 Remote reconfiguration of a secure network interface 176 1999
 
DATADIRECT NETWORKS, INC. (1)
6453345 Network security and surveillance system 361 1997
 
JAMBETTA MUSIC INC (1)
6324627 Virtual data storage (VDS) system 81 1999
 
GENERAL ELECTRIC COMPANY (1)
* 6584454 Method and apparatus for community management in remote system servicing 214 1999
 
Quantum Leap Innovations, Inc. (1)
5842002 Computer virus trap 221 1997
 
VERIZON PATENT AND LICENSING INC. (1)
5734697 Method and apparatus for improving telecommunications system performance 43 1995
 
AXENT TECHNOLOGIES 1, INC. (1)
6279113 Dynamic signature inspection-based network intrusion detection 570 1998
 
IMAGELOCK, INC. (A NEVADA CORPORATION) (1)
6628824 Method and apparatus for image identification and comparison 56 1999
 
CYLANT TECHNOLOGY, LLC (1)
6681331 Dynamic software system intrusion detection 149 1999
 
COMPUTER ASSOCIATES THINK, INC. (1)
6026442 Method and apparatus for surveillance in communications networks 80 1997
 
Ericsson Messaging Systems Inc. (1)
5864803 Signal processing and training by a neural network for phoneme recognition 32 1997
 
PRC Inc. (2)
6408391 Dynamic system defense for information warfare 174 1998
6839850 Method and system for detecting intrusion into and misuse of a data processing system 167 1999
 
RSA SECURITY INC. (1)
6460141 Security and access management system for web-enabled and non-web-enabled applications and content on a computer network 628 1998
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6711127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 156 1998
 
CVSI, INC. (1)
4819234 Operating system debugger 141 1987
 
RPX CORPORATION (3)
5991881 Network surveillance system 536 1996
5922051 System and method for traffic management in a network management system 148 1997
* 5919257 Networked workstation intrusion detection system 372 1997
 
E-CONTACT TECHNOLOGIES LLC (1)
6470449 Time-stamped tamper-proof data storage 60 1994
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
6647139 Method of object recognition, apparatus of the same and recording medium therefor 40 2000
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
* 2008/0282,320 Security Compliance Methodology and Tool 3 2008
* 2010/0083,382 Method and System for Managing Computer Security Information 52 2009
 
ADOBE SYSTEMS INCORPORATED (1)
* 9558356 Data driven system for responding to security vulnerability 0 2015
 
LOOKOUT, INC. (54)
8467768 System and method for remotely securing or recovering a mobile device 13 2009
8397301 System and method for identifying and assessing vulnerabilities on a mobile communication device 30 2009
9367680 System and method for mobile communication device application advisement 19 2010
8533844 System and method for security data collection and analysis 37 2010
8347386 System and method for server-coupled malware prevention 33 2010
8538815 System and method for mobile device replacement 1 2010
8984628 System and method for adverse mobile application identification 5 2011
8738765 Mobile device DNS optimization 0 2011
9232491 Mobile device geolocation 0 2011
8788881 System and method for mobile device push communications 1 2011
8510843 Security status and information display system 1 2011
8505095 System and method for monitoring and analyzing multiple interfaces and multiple protocols 2 2011
8365252 Providing access levels to services based on mobile device security state 3 2011
8381303 System and method for attack and malware prevention 0 2011
* 9235704 System and method for a scanning API 2 2011
* 2012/0110,174 SYSTEM AND METHOD FOR A SCANNING API 196 2011
8855601 System and method for remotely-initiated audio communication 0 2012
8745739 System and method for server-coupled application re-analysis to obtain characterization assessment 1 2012
8752176 System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment 2 2012
9043919 Crawling multiple markets and correlating 1 2012
8655307 System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security 20 2012
8875289 System and method for preventing malware on a mobile communication device 0 2012
9407443 Component analysis of software applications on computing devices 0 2012
9208215 User classification based on data gathered from a computing device 2 2012
8855599 Method and apparatus for auxiliary communications with mobile communications device 0 2012
9424409 Method and system for protecting privacy and enhancing security on an electronic device 0 2013
8881292 Evaluating whether data is safe or malicious 0 2013
8683593 Server-assisted analysis of data for a mobile device 0 2013
8561144 Enforcing security based on a security state assessment of a mobile device 0 2013
9215074 Expressing intent to control behavior of application components 2 2013
8826441 Event-based security state assessment and display for mobile devices 5 2013
9374369 Multi-factor authentication and comprehensive login system for client-server networks 1 2013
8682400 Systems and methods for device broadcast of location information when battery is low 0 2013
8929874 Systems and methods for remotely controlling a lost mobile communications device 0 2013
9042876 System and method for uploading location information based on device movement 5 2013
9065846 Analyzing data gathered through different protocols 0 2013
9100389 Assessing an application based on application data associated with the application 0 2013
8635109 System and method for providing offers for mobile devices 1 2013
8997181 Assessing the security state of a mobile communications device 0 2013
9179434 Systems and methods for locking and disabling a device in response to a request 0 2013
9167550 Systems and methods for applying a security policy to a device based on location 0 2013
9100925 Systems and methods for displaying location information of a device 0 2013
8825007 Systems and methods for applying a security policy to a device based on a comparison of locations 0 2013
8774788 Systems and methods for transmitting a communication based on a device leaving or entering an area 0 2013
9642008 System and method for creating and assigning a policy for a mobile communications device based on personal data 0 2013
9408143 System and method for using context models to control operation of a mobile communications device 1 2013
9319292 Client activity DNS optimization 3 2014
9294500 System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects 0 2014
9569643 Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer 0 2014
9223973 System and method for attack and malware prevention 0 2014
9245119 Security status assessment using mobile device security information database 0 2014
9407640 Assessing a security state of a mobile communications device to determine access to specific tasks 0 2015
9344431 System and method for assessing an application based on data from multiple devices 0 2015
9589129 Determining source of side-loaded software 0 2015
 
EMC IP HOLDING COMPANY LLC (2)
9038178 Detection of malware beaconing activities 2 2012
* 9195826 Graph-based method to detect malware command-and-control infrastructure 2 2013
 
CLOUDFARE, INC. (1)
9049247 Internet-based proxy service for responding to server offline errors 0 2010
 
Saint Corporation (1)
* 9077745 Method of resolving port binding conflicts, and system and method of remote vulnerability assessment 0 2010
 
TVIIM, LLC (2)
* 8239917 Systems and methods for enterprise security with collaborative peer to peer architecture 5 2007
* 2008/0307,488 Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture 28 2007
 
TWITTER, INC. (2)
* 7653814 System and method for securely hyperlinking graphic objects 3 2002
* 2003/0110,384 System and method for securely hyperlinking graphic objects 16 2002
 
TRIPWIRE, INC. (1)
* 2005/0154,733 Real-time change detection for network systems 15 2004
 
TRUSTWAVE HOLDINGS, INC. (1)
* 2014/0189,863 Distributed Client Side User Monitoring and Attack System 0 2013
 
RIVERBED TECHNOLOGY, INC. (2)
* 7836498 Device to protect victim sites during denial of service attacks 3 2001
* 2002/0031,134 Device to protect victim sites during denial of service attacks 36 2001
 
Washington Research Foundation (1)
* 2006/0239,665 Gas chromatograph having a radiant oven for analytical devices 1 2005
 
SCA IPLA HOLDINGS INC (5)
* 7328453 Systems and methods for the prevention of unauthorized use and manipulation of digital content 92 2002
* 2004/0030,912 Systems and methods for the prevention of unauthorized use and manipulation of digital content 61 2002
8117667 Systems and methods for the prevention of unauthorized use and manipulation of digital content 5 2008
* 2008/0178,299 Systems and methods for the prevention of unauthorized use and manipulation of digital content 14 2008
8844048 Systems and methods for the prevention of unauthorized use and manipulation of digital content 0 2012
 
AVAYA INC. (2)
* 8707395 Technique for providing secure network access 1 2005
* 2007/0011,725 Technique for providing secure network access 23 2005
 
MICROSOFT TECHNOLOGY LICENSING, LLC (136)
7624356 Task-sensitive methods and systems for displaying command sets 23 2000
7913159 System and method for real-time validation of structured data files 24 2003
7516145 System and method for incrementally transforming and rendering hierarchical data files 17 2003
* 2004/0193,661 System and method for incrementally transforming and rendering hierarchical data files 4 2003
* 8156558 Mechanism for evaluating security risks 7 2003
* 2004/0230,835 Mechanism for evaluating security risks 24 2003
7581177 Conversion of structured documents 25 2003
7451392 Rendering an HTML electronic form by applying XSLT to XML using a solution 91 2003
8819072 Promoting data from structured data files 9 2004
7430711 Systems and methods for editing XML documents 30 2004
* 2005/0183,006 Systems and methods for editing XML documents 19 2004
7568101 Digital signatures with an embedded view 33 2004
7774620 Executing applications at appropriate trust levels 28 2004
* 7676843 Executing applications at appropriate trust levels 30 2004
7712048 Task-sensitive methods and systems for displaying command sets 19 2004
7610562 Task-sensitive methods and systems for displaying command sets 24 2004
7512896 Task-sensitive methods and systems for displaying command sets 22 2004
* 2005/0005,248 Task-sensitive methods and systems for displaying command sets 85 2004
* 2004/0268,260 Task-sensitive methods and systems for displaying command sets 27 2004
* 2004/0268,259 Task-sensitive methods and systems for displaying command sets 38 2004
7818677 Single window navigation methods and systems 34 2004
7779027 Methods, systems, architectures and data structures for delivering software via a network 34 2004
* 2005/0033,728 Methods, systems, architectures and data structures for delivering software via a network 106 2004
7673227 User interface for integrated spreadsheets and word processing tables 29 2004
7692636 Systems and methods for handwriting to a screen 26 2004
7516399 Structured-document path-language expression methods and systems 29 2004
* 2006/0074,930 Structured-document path-language expression methods and systems 2 2004
7549115 System and method for integrated spreadsheets and word processing tables 38 2004
7506242 System and method for integrating spreadsheets and word processing tables 12 2004
* 2005/0055,626 System and method for integrated spreadsheets and word processing tables 6 2004
* 2005/0050,088 System and method for integrating spreadsheets and word processing tables 15 2004
7506243 System and method for integrating spreadsheets and word processing tables 15 2004
* 2005/0125,377 System and method for integrating spreadsheets and word processing tables 35 2004
8487879 Systems and methods for interacting with a computer through handwriting to a screen 8 2004
* 2006/0074,969 Workflow interaction 10 2004
7712022 Mutually exclusive options in electronic forms 27 2004
* 2006/0107,197 Role-dependent action for an electronic form 13 2004
* 2006/0107,252 Mutually exclusive options in electronic forms 2 2004
7721190 Methods and systems for server side form processing 26 2004
7509353 Methods and systems for exchanging and rendering forms 6 2004
* 2006/0106,858 Methods and systems for server side form processing 0 2004
7904801 Recursive sections in electronic forms 12 2004
* 2006/0129,583 Recursive sections in electronic forms 38 2004
7437376 Scalable object model 26 2004
7937651 Structural editing operations for network forms 20 2005
7743063 Methods and systems for delivering software via a network 26 2005
7689929 Methods and systems of providing information to computer users 27 2005
7725834 Designer-created aspect for an electronic form template 29 2005
* 2006/0197,982 Designer-created aspect for an electronic form template 6 2005
* 2006/0235,829 Query to an electronic form 3 2005
8812613 Virtual application manager 0 2005
7908339 Transaction based virtual file system optimized for high-latency network connections 20 2005
7543228 Template for rendering an electronic form 37 2005
8200975 Digital signatures for network forms 10 2005
7664834 Distributed operating system management 38 2005
7613996 Enabling selection of an inferred schema part 35 2005
* 2007/0036,433 Recognizing data conforming to a rule 71 2005
7979856 Network-based software extensions 21 2005
8001459 Enabling electronic documents for limited-capability computing devices 11 2005
* 2007/0130,500 Enabling electronic documents for limited-capability computing devices 35 2005
7624086 Pre-install compliance system 44 2006
7490109 System and method for offline editing of data files 33 2006
9357031 Applications as a service 0 2006
8898319 Applications and services as a bundle 0 2006
8811396 System for and method of securing a network utilizing credentials 0 2006
8234238 Computer hardware and software diagnostic and report system 18 2006
9317506 Accelerated data transfer using common prior data segments 1 2006
* 7840514 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 18 2006
* 2008/0127,294 Secure virtual private network 26 2006
7900134 Authoring arbitrary XML documents using DHTML and XSLT 18 2006
* 2007/0074,106 Authoring Arbitrary XML Documents Using DHTML and XSLT 73 2006
8117552 Incrementally designing electronic forms and hierarchical schemas 10 2006
* 2007/0100,877 Building Electronic Forms 74 2006
* 2007/0101,280 Closer Interface for Designing Electronic Forms and Hierarchical Schemas 73 2006
8423821 Virtual recovery server 16 2006
7844686 Warm standby appliance 19 2006
* 8959568 Enterprise security assessment sharing 3 2007
* 8955105 Endpoint enabled for enterprise security assessment sharing 1 2007
8413247 Adaptive data collection for root-cause analysis and intrusion detection 8 2007
* 2008/0229,421 Adaptive data collection for root-cause analysis and intrusion detection 47 2007
* 2008/0229,422 Enterprise security assessment sharing 33 2007
* 2008/0229,414 Endpoint enabled for enterprise security assessment sharing 4 2007
* 2008/0229,419 Automated identification of firewall malware scanner deficiencies 7 2007
7865477 System and method for real-time validation of structured data files 20 2007
* 2008/0040,635 System and Method for Real-Time Validation of Structured Data Files 20 2007
8014976 Secure digital forensics 2 2007
* 2009/0112,521 Secure digital forensics 0 2007
8645515 Environment manager 0 2007
8316448 Automatic filter generation and generalization 5 2007
8307239 Disaster recovery appliance 23 2007
8175418 Method of and system for enhanced data storage 18 2007
8074217 Methods and systems for delivering software 28 2007
7971139 Correlation, association, or correspondence of electronic forms 17 2007
8122436 Privacy enhanced error reports 14 2007
* 2009/0132,861 Privacy Enhanced Error Reports 11 2007
7925621 Installing a solution 19 2008
* 2008/0189,335 Installing A Solution 16 2008
8892993 Translation file 4 2008
8136164 Manual operations in an enterprise security assessment sharing system 1 2008
* 2009/0217,381 MANUAL OPERATIONS IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 7 2008
8589323 Computer hardware and software diagnostic and report system incorporating an expert system and agents 3 2008
8918729 Designing electronic forms 4 2008
* 2008/0222,514 Systems and Methods for Editing XML Documents 20 2008
8910255 Authentication for distributed secure content management system 1 2008
* 2009/0300,739 Authentication for distributed secure content management system 72 2008
* 8739289 Hardware interface for enabling direct access and security assessment sharing 1 2008
* 2009/0254,984 HARDWARE INTERFACE FOR ENABLING DIRECT ACCESS AND SECURITY ASSESSMENT SHARING 3 2008
8689335 Mapping between users and machines in an enterprise security assessment sharing system 2 2008
* 2009/0328,222 MAPPING BETWEEN USERS AND MACHINES IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 35 2008
* 2009/0178,131 GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 7 2008
8910268 Enterprise security assessment sharing for consumers using globally distributed infrastructure 1 2008
8881223 Enterprise security assessment sharing for off-premise users using globally distributed infrastructure 3 2008
8296178 Services using globally distributed infrastructure for secure content management 9 2008
* 2009/0178,108 ENTERPRISE SECURITY ASSESSMENT SHARING FOR OFF-PREMISE USERS USING GLOBALLY DISTRIBUTED INFRASTRUCTURE 9 2008
* 2009/0177,514 SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 93 2008
8935742 Authentication in a globally distributed infrastructure for secure content management 3 2008
* 2009/0178,109 Authentication in a globally distributed infrastructure for secure content management 18 2008
8078960 Rendering an HTML electronic form by applying XSLT to XML using a solution 12 2008
* 8275984 TLS key and CGI session ID pairing 1 2008
* 2010/0153,702 TLS KEY AND CGI SESSION ID PAIRING 6 2008
9507610 Task-sensitive methods and systems for displaying command sets 0 2010
* 8099378 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 19 2010
* 2011/0047,118 SECURE VIRTUAL PRIVATE NETWORK UTILIZING A DIAGNOSTICS POLICY AND DIAGNOSTICS ENGINE TO ESTABLISH A SECURE NETWORK CONNECTION 17 2010
8745171 Warm standby appliance 0 2010
9229917 Electronic form user interfaces 1 2011
9210234 Enabling electronic documents for limited-capability computing devices 1 2011
8429522 Correlation, association, or correspondence of electronic forms 7 2011
8422833 Method of and system for enhanced data storage 0 2012
9268760 Correlation, association, or correspondence of electronic forms 0 2013
9448858 Environment manager 0 2013
9569194 Virtual application manager 0 2014
9645900 Warm standby appliance 0 2014
9092374 Method of and system for enhanced data storage 0 2014
9160735 System for and method of securing a network utilizing credentials 0 2014
9239821 Translation file 0 2014
9584480 System for and method of securing a network utilizing credentials 0 2015
 
MU DYNAMICS, INC. (2)
8547974 Generating communication protocol test cases based on network traffic 1 2011
8463860 Scenario based scale testing 3 2011
 
INTELLECTUAL VENTURES II LLC (2)
* 7383579 Systems and methods for determining anti-virus protection status 9 2002
* 7707636 Systems and methods for determining anti-virus protection status 3 2008
 
BANK OF AMERICA CORPORATION (2)
* 8099787 Knowledge-based and collaborative system for security assessment of web applications 1 2007
* 2009/0049,553 Knowledge-Based and Collaborative System for Security Assessment of Web Applications 5 2007
 
CLOUDFLARE, INC. (16)
9634993 Internet-based proxy service to modify internet responses 0 2010
9369437 Internet-based proxy service to modify internet responses 0 2010
9009330 Internet-based proxy service to limit internet visitor connection speed 0 2010
9634994 Custom responses for resource unavailable errors 0 2011
* 8850580 Validating visitor internet-based security threats 1 2011
* 2011/0283,359 Validating Visitor Internet-Based Security Threats 30 2011
9565166 Internet-based proxy service to modify internet responses 0 2011
9342620 Loading of web resources 0 2012
* 8856924 Mitigating a denial-of-service attack in a cloud-based proxy service 2 2012
8646064 Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service 1 2012
8613089 Identifying a denial-of-service attack in a cloud-based proxy service 13 2012
9628509 Identifying a denial-of-service attack in a cloud-based proxy service 0 2013
9641549 Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service 0 2014
9548966 Validating visitor internet-based security threats 0 2014
9661020 Mitigating a denial-of-service attack in a cloud-based proxy service 0 2014
9628581 Internet-based proxy service for responding to server offline errors 0 2015
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (4)
* 2006/0265,746 Method and system for managing computer security information 32 2006
* 9264443 Browser based method of assessing web application vulnerability 0 2008
* 2010/0050,263 BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY 15 2008
8141157 Method and system for managing computer security information 10 2009
 
SPIRENT COMMUNICATIONS, INC. (14)
8095983 Platform for analyzing the security of communication protocols and channels 9 2006
* 7958560 Portable program for generating attacks on communication protocols and channels 15 2006
* 2007/0174,917 Platform for analyzing the security of communication protocols and channels 27 2006
8316447 Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems 1 2006
* 2008/0072,322 Reconfigurable Message-Delivery Preconditions for Delivering Attacks to Analyze the Security of Networked Systems 23 2006
9172611 System and method for discovering assets and functional relationships in a network 1 2008
8074097 Meta-instrumentation for security analysis 2 2010
9106514 Hybrid network software provision 0 2010
8464219 Scalable control system for test execution and monitoring utilizing multiple processors 9 2011
8433811 Test driven deployment and monitoring of heterogeneous network systems 3 2011
8359653 Portable program for generating attacks on communication protocols and channels 1 2011
8631499 Platform for analyzing the security of communication protocols and channels 1 2012
8590048 Analyzing the security of communication protocols and channels for a pass through device 0 2012
8972543 Managing clients utilizing reverse transactions 0 2012
 
STREAMZAP, INC. (2)
* 8418062 Control of media centric websites by hand-held remote 1 2005
* 2005/0235,210 Control of media centric websites by hand-held remote 19 2005
 
SecurityScorecard, Inc. (1)
9294498 Online portal for improving cybersecurity risk scores 1 2015
 
GEORGE MASON UNIVERSITY (2)
* 7555778 Minimum-cost network hardening 4 2005
* 2006/0085,858 Minimum-cost network hardening 26 2005
 
CISCO TECHNOLOGY, INC. (2)
* 9436820 Controlling access to resources in a network 1 2004
* 9432393 Global clustering of incidents based on malware similarity and online trustfulness 0 2015
 
Check Point Software Technologies, Inc. (2)
7725737 System and methodology providing secure workspace environment 21 2005
* 2007/0101,435 System and Methodology Providing Secure Workspace Environment 164 2005
 
INFOSYS LIMITED (1)
* 2015/0172,310 METHOD AND SYSTEM TO IDENTIFY KEY LOGGING ACTIVITIES 0 2014
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 7788723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 20 2005
* 2006/0265,750 Method and apparatus for providing computer security 46 2005
 
REDCANNON SECURITY, INC. (1)
8613091 Method and apparatus for creating a secure anywhere system 2 2004
 
DELL PRODUCTS L.P. (1)
* 9369495 Sensor aware security policies with embedded controller hardened enforcement 0 2015
 
Redcannon, Inc. (2)
* 2007/0266,421 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CENTRALLY MANAGING POLICIES ASSIGNABLE TO A PLURALITY OF PORTABLE END-POINT SECURITY DEVICES OVER A NETWORK 36 2006
* 2008/0098,478 System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device 33 2006
 
SecurityProfiling, LLC (6)
9117069 Real-time vulnerability monitoring 2 2013
9118708 Multi-path remediation 0 2014
9118709 Anti-vulnerability system, method, and computer program product 0 2014
9100431 Computer program product and apparatus for multi-path remediation 0 2014
9118711 Anti-vulnerability system, method, and computer program product 0 2014
9225686 Anti-vulnerability system, method, and computer program product 0 2015
 
QUALYS, INC. (2)
* 9613099 Dynamic hierarchical tagging system and method 0 2011
* 2012/0158,725 Dynamic hierarchical tagging system and method 12 2011
 
AHNLAB, INC. (1)
* 2013/0254,893 APPARATUS AND METHOD FOR REMOVING MALICIOUS CODE 0 2011
 
INTEL CORPORATION (1)
* 8099786 Embedded mechanism for platform vulnerability assessment 1 2006
 
RPX CORPORATION (2)
* 7797752 Method and apparatus to secure a computing environment 17 2003
* 8595820 Surround security system 2 2010
 
SECURITY SCORECARD, INC. (3)
9641547 Entity IP mapping 0 2015
9501647 Calculating and benchmarking an entity's cybersecurity risk score 0 2015
9372994 Entity IP mapping 0 2015
 
SYMANTEC CORPORATION (1)
* 8356352 Security scanner for user-generated web content 6 2008
 
CITRIX SYSTEMS, INC. (13)
* 8613048 Method and apparatus for providing authorized remote access to application sessions 8 2004
* 2006/0070,131 METHOD AND APPARATUS FOR PROVIDING AUTHORIZED REMOTE ACCESS TO APPLICATION SESSIONS 67 2004
8065423 Method and system for assigning access control levels in providing access to networked content files 19 2006
* 2006/0190,455 Method and system for assigning access control levels in providing access to networked content files 37 2006
8533846 Method and system for dynamically associating access rights with a resource 2 2006
* 2008/0109,912 METHOD AND SYSTEM FOR DYNAMICALLY ASSOCIATING ACCESS RIGHTS WITH A RESOURCE 33 2006
8286230 Method and apparatus for associating tickets in a ticket hierarchy 1 2010
* 2010/0229,228 METHOD AND APPARATUS FOR ASSOCIATING TICKETS IN A TICKET HIERARCHY 0 2010
8312261 Method and system for verification of an endpoint security scan 0 2011
8352606 Method and system for assigning access control levels in providing access to networked content files 2 2011
9311502 Method and system for assigning access control levels in providing access to networked content files 1 2013
9401931 Method and system for dynamically associating access rights with a resource 0 2013
9401906 Method and apparatus for providing authorized remote access to application sessions 0 2013
 
WEBROOT INC. (6)
7591016 System and method for scanning memory for pestware offset signatures 4 2005
* 7571476 System and method for scanning memory for pestware 6 2005
7349931 System and method for scanning obfuscated files for pestware 60 2005
* 2006/0236,397 System and method for scanning obfuscated files for pestware 4 2005
* 2006/0236,396 System and method for scanning memory for pestware offset signatures 5 2005
7971249 System and method for scanning memory for pestware offset signatures 1 2009
 
PULSE SECURE, LLC (5)
* 8001610 Network defense system utilizing endpoint health indicators and user identity 28 2005
7882538 Local caching of endpoint security information 16 2006
7886335 Reconciliation of multiple sets of network access control policies 12 2007
8225102 Local caching of one-time user passwords 4 2010
8185933 Local caching of endpoint security information 1 2011
 
MCAFEE, INC. (15)
* 7549168 Network-based risk-assessment tool for remotely detecting local computer vulnerabilities 9 2006
8862752 System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof 0 2007
8793802 System, method, and computer program product for preventing data leakage utilizing a map of data 0 2007
* 8086582 System, method and computer program product for scanning and indexing data for different purposes 4 2007
* 8671087 System, method and computer program product for scanning and indexing data for different purposes 0 2011
* 2012/0079,117 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING AND INDEXING DATA FOR DIFFERENT PURPOSES 2 2011
8793763 System and method for interfacing with heterogeneous network data gathering tools 9 2011
8789140 System and method for interfacing with heterogeneous network data gathering tools 1 2011
* 8700767 System and method for network vulnerability detection and reporting 10 2012
* 8661126 System and method for network vulnerability detection and reporting 12 2012
* 2012/0144,494 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 24 2012
* 2012/0144,493 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 20 2012
8621060 System and method for network vulnerability detection and reporting 12 2012
8615582 System and method for network vulnerability detection and reporting 16 2012
9094434 System and method for automated policy audit and remediation management 0 2013
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 Aug 13, 2018
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00