US Patent No: 7,178,166

Number of patents in Portfolio can not be more than 2000

Vulnerability assessment and authentication of a computer by a local scanner

4 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Providing a user with assurance that a computer is secure based on a vulnerability assessment completed by a browser-compatible scanner operating on the computer. If the scanner finds a vulnerability, the scanner can inform the user that the machine is or may be compromised, or repair the vulnerability. For example, the scanner may be able to repair the vulnerability of the workstation. In the alternative, the scanner can provide the scan results to a network server. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can decline to provide network services to the workstation.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY40694

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Brass, Philip C Roswell, GA 3 453
Doty, Theodore R Roswell, GA 3 453
Mewett, Scott Holloways Beach, AU 2 257
Taylor, Patrick Atlanta, GA 11 250

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
5,121,345 System and method for protecting integrity of computer data and software 152 1990
5,359,659 Method for securing software against corruption by computer viruses 187 1992
 
TREND MICRO INCORPORATED (9)
5,440,723 Automatic immune system for computers and computer networks 407 1993
5,675,711 Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses 107 1994
5,452,442 Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities 260 1995
5,623,600 Virus detection and removal apparatus for computer networks 429 1995
5,907,834 Method and apparatus for detecting a presence of a computer virus 71 1996
5,983,348 Computer network malicious code scanner 224 1997
6,119,165 Controlled distribution of application programs in a computer network 212 1997
6,108,799 Automated sample creation of polymorphic and non-polymorphic marcro viruses 133 1998
6,272,641 Computer network malicious code scanner method and apparatus 148 1999
 
CA, INC. (3)
5,796,942 Method and apparatus for automated network-wide surveillance and security breach intervention 336 1996
6,098,173 Method and system for enforcing a communication security policy 88 1998
2002/0083,334 Detection of viral code using emulation of operating system functions 40 2001
 
Bull HN Information Systems Inc. (1)
5,274,824 Keyring metaphor for user's security keys on a distributed multiprocess data system 41 1991
 
SAMSUNG ELECTRONICS CO., LTD. (1)
6,278,886 Device and method for inputting and transmitting messages in a predetermined sequence in a portable telephone 38 1998
 
RVT TECHNOLOGIES, INC. (2)
6,003,132 Method and apparatus for isolating a computer system upon detection of viruses and similar data 26 1997
6,081,894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 60 1997
 
Yodlee.com, Inc. (1)
6,517,587 Networked architecture for enabling automated gathering of information from Web servers 71 1999
 
HEWLETT-PACKARD COMPANY (1)
5,881,236 System for installation of software on a remote computer system over a network using checksums and password protection 135 1996
 
DYNATRACE LLC (2)
6,144,961 Method and system for non-intrusive measurement of transaction response times on a network 79 1997
5,878,420 Network monitoring and management system 110 1997
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (8)
5,204,966 System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords 93 1990
5,311,593 Security system for a network concentrator 177 1992
5,812,763 Expert system having a plurality of security inspectors for detecting security flaws in a computer system 177 1993
5,586,260 Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms 491 1993
5,774,727 Parallel processing system for virtual processor implementation of machine-language instructions 30 1995
5,845,067 Method and apparatus for document management utilizing a messaging system 115 1996
5,790,799 System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code 53 1997
* 6,397,245 System and method for evaluating the operation of a computer over a computer network 53 1999
 
U.S. PHILIPS CORPORATION (1)
5,872,978 Method and apparatus for improved translation of program data into machine code format 53 1996
 
FISHER, MARY E. (1)
4,975,950 System and method of protecting integrity of computer data and software 144 1988
 
Milkway Networks Corporation (1)
5,623,601 Apparatus and method for providing a secure gateway for communication and data exchanges between networks 730 1994
 
TERADATA US, INC. (1)
5,745,692 Automated systems administration of remote computer servers 58 1995
 
Freegate Corporation (1)
6,073,172 Initializing and reconfiguring a secure network interface 103 1997
 
PALO ALTO NETWORKS, INC. (1)
6,205,552 Method and apparatus for checking security vulnerability of networked devices 119 1998
 
ACCENTURE GLOBAL SERVICES LIMITED (3)
6,324,647 System, method and article of manufacture for security management in a development architecture framework 278 1999
6,405,364 Building techniques in a development architecture framework 385 1999
6,606,744 Providing collaborative installation management in a network-based supply chain environment 966 1999
 
TANDEM COMPUTERS INCORPORATED (1)
4,672,609 Memory system with operation error detection 46 1986
 
INTELLECTUAL VENTURES I LLC (1)
5,987,610 Computer virus screening methods and systems 414 1998
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
5,748,098 Event correlation 119 1995
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,475,839 Method and structure for securing access to a computer system 152 1994
 
NFR SECURITY, INC. (1)
6,530,024 Adaptive feedback security system and method 223 1998
 
BRIGHT LIGHT TECHNOLOGIES, INC. (1)
6,052,709 Apparatus and method for controlling delivery of unsolicited electronic mail 592 1997
 
TEXAS INSTRUMENTS INCORPORATED (1)
5,950,012 Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes 140 1997
 
SYMANTEC CORPORATION (15)
5,398,196 Method and apparatus for detection of computer viruses 130 1993
5,696,822 Polymorphic virus detection module 193 1995
6,067,410 Emulation repair system 86 1996
5,798,706 Detecting unauthorized network communication 107 1996
5,765,030 Processor emulator module having a variable pre-fetch queue size for program execution 75 1996
5,854,916 State-based cache for antivirus software 78 1996
5,826,013 Polymorphic virus detection module 181 1997
5,964,889 Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator 69 1997
5,978,917 Detection and elimination of macro viruses 161 1997
6,357,008 Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases 231 1997
6,122,738 Computer file integrity verification 70 1998
* 6,298,445 Computer security 369 1998
5,999,723 State-based cache for antivirus software 55 1998
6,574,737 System for penetrating computer or computer network 158 1998
6,647,400 System and method for analyzing filesystems to detect intrusions 207 2000
 
NORTEL NETWORKS LIMITED (1)
6,006,016 Network fault correlation 246 1996
 
JATCO CORPORATION (1)
6,338,141 Method and apparatus for computer virus detection, analysis, and removal in real time 132 1998
 
Unified Access Communications (1)
* 6,041,347 Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network 187 1997
 
SRI INTERNATIONAL (6)
6,321,338 Network surveillance 466 1998
6,704,874 Network-based alert management 305 2000
6,484,203 Hierarchical event monitoring and analysis 278 2000
6,711,615 Network surveillance 128 2002
6,708,212 Network surveillance 138 2003
2004/0010,718 Network surveillance 73 2003
 
PURDUE RESEARCH FOUNDATION (1)
6,725,378 Network protection for denial of service attacks 108 1999
 
Micron Technology, Inc. (1)
4,773,028 Method and apparatus for improved monitoring and detection of improper device operation 90 1984
 
CHEMTRON RESEARCH LLC (1)
6,035,323 Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media 266 1997
 
SERVICENOW, INC. (1)
6,070,190 Client-based application availability and response monitoring and reporting for distributed computing environments 197 1998
 
JDS UNIPHASE CORPORATION (1)
5,539,659 Network analysis method 96 1994
 
TEXAS TECHNOLOGY VENTURES (1)
5,964,839 System and method for monitoring information flow and performing data collection 228 1998
 
Richard S. Carson & Assoc., Inc. (1)
6,185,689 Method for network self security assessment 263 1998
 
GOOGLE INC. (2)
5,696,486 Method and apparatus for policy-based alarm notification in a distributed network management environment 244 1995
5,832,208 Anti-virus agent for use with databases and mail servers 337 1996
 
THE REGENTS OF THE UNIVERSITY OF MICHIGAN (2)
2002/0032,793 Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic 43 2001
2002/0035,698 Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time 66 2001
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
6,792,144 System and method for locating an object in an image using models 54 2000
 
SHARP KABUSHIKI KAISHA (1)
* 6,429,952 Browser interface to scanner 83 1998
 
VMWARE, INC. (1)
6,397,242 Virtualization system including a virtual machine monitor for a computer with a segmented architecture 343 1998
 
OpenTV, Inc. (1)
5,884,033 Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions 492 1996
 
Bascom Global Internet Services, Inc. (1)
5,987,606 Method and system for content filtering information retrieved from an internet computer network 170 1997
 
WEBSENSE, INC. (1)
5,983,270 Method and apparatus for managing internetwork and intranetwork activity 321 1997
 
INTELLECTUAL VENTURES HOLDING 81 LLC (2)
6,271,840 Graphical search engine visual index 260 1998
6,563,959 Perceptual similarity image retrieval method 133 1999
 
Look Dynamics, Inc. (1)
6,445,822 Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network 59 1999
 
RPX CLEARINGHOUSE LLC (1)
5,974,237 Communications network monitoring 214 1996
 
The Boeing Company (2)
5,522,026 System for creating a single electronic checklist in response to multiple faults 80 1994
5,454,074 Electronic checklist system 113 1994
 
WISTRON CORPORATION (1)
5,511,184 Method and apparatus for protecting a computer system from computer viruses 74 1993
 
NETWORKS ASSOCIATES TECHNOLOGY, INC. (1)
6,275,942 System, method and computer program product for automatic response to computer system misuse using active response modules 237 1998
 
OPINCAR, WILLIAM A., SUNWEST TRADING CORPORATION (1)
5,353,393 Apparatus and method for manipulating scanned documents in a computer aided design system 36 1992
 
INSTANT ALERT SECURITY, LLC (1)
6,104,783 Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems 36 1996
 
EBAY INC. (1)
* 6,829,711 Personal website for electronic commerce on a smart java card with multiple security check points 39 1999
 
MCAFEE, INC. (11)
5,649,095 Method and apparatus for detecting computer viruses through the use of a scan information cache 83 1993
5,557,742 Method and system for detecting intrusion into and misuse of a data processing system 367 1994
5,983,350 Secure firewall supporting different levels of authentication based on address or encryption status 288 1996
5,991,856 System and method for computer operating system protection 66 1997
6,029,256 Method and system for allowing computer programs easy access to features of a virus scanning engine 104 1997
6,035,423 Method and system for providing automated updating and upgrading of antivirus applications using a computer network 288 1997
6,230,288 Method of treating whitespace during virus detection 73 1998
6,266,774 Method and system for securing, managing or optimizing a personal computer 205 1998
6,725,377 Method and system for updating anti-intrusion software 161 1999
6,775,780 Detecting malicious software by analyzing patterns of system calls generated during emulation 108 2000
6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 168 2001
 
HITACHI, LTD. (2)
5,919,258 Security system and method for computers connected to network 119 1997
5,931,946 Network system having external/internal audit system for computer security 135 1997
 
NETWORK SECURITY SYSTEMS, INC. (1)
* 2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 162 2001
 
ORACLE AMERICA, INC. (7)
5,590,331 Method and apparatus for generating platform-standard object files containing machine-independent code 89 1994
5,848,233 Method and apparatus for dynamic packet filter assignment 213 1996
6,119,234 Method and apparatus for client-host communication over a computer network 113 1997
6,173,413 Mechanism for maintaining constant permissions for multiple instances of a device within a cluster 54 1998
6,510,523 Method and system for providing limited access privileges with an untrusted terminal 104 1999
6,691,232 Security architecture with environment sensitive credential sufficiency evaluation 237 1999
6,718,383 High availability networking with virtual IP address failover 76 2000
 
IN-DEFENSE, INC. (1)
5,822,517 Method for detecting infection of software programs by memory resident software viruses 64 1996
 
SECURELOGIX CORPORATION (1)
6,226,372 Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities 122 1999
 
GOOGLE TECHNOLOGY HOLDINGS LLC (1)
5,761,504 Method for updating a software code in a communication system 41 1996
 
APPLE INC. (3)
5,515,508 Client server system and method of operation including a dynamically configurable protocol stack 233 1993
6,477,648 Trusted workstation in a networked client/server computing system 134 1997
6,314,520 Trusted workstation in a networked client/server computing system 54 1999
 
TECHNOLOGY INTERNATIONAL, INC. (1)
5,210,704 System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment 280 1990
 
FINJAN, INC. (3)
6,167,520 System and method for protecting a client during runtime from hostile downloadables 128 1997
6,092,194 System and method for protecting a computer and a network from hostile downloadables 374 1997
6,154,844 System and method for attaching a downloadable security profile to a downloadable 288 1997
 
TECHGUARD SECURITY, LLC (1)
6,519,703 Methods and apparatus for heuristic firewall 177 2000
 
GENERAL DYNAMICS MISSION SYSTEMS, INC (1)
* 6,088,804 Adaptive system and method for responding to computer network security attacks 343 1998
 
ODS NETWORKS, INC. (1)
6,347,374 Event detection 444 1998
 
CANON KABUSHIKI KAISHA (2)
6,668,082 Image processing apparatus 78 1998
6,618,501 Object similarity calculation method and apparatus 23 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (23)
5,032,979 Distributed security auditing subsystem for an operating system 356 1990
5,278,901 Pattern-oriented intrusion-detection system and method 229 1992
5,371,852 Method and apparatus for making a cluster of computers appear as a single host on a network 657 1992
5,630,061 System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes 125 1993
5,414,833 Network security system and method using a parallel finite state machine adaptive active monitor and responder 382 1993
5,974,457 Intelligent realtime monitoring of data traffic 159 1993
5,649,185 Method and means for providing access to a library of digitized documents and images 234 1995
6,477,585 Filter mechanism for an event management service 94 1995
5,832,211 Propagating plain-text passwords from a main registry to a plurality of foreign registries 106 1995
5,838,903 Configurable password integrity servers for use in a shared resource environment 109 1995
5,815,574 Provision of secure access to external resources from a distributed computing environment 129 1995
5,764,887 System and method for supporting distributed computing mechanisms in a local area network server environment 122 1995
6,377,994 Method and apparatus for controlling server access to a resource in a client/server system 86 1996
5,864,665 Auditing login activity in a distributed computing environment 87 1996
5,892,903 Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system 423 1996
* 5,872,915 Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web 127 1996
6,009,467 System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions 56 1997
5,961,644 Method and apparatus for testing the integrity of computer security alarm systems 58 1997
6,118,940 Method and apparatus for benchmarking byte code sequences 98 1997
6,161,109 Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy 34 1998
6,199,181 Method and system for maintaining restricted operating environments for application programs or operating systems 195 1998
* 6,438,600 Securely sharing log-in credentials among trusted browser-based applications 94 1999
6,721,806 Remote direct memory access enabled network interface controller switchover and switchback support 81 2002
 
CHECK POINT SOFTWARE TECHNOLOGIES LTD. (2)
5,606,668 System for securing inbound and outbound data packet flow in a computer network 520 1993
5,835,726 System for securing the flow of and selectively modifying packets in a computer network 523 1996
 
CISCO TECHNOLOGY, INC. (11)
6,282,546 System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 279 1998
6,324,656 System and method for rules-driven multi-phase network vulnerability assessment 296 1998
* 6,301,668 Method and system for adaptive network security using network vulnerability assessment 423 1998
6,415,321 Domain mapping method and system 143 1998
6,499,107 Method and system for adaptive network security using intelligent packet analysis 307 1998
6,477,651 Intrusion detection system and method having dynamically loaded signatures 111 1999
6,487,666 Intrusion detection signature analysis using regular expressions and logical operators 330 1999
6,578,147 Parallel intrusion detection sensors with load balancing for high speed networks 182 1999
6,405,318 Intrusion detection system 297 1999
6,816,973 Method and system for adaptive network security using intelligent packet analysis 107 2002
6,792,546 Intrusion detection signature analysis using regular expressions and logical operators 122 2002
 
Check Point Software Technologies, Inc. (1)
5,987,611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 849 1997
 
PROACTIVE NETWORKS (1)
6,453,346 Method and apparatus for intelligent storage and reduction of network information 101 1998
 
FUJITSU LIMITED (2)
4,400,769 Virtual machine system 106 1980
5,706,210 Network monitoring device 76 1995
 
ALIBABA GROUP HOLDING LIMITED (1)
* 5,875,296 Distributed file system web server user authentication with cookies 479 1997
 
CUFER ASSET LTD. L.L.C. (1)
5,857,191 Web application server with secure common gateway interface 149 1996
 
Atos IT Solutions and Services GmbH (1)
* 6,850,915 Method for controlling distribution and use of software products with net-work-connected computers 5 2000
 
ROUND ROCK RESEARCH, LLC (1)
5,940,591 Apparatus and method for providing network security 254 1996
 
AUTHORIZE.NET LLC (1)
5,345,595 Apparatus and method for detecting fraudulent telecommunication activity 245 1992
 
INTEL CORPORATION (4)
5,347,450 Message routing in a multiprocessor computer system 105 1993
6,088,803 System for virus-checking network data during download to a client device 295 1997
6,266,773 Computer security system 61 1998
* 6,418,472 System and method for using internet based caller ID for controlling access to an object stored in a computer 82 1999
 
HARRIS CORPORATION (2)
5,787,177 Integrated network security access control system 39 1996
6,535,227 System and method for assessing the security posture of a network and having a graphical user interface 168 2000
 
BLOCK FINANCIAL LLC (1)
6,014,645 Real-time financial card application system 469 1996
 
Intracept, Inc. (1)
6,085,224 Method and system for responding to hidden data and programs in a datastream 145 1997
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (4)
5,828,833 Method and system for allowing remote procedure calls through a network firewall 236 1996
6,314,525 Means for allowing two or more network interface controller cards to appear as one card to an operating system 126 1997
* 6,434,615 Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server 42 1999
6,601,190 Automatic capture and reporting of computer configuration data 42 1999
 
Hyperon Incorporated (1)
6,353,385 Method and system for interfacing an intrusion detection system to a central alarm system 77 2000
 
Multi-Tech Systems, Inc. (1)
5,309,562 Method and apparatus for establishing protocol spoofing from a modem 83 1991
 
PLATO, INC. (1)
6,195,687 Method and apparatus for master-slave control in a educational classroom communication network 61 1998
 
ARBOR NETWORKS, INC. (1)
2003/0037,136 Method and system for monitoring control signal traffic over a computer network 50 2002
 
CCS INC. (1)
6,668,084 Image recognition method 24 2000
 
POWER MANAGEMENT ENTERPRISES, LLC (3)
6,021,510 Antivirus accelerator 146 1997
6,016,553 Method, software and apparatus for saving, using and recovering data 206 1998
6,094,731 Antivirus accelerator for computer networks 193 1998
 
INDIANA BUSINESS MODERNIZATION AND TECHNOLOGY CORPORATION (1)
6,061,795 Network desktop management security system and method 61 1997
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (1)
6,463,426 Information search and retrieval system 115 1998
 
802 SYSTEMS LLC (1)
2002/0083,331 Methods and systems using PLD-based network communication protocols 67 2000
 
NEC CORPORATION (1)
6,396,845 Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic 45 1998
 
PERSONALOGO LLC (1)
6,661,904 Method and system for automated electronic conveyance of hidden data 65 1999
 
JPMORGAN CHASE BANK, N.A. (1)
6,070,244 Computer network security management system 297 1997
 
MICROSOFT TECHNOLOGY LICENSING, LLC (5)
5,999,711 Method and system for providing certificates holding authentication and authorization information for users/machines 127 1994
5,899,999 Iterative convolution filter particularly suited for use in an image classification and retrieval system 196 1996
5,764,890 Method and system for adding a secure network server to an existing computer network 214 1997
* 6,275,938 Security enhancement for untrusted executable code 265 1997
6,519,647 Methods and apparatus for synchronizing access control in a web server 119 1999
 
Memco Software, Ltd. (1)
5,925,126 Method for security shield implementation in computer system's software 135 1997
 
TUT SYSTEMS, INC. (1)
6,496,858 Remote reconfiguration of a secure network interface 173 1999
 
DATADIRECT NETWORKS, INC. (1)
6,453,345 Network security and surveillance system 353 1997
 
JAMBETTA MUSIC INC (1)
6,324,627 Virtual data storage (VDS) system 81 1999
 
GENERAL ELECTRIC COMPANY (1)
* 6,584,454 Method and apparatus for community management in remote system servicing 205 1999
 
QUANTUM LEAP INNOVATIONS, INC. (1)
5,842,002 Computer virus trap 185 1997
 
VERIZON PATENT AND LICENSING INC. (1)
5,734,697 Method and apparatus for improving telecommunications system performance 43 1995
 
AXENT TECHNOLOGIES 1, INC. (1)
6,279,113 Dynamic signature inspection-based network intrusion detection 521 1998
 
IMAGELOCK, INC. (A NEVADA CORPORATION) (1)
6,628,824 Method and apparatus for image identification and comparison 55 1999
 
CYLANT TECHNOLOGY, LLC (1)
6,681,331 Dynamic software system intrusion detection 142 1999
 
COMPUTER ASSOCIATES THINK, INC. (1)
6,026,442 Method and apparatus for surveillance in communications networks 79 1997
 
Ericsson Messaging Systems Inc. (1)
5,864,803 Signal processing and training by a neural network for phoneme recognition 32 1997
 
PRC INC. (2)
6,408,391 Dynamic system defense for information warfare 172 1998
6,839,850 Method and system for detecting intrusion into and misuse of a data processing system 155 1999
 
RSA SECURITY INC. (1)
6,460,141 Security and access management system for web-enabled and non-web-enabled applications and content on a computer network 577 1998
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6,711,127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 151 1998
 
CVSI, INC. (1)
4,819,234 Operating system debugger 141 1987
 
RPX CORPORATION (3)
5,991,881 Network surveillance system 506 1996
5,922,051 System and method for traffic management in a network management system 147 1997
* 5,919,257 Networked workstation intrusion detection system 358 1997
 
E-CONTACT TECHNOLOGIES LLC (1)
6,470,449 Time-stamped tamper-proof data storage 59 1994
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
6,647,139 Method of object recognition, apparatus of the same and recording medium therefor 38 2000
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
LOOKOUT, INC. (50)
8,467,768 System and method for remotely securing or recovering a mobile device 4 2009
8,397,301 System and method for identifying and assessing vulnerabilities on a mobile communication device 14 2009
9,367,680 System and method for mobile communication device application advisement 0 2010
8,533,844 System and method for security data collection and analysis 24 2010
8,347,386 System and method for server-coupled malware prevention 24 2010
8,538,815 System and method for mobile device replacement 0 2010
8,984,628 System and method for adverse mobile application identification 1 2011
8,738,765 Mobile device DNS optimization 0 2011
9,232,491 Mobile device geolocation 0 2011
8,788,881 System and method for mobile device push communications 1 2011
8,510,843 Security status and information display system 1 2011
8,505,095 System and method for monitoring and analyzing multiple interfaces and multiple protocols 1 2011
8,365,252 Providing access levels to services based on mobile device security state 2 2011
8,381,303 System and method for attack and malware prevention 0 2011
* 9,235,704 System and method for a scanning API 1 2011
* 2012/0110,174 SYSTEM AND METHOD FOR A SCANNING API 169 2011
8,855,601 System and method for remotely-initiated audio communication 0 2012
8,745,739 System and method for server-coupled application re-analysis to obtain characterization assessment 1 2012
8,752,176 System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment 2 2012
9,043,919 Crawling multiple markets and correlating 0 2012
8,655,307 System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security 10 2012
8,875,289 System and method for preventing malware on a mobile communication device 0 2012
9,407,443 Component analysis of software applications on computing devices 0 2012
9,208,215 User classification based on data gathered from a computing device 2 2012
8,855,599 Method and apparatus for auxiliary communications with mobile communications device 0 2012
8,881,292 Evaluating whether data is safe or malicious 0 2013
8,683,593 Server-assisted analysis of data for a mobile device 0 2013
8,561,144 Enforcing security based on a security state assessment of a mobile device 0 2013
9,215,074 Expressing intent to control behavior of application components 1 2013
8,826,441 Event-based security state assessment and display for mobile devices 2 2013
9,374,369 Multi-factor authentication and comprehensive login system for client-server networks 0 2013
8,682,400 Systems and methods for device broadcast of location information when battery is low 0 2013
8,929,874 Systems and methods for remotely controlling a lost mobile communications device 0 2013
9,042,876 System and method for uploading location information based on device movement 3 2013
9,065,846 Analyzing data gathered through different protocols 0 2013
9,100,389 Assessing an application based on application data associated with the application 0 2013
8,635,109 System and method for providing offers for mobile devices 0 2013
8,997,181 Assessing the security state of a mobile communications device 0 2013
9,179,434 Systems and methods for locking and disabling a device in response to a request 0 2013
9,167,550 Systems and methods for applying a security policy to a device based on location 0 2013
9,100,925 Systems and methods for displaying location information of a device 0 2013
8,825,007 Systems and methods for applying a security policy to a device based on a comparison of locations 0 2013
8,774,788 Systems and methods for transmitting a communication based on a device leaving or entering an area 0 2013
9,408,143 System and method for using context models to control operation of a mobile communications device 0 2013
9,319,292 Client activity DNS optimization 0 2014
9,294,500 System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects 0 2014
9,223,973 System and method for attack and malware prevention 0 2014
9,245,119 Security status assessment using mobile device security information database 0 2014
9,407,640 Assessing a security state of a mobile communications device to determine access to specific tasks 0 2015
9,344,431 System and method for assessing an application based on data from multiple devices 0 2015
 
Other [Check patent profile for assignment information] (3)
* 2008/0282,320 Security Compliance Methodology and Tool 2 2008
* 2010/0083,382 Method and System for Managing Computer Security Information 50 2009
9,424,409 Method and system for protecting privacy and enhancing security on an electronic device 0 2013
 
CLOUDFARE, INC. (1)
9,049,247 Internet-based proxy service for responding to server offline errors 0 2010
 
Saint Corporation (1)
* 9,077,745 Method of resolving port binding conflicts, and system and method of remote vulnerability assessment 0 2010
 
TVIIM, LLC (2)
* 8,239,917 Systems and methods for enterprise security with collaborative peer to peer architecture 4 2007
* 2008/0307,488 Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture 24 2007
 
TWITTER, INC. (2)
* 7,653,814 System and method for securely hyperlinking graphic objects 3 2002
* 2003/0110,384 System and method for securely hyperlinking graphic objects 12 2002
 
TRIPWIRE, INC. (1)
* 2005/0154,733 Real-time change detection for network systems 14 2004
 
RIVERBED TECHNOLOGY, INC. (2)
* 7,836,498 Device to protect victim sites during denial of service attacks 2 2001
* 2002/0031,134 Device to protect victim sites during denial of service attacks 35 2001
 
Washington Research Foundation (1)
* 2006/0239,665 Gas chromatograph having a radiant oven for analytical devices 1 2005
 
SCA IPLA HOLDINGS INC. (5)
* 7,328,453 Systems and methods for the prevention of unauthorized use and manipulation of digital content 69 2002
* 2004/0030,912 Systems and methods for the prevention of unauthorized use and manipulation of digital content 48 2002
8,117,667 Systems and methods for the prevention of unauthorized use and manipulation of digital content 4 2008
* 2008/0178,299 Systems and methods for the prevention of unauthorized use and manipulation of digital content 12 2008
8,844,048 Systems and methods for the prevention of unauthorized use and manipulation of digital content 0 2012
 
AVAYA INC. (2)
* 8,707,395 Technique for providing secure network access 0 2005
* 2007/0011,725 Technique for providing secure network access 19 2005
 
MICROSOFT TECHNOLOGY LICENSING, LLC (128)
7,624,356 Task-sensitive methods and systems for displaying command sets 22 2000
7,913,159 System and method for real-time validation of structured data files 22 2003
7,516,145 System and method for incrementally transforming and rendering hierarchical data files 16 2003
* 2004/0193,661 System and method for incrementally transforming and rendering hierarchical data files 4 2003
* 8,156,558 Mechanism for evaluating security risks 2 2003
* 2004/0230,835 Mechanism for evaluating security risks 23 2003
7,581,177 Conversion of structured documents 21 2003
7,451,392 Rendering an HTML electronic form by applying XSLT to XML using a solution 86 2003
8,819,072 Promoting data from structured data files 7 2004
7,430,711 Systems and methods for editing XML documents 27 2004
* 2005/0183,006 Systems and methods for editing XML documents 13 2004
7,568,101 Digital signatures with an embedded view 29 2004
7,774,620 Executing applications at appropriate trust levels 24 2004
* 7,676,843 Executing applications at appropriate trust levels 25 2004
7,712,048 Task-sensitive methods and systems for displaying command sets 18 2004
7,610,562 Task-sensitive methods and systems for displaying command sets 22 2004
7,512,896 Task-sensitive methods and systems for displaying command sets 21 2004
* 2005/0005,248 Task-sensitive methods and systems for displaying command sets 82 2004
* 2004/0268,260 Task-sensitive methods and systems for displaying command sets 25 2004
* 2004/0268,259 Task-sensitive methods and systems for displaying command sets 37 2004
7,818,677 Single window navigation methods and systems 33 2004
7,779,027 Methods, systems, architectures and data structures for delivering software via a network 32 2004
* 2005/0033,728 Methods, systems, architectures and data structures for delivering software via a network 91 2004
7,673,227 User interface for integrated spreadsheets and word processing tables 27 2004
7,692,636 Systems and methods for handwriting to a screen 25 2004
7,549,115 System and method for integrated spreadsheets and word processing tables 36 2004
7,506,242 System and method for integrating spreadsheets and word processing tables 10 2004
* 2005/0055,626 System and method for integrated spreadsheets and word processing tables 4 2004
* 2005/0050,088 System and method for integrating spreadsheets and word processing tables 14 2004
7,506,243 System and method for integrating spreadsheets and word processing tables 14 2004
* 2005/0125,377 System and method for integrating spreadsheets and word processing tables 33 2004
8,487,879 Systems and methods for interacting with a computer through handwriting to a screen 8 2004
* 2006/0074,969 Workflow interaction 9 2004
7,712,022 Mutually exclusive options in electronic forms 27 2004
* 2006/0107,197 Role-dependent action for an electronic form 13 2004
* 2006/0107,252 Mutually exclusive options in electronic forms 1 2004
7,721,190 Methods and systems for server side form processing 26 2004
7,509,353 Methods and systems for exchanging and rendering forms 5 2004
* 2006/0106,858 Methods and systems for server side form processing 0 2004
7,904,801 Recursive sections in electronic forms 12 2004
* 2006/0129,583 Recursive sections in electronic forms 34 2004
7,437,376 Scalable object model 23 2004
7,937,651 Structural editing operations for network forms 19 2005
7,743,063 Methods and systems for delivering software via a network 25 2005
7,689,929 Methods and systems of providing information to computer users 27 2005
7,725,834 Designer-created aspect for an electronic form template 29 2005
* 2006/0197,982 Designer-created aspect for an electronic form template 5 2005
* 2006/0235,829 Query to an electronic form 3 2005
8,812,613 Virtual application manager 0 2005
7,908,339 Transaction based virtual file system optimized for high-latency network connections 16 2005
7,543,228 Template for rendering an electronic form 36 2005
8,200,975 Digital signatures for network forms 10 2005
7,664,834 Distributed operating system management 32 2005
7,613,996 Enabling selection of an inferred schema part 35 2005
* 2007/0036,433 Recognizing data conforming to a rule 69 2005
7,979,856 Network-based software extensions 20 2005
8,001,459 Enabling electronic documents for limited-capability computing devices 11 2005
* 2007/0130,500 Enabling electronic documents for limited-capability computing devices 35 2005
7,624,086 Pre-install compliance system 37 2006
7,490,109 System and method for offline editing of data files 31 2006
9,357,031 Applications as a service 0 2006
8,898,319 Applications and services as a bundle 0 2006
8,811,396 System for and method of securing a network utilizing credentials 0 2006
8,234,238 Computer hardware and software diagnostic and report system 14 2006
9,317,506 Accelerated data transfer using common prior data segments 0 2006
* 7,840,514 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 14 2006
* 2008/0127,294 Secure virtual private network 22 2006
7,900,134 Authoring arbitrary XML documents using DHTML and XSLT 18 2006
* 2007/0074,106 Authoring Arbitrary XML Documents Using DHTML and XSLT 71 2006
8,117,552 Incrementally designing electronic forms and hierarchical schemas 10 2006
* 2007/0100,877 Building Electronic Forms 73 2006
* 2007/0101,280 Closer Interface for Designing Electronic Forms and Hierarchical Schemas 72 2006
8,423,821 Virtual recovery server 10 2006
7,844,686 Warm standby appliance 14 2006
* 8,959,568 Enterprise security assessment sharing 0 2007
* 8,955,105 Endpoint enabled for enterprise security assessment sharing 0 2007
8,413,247 Adaptive data collection for root-cause analysis and intrusion detection 4 2007
* 2008/0229,421 Adaptive data collection for root-cause analysis and intrusion detection 22 2007
* 2008/0229,422 Enterprise security assessment sharing 23 2007
* 2008/0229,419 Automated identification of firewall malware scanner deficiencies 7 2007
7,865,477 System and method for real-time validation of structured data files 19 2007
* 2008/0040,635 System and Method for Real-Time Validation of Structured Data Files 18 2007
8,014,976 Secure digital forensics 2 2007
* 2009/0112,521 Secure digital forensics 0 2007
8,645,515 Environment manager 0 2007
8,316,448 Automatic filter generation and generalization 5 2007
8,307,239 Disaster recovery appliance 14 2007
8,175,418 Method of and system for enhanced data storage 13 2007
8,074,217 Methods and systems for delivering software 26 2007
7,971,139 Correlation, association, or correspondence of electronic forms 17 2007
8,122,436 Privacy enhanced error reports 14 2007
* 2009/0132,861 Privacy Enhanced Error Reports 9 2007
7,925,621 Installing a solution 18 2008
* 2008/0189,335 Installing A Solution 16 2008
8,892,993 Translation file 4 2008
8,136,164 Manual operations in an enterprise security assessment sharing system 1 2008
* 2009/0217,381 MANUAL OPERATIONS IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 5 2008
8,589,323 Computer hardware and software diagnostic and report system incorporating an expert system and agents 0 2008
8,918,729 Designing electronic forms 4 2008
* 2008/0222,514 Systems and Methods for Editing XML Documents 19 2008
8,910,255 Authentication for distributed secure content management system 1 2008
* 2009/0300,739 Authentication for distributed secure content management system 46 2008
* 8,739,289 Hardware interface for enabling direct access and security assessment sharing 1 2008
* 2009/0254,984 HARDWARE INTERFACE FOR ENABLING DIRECT ACCESS AND SECURITY ASSESSMENT SHARING 3 2008
8,689,335 Mapping between users and machines in an enterprise security assessment sharing system 1 2008
* 2009/0328,222 MAPPING BETWEEN USERS AND MACHINES IN AN ENTERPRISE SECURITY ASSESSMENT SHARING SYSTEM 26 2008
* 2009/0178,131 GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 6 2008
8,910,268 Enterprise security assessment sharing for consumers using globally distributed infrastructure 1 2008
8,881,223 Enterprise security assessment sharing for off-premise users using globally distributed infrastructure 2 2008
8,296,178 Services using globally distributed infrastructure for secure content management 6 2008
* 2009/0178,108 ENTERPRISE SECURITY ASSESSMENT SHARING FOR OFF-PREMISE USERS USING GLOBALLY DISTRIBUTED INFRASTRUCTURE 7 2008
* 2009/0177,514 SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT 75 2008
8,935,742 Authentication in a globally distributed infrastructure for secure content management 2 2008
* 2009/0178,109 Authentication in a globally distributed infrastructure for secure content management 14 2008
8,078,960 Rendering an HTML electronic form by applying XSLT to XML using a solution 9 2008
* 8,275,984 TLS key and CGI session ID pairing 0 2008
* 2010/0153,702 TLS KEY AND CGI SESSION ID PAIRING 5 2008
* 8,099,378 Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection 14 2010
* 2011/0047,118 SECURE VIRTUAL PRIVATE NETWORK UTILIZING A DIAGNOSTICS POLICY AND DIAGNOSTICS ENGINE TO ESTABLISH A SECURE NETWORK CONNECTION 12 2010
8,745,171 Warm standby appliance 0 2010
9,229,917 Electronic form user interfaces 0 2011
9,210,234 Enabling electronic documents for limited-capability computing devices 1 2011
8,429,522 Correlation, association, or correspondence of electronic forms 7 2011
8,422,833 Method of and system for enhanced data storage 0 2012
9,268,760 Correlation, association, or correspondence of electronic forms 0 2013
9,092,374 Method of and system for enhanced data storage 0 2014
9,160,735 System for and method of securing a network utilizing credentials 0 2014
9,239,821 Translation file 0 2014
 
INTELLECTUAL VENTURES II LLC (2)
* 7,383,579 Systems and methods for determining anti-virus protection status 9 2002
* 7,707,636 Systems and methods for determining anti-virus protection status 3 2008
 
BANK OF AMERICA CORPORATION (2)
* 8,099,787 Knowledge-based and collaborative system for security assessment of web applications 0 2007
* 2009/0049,553 Knowledge-Based and Collaborative System for Security Assessment of Web Applications 3 2007
 
CLOUDFLARE, INC. (8)
9,369,437 Internet-based proxy service to modify internet responses 0 2010
9,009,330 Internet-based proxy service to limit internet visitor connection speed 0 2010
* 8,850,580 Validating visitor internet-based security threats 1 2011
* 2011/0283,359 Validating Visitor Internet-Based Security Threats 20 2011
9,342,620 Loading of web resources 0 2012
* 8,856,924 Mitigating a denial-of-service attack in a cloud-based proxy service 1 2012
8,646,064 Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service 1 2012
8,613,089 Identifying a denial-of-service attack in a cloud-based proxy service 7 2012
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (4)
* 2006/0265,746 Method and system for managing computer security information 30 2006
* 9,264,443 Browser based method of assessing web application vulnerability 0 2008
* 2010/0050,263 BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY 12 2008
8,141,157 Method and system for managing computer security information 10 2009
 
SPIRENT COMMUNICATIONS, INC. (15)
8,095,983 Platform for analyzing the security of communication protocols and channels 7 2006
* 7,958,560 Portable program for generating attacks on communication protocols and channels 15 2006
* 2007/0174,917 Platform for analyzing the security of communication protocols and channels 25 2006
8,316,447 Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems 0 2006
* 2008/0072,322 Reconfigurable Message-Delivery Preconditions for Delivering Attacks to Analyze the Security of Networked Systems 22 2006
9,172,611 System and method for discovering assets and functional relationships in a network 0 2008
8,074,097 Meta-instrumentation for security analysis 2 2010
9,106,514 Hybrid network software provision 0 2010
8,464,219 Scalable control system for test execution and monitoring utilizing multiple processors 9 2011
8,463,860 Scenario based scale testing 2 2011
8,433,811 Test driven deployment and monitoring of heterogeneous network systems 2 2011
8,359,653 Portable program for generating attacks on communication protocols and channels 1 2011
8,631,499 Platform for analyzing the security of communication protocols and channels 0 2012
8,590,048 Analyzing the security of communication protocols and channels for a pass through device 0 2012
8,972,543 Managing clients utilizing reverse transactions 0 2012
 
SecurityScorecard, Inc. (1)
9,294,498 Online portal for improving cybersecurity risk scores 0 2015
 
STREAMZAP, INC. (2)
* 8,418,062 Control of media centric websites by hand-held remote 1 2005
* 2005/0235,210 Control of media centric websites by hand-held remote 16 2005
 
GEORGE MASON UNIVERSITY (1)
* 7,555,778 Minimum-cost network hardening 2 2005
 
Check Point Software Technologies, Inc. (2)
7,725,737 System and methodology providing secure workspace environment 20 2005
* 2007/0101,435 System and Methodology Providing Secure Workspace Environment 132 2005
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 7,788,723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 17 2005
* 2006/0265,750 Method and apparatus for providing computer security 39 2005
 
REDCANNON SECURITY, INC. (1)
8,613,091 Method and apparatus for creating a secure anywhere system 2 2004
 
DELL PRODUCTS L.P. (1)
* 9,369,495 Sensor aware security policies with embedded controller hardened enforcement 0 2015
 
Mu Dynamics (1)
8,547,974 Generating communication protocol test cases based on network traffic 1 2011
 
Redcannon, Inc. (2)
* 2007/0266,421 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CENTRALLY MANAGING POLICIES ASSIGNABLE TO A PLURALITY OF PORTABLE END-POINT SECURITY DEVICES OVER A NETWORK 30 2006
* 2008/0098,478 System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device 29 2006
 
QUALYS, INC. (1)
* 2012/0158,725 Dynamic hierarchical tagging system and method 8 2011
 
SecurityProfiling, LLC (6)
9,117,069 Real-time vulnerability monitoring 0 2013
9,118,708 Multi-path remediation 0 2014
9,118,709 Anti-vulnerability system, method, and computer program product 0 2014
9,100,431 Computer program product and apparatus for multi-path remediation 0 2014
9,118,711 Anti-vulnerability system, method, and computer program product 0 2014
9,225,686 Anti-vulnerability system, method, and computer program product 0 2015
 
PROXIMA THERAPEUTICS, INC. (2)
7,516,399 Structured-document path-language expression methods and systems 27 2004
* 2006/0074,930 Structured-document path-language expression methods and systems 2 2004
 
AHNLAB, INC. (1)
* 2013/0254,893 APPARATUS AND METHOD FOR REMOVING MALICIOUS CODE 0 2011
 
EMC CORPORATION (2)
9,038,178 Detection of malware beaconing activities 2 2012
* 9,195,826 Graph-based method to detect malware command-and-control infrastructure 0 2013
 
INTEL CORPORATION (1)
* 8,099,786 Embedded mechanism for platform vulnerability assessment 1 2006
 
RPX CORPORATION (2)
* 7,797,752 Method and apparatus to secure a computing environment 13 2003
* 8,595,820 Surround security system 2 2010
 
SECURITY SCORECARD, INC. (1)
9,372,994 Entity IP mapping 0 2015
 
SYMANTEC CORPORATION (1)
* 8,356,352 Security scanner for user-generated web content 4 2008
 
CITRIX SYSTEMS, INC. (13)
* 8,613,048 Method and apparatus for providing authorized remote access to application sessions 4 2004
* 2006/0070,131 METHOD AND APPARATUS FOR PROVIDING AUTHORIZED REMOTE ACCESS TO APPLICATION SESSIONS 57 2004
8,065,423 Method and system for assigning access control levels in providing access to networked content files 17 2006
* 2006/0190,455 Method and system for assigning access control levels in providing access to networked content files 35 2006
8,533,846 Method and system for dynamically associating access rights with a resource 2 2006
* 2008/0109,912 METHOD AND SYSTEM FOR DYNAMICALLY ASSOCIATING ACCESS RIGHTS WITH A RESOURCE 27 2006
8,286,230 Method and apparatus for associating tickets in a ticket hierarchy 1 2010
* 2010/0229,228 METHOD AND APPARATUS FOR ASSOCIATING TICKETS IN A TICKET HIERARCHY 0 2010
8,312,261 Method and system for verification of an endpoint security scan 0 2011
8,352,606 Method and system for assigning access control levels in providing access to networked content files 2 2011
9,311,502 Method and system for assigning access control levels in providing access to networked content files 0 2013
9,401,931 Method and system for dynamically associating access rights with a resource 0 2013
9,401,906 Method and apparatus for providing authorized remote access to application sessions 0 2013
 
WEBROOT INC. (5)
7,591,016 System and method for scanning memory for pestware offset signatures 4 2005
* 7,571,476 System and method for scanning memory for pestware 6 2005
7,349,931 System and method for scanning obfuscated files for pestware 52 2005
* 2006/0236,397 System and method for scanning obfuscated files for pestware 4 2005
7,971,249 System and method for scanning memory for pestware offset signatures 1 2009
 
PULSE SECURE, LLC (5)
* 8,001,610 Network defense system utilizing endpoint health indicators and user identity 22 2005
7,882,538 Local caching of endpoint security information 15 2006
7,886,335 Reconciliation of multiple sets of network access control policies 7 2007
8,225,102 Local caching of one-time user passwords 4 2010
8,185,933 Local caching of endpoint security information 1 2011
 
MCAFEE, INC. (15)
* 7,549,168 Network-based risk-assessment tool for remotely detecting local computer vulnerabilities 9 2006
8,862,752 System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof 0 2007
8,793,802 System, method, and computer program product for preventing data leakage utilizing a map of data 0 2007
* 8,086,582 System, method and computer program product for scanning and indexing data for different purposes 4 2007
* 8,671,087 System, method and computer program product for scanning and indexing data for different purposes 0 2011
* 2012/0079,117 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING AND INDEXING DATA FOR DIFFERENT PURPOSES 2 2011
8,793,763 System and method for interfacing with heterogeneous network data gathering tools 3 2011
8,789,140 System and method for interfacing with heterogeneous network data gathering tools 1 2011
* 8,700,767 System and method for network vulnerability detection and reporting 10 2012
* 8,661,126 System and method for network vulnerability detection and reporting 12 2012
* 2012/0144,494 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 22 2012
* 2012/0144,493 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING 18 2012
8,621,060 System and method for network vulnerability detection and reporting 12 2012
8,615,582 System and method for network vulnerability detection and reporting 15 2012
9,094,434 System and method for automated policy audit and remediation management 0 2013
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 Aug 13, 2018
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00