US Patent No: 7,921,459

Number of patents in Portfolio can not be more than 2000

System and method for managing security events on a network

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A computer-implemented system for managing security event data collected from a computing network. The system employs an event managing software module that can reside on a computing network that is being monitored with security devices. The event managing software collects security event data from security devices located in the monitored computing network and can process the security event data. In processing the security event data, the event manager module can format the data and create manageable summaries of the data. The event manager also supports storage of the security event data and the results of any processing performed on the data. Security event data can be identified by the event manager for use in responding to a security event.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY40098

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Di, Iorio Matthew Thaddeus Atlanta, US 1 135
Embar, Sridhar Atlanta, US 1 135
Houston, Gregory Neil Norcross, US 1 135
Kobsa, Christian D Lawrenceville, US 1 135
Nikitaides, Michael George Marietta, US 1 135
Williams, Bryan Douglas Lawrenceville, US 4 387

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
5,121,345 System and method for protecting integrity of computer data and software 151 1990
5,359,659 Method for securing software against corruption by computer viruses 187 1992
 
TREND MICRO INCORPORATED (10)
5,440,723 Automatic immune system for computers and computer networks 401 1993
5,675,711 Adaptive statistical regression and classification of data strings, with application to the generic detection of computer viruses 106 1994
5,452,442 Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities 260 1995
5,623,600 Virus detection and removal apparatus for computer networks 423 1995
5,907,834 Method and apparatus for detecting a presence of a computer virus 71 1996
* 5,905,859 Managed network device security method and apparatus 164 1997
5,983,348 Computer network malicious code scanner 221 1997
6,119,165 Controlled distribution of application programs in a computer network 211 1997
6,108,799 Automated sample creation of polymorphic and non-polymorphic marcro viruses 132 1998
6,272,641 Computer network malicious code scanner method and apparatus 147 1999
 
CA, INC. (3)
5,796,942 Method and apparatus for automated network-wide surveillance and security breach intervention 332 1996
6,098,173 Method and system for enforcing a communication security policy 88 1998
2002/0083,334 Detection of viral code using emulation of operating system functions 40 2001
 
Bull HN Information Systems Inc. (1)
5,274,824 Keyring metaphor for user's security keys on a distributed multiprocess data system 41 1991
 
SAMSUNG ELECTRONICS CO., LTD. (1)
6,278,886 Device and method for inputting and transmitting messages in a predetermined sequence in a portable telephone 38 1998
 
RVT TECHNOLOGIES, INC. (2)
6,003,132 Method and apparatus for isolating a computer system upon detection of viruses and similar data 26 1997
6,081,894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 60 1997
 
YODLEE.COM, INC. (1)
6,517,587 Networked architecture for enabling automated gathering of information from Web servers 70 1999
 
HEWLETT-PACKARD COMPANY (1)
5,881,236 System for installation of software on a remote computer system over a network using checksums and password protection 135 1996
 
DYNATRACE LLC (2)
6,144,961 Method and system for non-intrusive measurement of transaction response times on a network 78 1997
5,878,420 Network monitoring and management system 109 1997
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (10)
5,204,966 System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords 93 1990
* 5,375,199 System monitoring method and device including a graphical user interface to view and manipulate system information 114 1991
5,311,593 Security system for a network concentrator 173 1992
5,812,763 Expert system having a plurality of security inspectors for detecting security flaws in a computer system 176 1993
5,586,260 Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms 489 1993
5,774,727 Parallel processing system for virtual processor implementation of machine-language instructions 30 1995
5,845,067 Method and apparatus for document management utilizing a messaging system 115 1996
5,790,799 System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code 52 1997
6,397,245 System and method for evaluating the operation of a computer over a computer network 53 1999
6,467,002 Single cycle modified round-robin arbitration with embedded priority 29 1999
 
U.S. PHILIPS CORPORATION (1)
5,872,978 Method and apparatus for improved translation of program data into machine code format 53 1996
 
FISHER, MARY E. (1)
4,975,950 System and method of protecting integrity of computer data and software 144 1988
 
Milkway Networks Corporation (1)
5,623,601 Apparatus and method for providing a secure gateway for communication and data exchanges between networks 722 1994
 
Teradata US, Inc. (1)
5,745,692 Automated systems administration of remote computer servers 58 1995
 
Freegate Corporation (1)
6,073,172 Initializing and reconfiguring a secure network interface 102 1997
 
PALO ALTO NETWORKS, INC. (1)
6,205,552 Method and apparatus for checking security vulnerability of networked devices 118 1998
 
ACCENTURE GLOBAL SERVICES LIMITED (3)
6,324,647 System, method and article of manufacture for security management in a development architecture framework 276 1999
6,405,364 Building techniques in a development architecture framework 383 1999
6,606,744 Providing collaborative installation management in a network-based supply chain environment 955 1999
 
TANDEM COMPUTERS INCORPORATED (1)
4,672,609 Memory system with operation error detection 45 1986
 
INTELLECTUAL VENTURES I LLC (1)
5,987,610 Computer virus screening methods and systems 405 1998
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
5,748,098 Event correlation 118 1995
 
RACAL-DATACOM, INC. (1)
* 5,063,523 Network management system with event rule handling 173 1989
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,475,839 Method and structure for securing access to a computer system 151 1994
 
NFR SECURITY, INC. (1)
6,530,024 Adaptive feedback security system and method 220 1998
 
BRIGHT LIGHT TECHNOLOGIES, INC. (1)
6,052,709 Apparatus and method for controlling delivery of unsolicited electronic mail 588 1997
 
TEXAS INSTRUMENTS INCORPORATED (1)
5,950,012 Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes 140 1997
 
SYMANTEC CORPORATION (17)
5,398,196 Method and apparatus for detection of computer viruses 128 1993
5,696,822 Polymorphic virus detection module 190 1995
6,067,410 Emulation repair system 86 1996
5,798,706 Detecting unauthorized network communication 106 1996
5,765,030 Processor emulator module having a variable pre-fetch queue size for program execution 74 1996
5,854,916 State-based cache for antivirus software 77 1996
5,826,013 Polymorphic virus detection module 180 1997
5,964,889 Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator 69 1997
5,978,917 Detection and elimination of macro viruses 159 1997
6,357,008 Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases 230 1997
6,122,738 Computer file integrity verification 69 1998
6,298,445 Computer security 366 1998
5,999,723 State-based cache for antivirus software 55 1998
6,574,737 System for penetrating computer or computer network 157 1998
6,851,057 Data driven detection of viruses 107 1999
6,886,102 System and method for protecting a computer network against denial of service attacks 86 2000
6,647,400 System and method for analyzing filesystems to detect intrusions 204 2000
 
NORTEL NETWORKS LIMITED (1)
6,006,016 Network fault correlation 245 1996
 
Jatcom Corporation (1)
6,338,141 Method and apparatus for computer virus detection, analysis, and removal in real time 132 1998
 
Unified Access Communications (1)
6,041,347 Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network 187 1997
 
SRI INTERNATIONAL (6)
6,321,338 Network surveillance 460 1998
6,704,874 Network-based alert management 300 2000
6,484,203 Hierarchical event monitoring and analysis 276 2000
6,711,615 Network surveillance 127 2002
6,708,212 Network surveillance 138 2003
2004/0010,718 Network surveillance 73 2003
 
PURDUE RESEARCH FOUNDATION (1)
* 6,725,378 Network protection for denial of service attacks 108 1999
 
Micron Technology, Inc. (1)
4,773,028 Method and apparatus for improved monitoring and detection of improper device operation 89 1984
 
CHEMTRON RESEARCH LLC (1)
6,035,323 Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media 259 1997
 
SERVICENOW, INC. (1)
6,070,190 Client-based application availability and response monitoring and reporting for distributed computing environments 197 1998
 
JDS UNIPHASE CORPORATION (1)
5,539,659 Network analysis method 95 1994
 
TEXAS TECHNOLOGY VENTURES (1)
5,964,839 System and method for monitoring information flow and performing data collection 222 1998
 
Richard S. Carson & Assoc., Inc. (1)
6,185,689 Method for network self security assessment 258 1998
 
GOOGLE INC. (2)
5,696,486 Method and apparatus for policy-based alarm notification in a distributed network management environment 243 1995
5,832,208 Anti-virus agent for use with databases and mail servers 337 1996
 
THE REGENTS OF THE UNIVERSITY OF MICHIGAN (2)
2002/0032,793 Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic 42 2001
2002/0035,698 Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time 65 2001
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
6,792,144 System and method for locating an object in an image using models 54 2000
 
SHARP KABUSHIKI KAISHA (1)
6,429,952 Browser interface to scanner 83 1998
 
VMWARE, INC. (1)
6,397,242 Virtualization system including a virtual machine monitor for a computer with a segmented architecture 341 1998
 
OpenTV, Inc. (1)
5,884,033 Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions 489 1996
 
Bascom Global Internet Services, Inc. (1)
5,987,606 Method and system for content filtering information retrieved from an internet computer network 168 1997
 
WEBSENSE, INC. (1)
5,983,270 Method and apparatus for managing internetwork and intranetwork activity 316 1997
 
Look Dynamics, Inc. (1)
6,445,822 Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network 59 1999
 
RPX CLEARINGHOUSE LLC (2)
* 5,774,667 Method and apparatus for managing parameter settings for multiple network devices 86 1996
5,974,237 Communications network monitoring 212 1996
 
THE BOEING COMPANY (2)
5,522,026 System for creating a single electronic checklist in response to multiple faults 80 1994
5,454,074 Electronic checklist system 111 1994
 
WISTRON CORPORATION (1)
5,511,184 Method and apparatus for protecting a computer system from computer viruses 74 1993
 
NETWORKS ASSOCIATES TECHNOLOGY, INC. (1)
6,275,942 System, method and computer program product for automatic response to computer system misuse using active response modules 233 1998
 
OPINCAR, WILLIAM A., SUNWEST TRADING CORPORATION (1)
5,353,393 Apparatus and method for manipulating scanned documents in a computer aided design system 36 1992
 
INSTANT ALERT SECURITY, LLC (1)
6,104,783 Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems 36 1996
 
MCAFEE, INC. (12)
5,649,095 Method and apparatus for detecting computer viruses through the use of a scan information cache 83 1993
5,557,742 Method and system for detecting intrusion into and misuse of a data processing system 366 1994
5,983,350 Secure firewall supporting different levels of authentication based on address or encryption status 286 1996
5,991,856 System and method for computer operating system protection 66 1997
6,029,256 Method and system for allowing computer programs easy access to features of a virus scanning engine 104 1997
6,035,423 Method and system for providing automated updating and upgrading of antivirus applications using a computer network 282 1997
6,230,288 Method of treating whitespace during virus detection 73 1998
6,266,774 Method and system for securing, managing or optimizing a personal computer 205 1998
6,725,377 Method and system for updating anti-intrusion software 160 1999
6,775,780 Detecting malicious software by analyzing patterns of system calls generated during emulation 105 2000
6,871,284 Credential/condition assertion verification optimization 87 2001
6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 166 2001
 
INTELLECTUAL VENTURES HOLDING 81 LLC (2)
6,271,840 Graphical search engine visual index 256 1998
6,563,959 Perceptual similarity image retrieval method 131 1999
 
TVIIM, LLC (1)
6,889,168 Method and apparatus for assessing the security of a computer system 29 2001
 
WATCHGUARD TECHNOLOGIES, INC. (1)
* 6,493,752 Device and method for graphically displaying data movement in a secured network 29 1999
 
HITACHI, LTD. (2)
5,919,258 Security system and method for computers connected to network 118 1997
5,931,946 Network system having external/internal audit system for computer security 135 1997
 
NETWORK SECURITY SYSTEMS, INC. (1)
2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 159 2001
 
ORACLE AMERICA, INC. (9)
5,590,331 Method and apparatus for generating platform-standard object files containing machine-independent code 88 1994
* 5,930,476 Apparatus and method for generating automatic customized event requests 23 1996
6,220,768 Network asset survey tool for gathering data about node equipment 99 1996
5,848,233 Method and apparatus for dynamic packet filter assignment 212 1996
6,119,234 Method and apparatus for client-host communication over a computer network 110 1997
6,173,413 Mechanism for maintaining constant permissions for multiple instances of a device within a cluster 54 1998
6,510,523 Method and system for providing limited access privileges with an untrusted terminal 103 1999
6,691,232 Security architecture with environment sensitive credential sufficiency evaluation 232 1999
6,718,383 High availability networking with virtual IP address failover 74 2000
 
IN-DEFENSE, INC. (1)
5,822,517 Method for detecting infection of software programs by memory resident software viruses 64 1996
 
SECURELOGIX CORPORATION (1)
6,226,372 Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities 119 1999
 
GOOGLE TECHNOLOGY HOLDINGS LLC (1)
5,761,504 Method for updating a software code in a communication system 40 1996
 
APPLE INC. (3)
5,515,508 Client server system and method of operation including a dynamically configurable protocol stack 231 1993
6,477,648 Trusted workstation in a networked client/server computing system 134 1997
6,314,520 Trusted workstation in a networked client/server computing system 54 1999
 
TECHNOLOGY INTERNATIONAL INCORPORATED (1)
5,210,704 System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment 278 1990
 
FINJAN, INC. (3)
6,167,520 System and method for protecting a client during runtime from hostile downloadables 128 1997
6,092,194 System and method for protecting a computer and a network from hostile downloadables 369 1997
6,154,844 System and method for attaching a downloadable security profile to a downloadable 286 1997
 
TECHGUARD SECURITY, LLC (1)
6,519,703 Methods and apparatus for heuristic firewall 174 2000
 
GENERAL DYNAMICS MISSION SYSTEMS, INC. (1)
6,088,804 Adaptive system and method for responding to computer network security attacks 341 1998
 
ODS NETWORKS, INC. (1)
* 6,347,374 Event detection 440 1998
 
CANON KABUSHIKI KAISHA (2)
6,668,082 Image processing apparatus 77 1998
6,618,501 Object similarity calculation method and apparatus 23 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (25)
5,032,979 Distributed security auditing subsystem for an operating system 353 1990
5,278,901 Pattern-oriented intrusion-detection system and method 229 1992
5,371,852 Method and apparatus for making a cluster of computers appear as a single host on a network 654 1992
5,630,061 System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes 123 1993
5,414,833 Network security system and method using a parallel finite state machine adaptive active monitor and responder 378 1993
5,974,457 Intelligent realtime monitoring of data traffic 158 1993
5,715,395 Method and apparatus for reducing network resource location traffic in a network 54 1994
5,649,185 Method and means for providing access to a library of digitized documents and images 234 1995
6,477,585 Filter mechanism for an event management service 93 1995
5,832,211 Propagating plain-text passwords from a main registry to a plurality of foreign registries 105 1995
5,838,903 Configurable password integrity servers for use in a shared resource environment 107 1995
5,815,574 Provision of secure access to external resources from a distributed computing environment 127 1995
5,764,887 System and method for supporting distributed computing mechanisms in a local area network server environment 121 1995
6,377,994 Method and apparatus for controlling server access to a resource in a client/server system 85 1996
5,864,665 Auditing login activity in a distributed computing environment 86 1996
5,892,903 Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system 418 1996
5,872,915 Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web 123 1996
6,009,467 System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions 55 1997
5,961,644 Method and apparatus for testing the integrity of computer security alarm systems 58 1997
6,118,940 Method and apparatus for benchmarking byte code sequences 98 1997
6,161,109 Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy 34 1998
6,199,181 Method and system for maintaining restricted operating environments for application programs or operating systems 191 1998
6,438,600 Securely sharing log-in credentials among trusted browser-based applications 94 1999
6,912,676 Automated risk assessment tool for AIX-based computer systems 24 1999
6,721,806 Remote direct memory access enabled network interface controller switchover and switchback support 77 2002
 
CHECK POINT SOFTWARE TECHNOLOGIES LTD. (2)
5,606,668 System for securing inbound and outbound data packet flow in a computer network 515 1993
5,835,726 System for securing the flow of and selectively modifying packets in a computer network 515 1996
 
CISCO TECHNOLOGY, INC. (12)
6,282,546 System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 278 1998
6,324,656 System and method for rules-driven multi-phase network vulnerability assessment 295 1998
6,301,668 Method and system for adaptive network security using network vulnerability assessment 416 1998
6,415,321 Domain mapping method and system 142 1998
6,499,107 Method and system for adaptive network security using intelligent packet analysis 304 1998
6,477,651 Intrusion detection system and method having dynamically loaded signatures 110 1999
6,487,666 Intrusion detection signature analysis using regular expressions and logical operators 326 1999
6,578,147 Parallel intrusion detection sensors with load balancing for high speed networks 180 1999
6,405,318 Intrusion detection system 295 1999
* 6,775,657 Multilayered intrusion detection system and method 177 1999
6,816,973 Method and system for adaptive network security using intelligent packet analysis 105 2002
6,792,546 Intrusion detection signature analysis using regular expressions and logical operators 122 2002
 
Check Point Software Technologies, Inc. (1)
5,987,611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 826 1997
 
PROACTIVE NETWORKS (1)
6,453,346 Method and apparatus for intelligent storage and reduction of network information 100 1998
 
FUJITSU LIMITED (2)
4,400,769 Virtual machine system 105 1980
5,706,210 Network monitoring device 75 1995
 
ALIBABA GROUP HOLDING LIMITED (1)
5,875,296 Distributed file system web server user authentication with cookies 469 1997
 
CUFER ASSET LTD. L.L.C. (1)
5,857,191 Web application server with secure common gateway interface 149 1996
 
ROUND ROCK RESEARCH, LLC (1)
5,940,591 Apparatus and method for providing network security 253 1996
 
Authorize.Net LLC (1)
5,345,595 Apparatus and method for detecting fraudulent telecommunication activity 242 1992
 
INTEL CORPORATION (3)
5,347,450 Message routing in a multiprocessor computer system 105 1993
6,088,803 System for virus-checking network data during download to a client device 294 1997
6,266,773 Computer security system 60 1998
 
HARRIS CORPORATION (2)
5,787,177 Integrated network security access control system 39 1996
6,535,227 System and method for assessing the security posture of a network and having a graphical user interface 167 2000
 
BLOCK FINANCIAL LLC (1)
6,014,645 Real-time financial card application system 464 1996
 
Intracept, Inc. (1)
6,085,224 Method and system for responding to hidden data and programs in a datastream 142 1997
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (4)
5,828,833 Method and system for allowing remote procedure calls through a network firewall 233 1996
6,314,525 Means for allowing two or more network interface controller cards to appear as one card to an operating system 125 1997
6,434,615 Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server 41 1999
6,601,190 Automatic capture and reporting of computer configuration data 42 1999
 
Hyperon Incorporated (1)
6,353,385 Method and system for interfacing an intrusion detection system to a central alarm system 75 2000
 
Multi-Tech Systems, Inc. (1)
5,309,562 Method and apparatus for establishing protocol spoofing from a modem 83 1991
 
PLATO, INC. (1)
6,195,687 Method and apparatus for master-slave control in a educational classroom communication network 61 1998
 
Arbor Networks, Inc. (1)
2003/0037,136 Method and system for monitoring control signal traffic over a computer network 49 2002
 
CCS, INC. (1)
6,668,084 Image recognition method 24 2000
 
POWER MANAGEMENT ENTERPRISES, LLC (3)
6,021,510 Antivirus accelerator 146 1997
6,016,553 Method, software and apparatus for saving, using and recovering data 205 1998
6,094,731 Antivirus accelerator for computer networks 193 1998
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (1)
6,463,426 Information search and retrieval system 113 1998
 
802 SYSTEMS LLC (1)
2002/0083,331 Methods and systems using PLD-based network communication protocols 66 2000
 
NEC CORPORATION (1)
6,396,845 Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic 44 1998
 
PERSONALOGO LLC (1)
6,661,904 Method and system for automated electronic conveyance of hidden data 64 1999
 
JPMORGAN CHASE BANK, N.A. (1)
6,070,244 Computer network security management system 293 1997
 
MICROSOFT TECHNOLOGY LICENSING, LLC (5)
5,999,711 Method and system for providing certificates holding authentication and authorization information for users/machines 126 1994
5,899,999 Iterative convolution filter particularly suited for use in an image classification and retrieval system 195 1996
5,764,890 Method and system for adding a secure network server to an existing computer network 213 1997
6,275,938 Security enhancement for untrusted executable code 260 1997
6,519,647 Methods and apparatus for synchronizing access control in a web server 119 1999
 
MEMCO SOFTWARE LTD. (1)
5,925,126 Method for security shield implementation in computer system's software 133 1997
 
TUT SYSTEMS, INC. (1)
6,496,858 Remote reconfiguration of a secure network interface 171 1999
 
DataDirect Networks, Inc. (1)
* 6,453,345 Network security and surveillance system 347 1997
 
JAMBETTA MUSIC INC (1)
6,324,627 Virtual data storage (VDS) system 81 1999
 
GENERAL ELECTRIC COMPANY (1)
6,584,454 Method and apparatus for community management in remote system servicing 203 1999
 
QUANTUM LEAP INNOVATIONS, INC. (1)
5,842,002 Computer virus trap 184 1997
 
VERIZON PATENT AND LICENSING INC. (1)
5,734,697 Method and apparatus for improving telecommunications system performance 43 1995
 
AXENT TECHNOLOGIES 1, INC. (1)
6,279,113 Dynamic signature inspection-based network intrusion detection 515 1998
 
IMAGELOCK, INC. (A NEVADA CORPORATION) (1)
6,628,824 Method and apparatus for image identification and comparison 54 1999
 
FA HASSET CO., L.L.C. (1)
6,061,795 Network desktop management security system and method 61 1997
 
CYLANT TECHNOLOGY, LLC (1)
6,681,331 Dynamic software system intrusion detection 141 1999
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 5,832,503 Method and apparatus for configuration management in communications networks 210 1995
6,026,442 Method and apparatus for surveillance in communications networks 77 1997
 
Ericsson Messaging Systems Inc. (1)
5,864,803 Signal processing and training by a neural network for phoneme recognition 32 1997
 
PRC INC. (2)
6,408,391 Dynamic system defense for information warfare 171 1998
6,839,850 Method and system for detecting intrusion into and misuse of a data processing system 151 1999
 
RSA SECURITY INC. (1)
6,460,141 Security and access management system for web-enabled and non-web-enabled applications and content on a computer network 570 1998
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6,711,127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 150 1998
 
CVSI, INC. (1)
4,819,234 Operating system debugger 141 1987
 
RPX CORPORATION (3)
* 5,991,881 Network surveillance system 499 1996
5,922,051 System and method for traffic management in a network management system 146 1997
5,919,257 Networked workstation intrusion detection system 353 1997
 
E-CONTACT TECHNOLOGIES LLC (1)
6,470,449 Time-stamped tamper-proof data storage 58 1994
 
F. POSZAT HU, L.L.C. (1)
* 5,721,825 System and method for global event notification and delivery in a distributed computing environment 106 1996
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
6,647,139 Method of object recognition, apparatus of the same and recording medium therefor 37 2000
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Core Security Technologies (2)
* 8,490,196 System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy 2 2010
* 2011/0035,803 SYSTEM AND METHOD FOR EXTENDING AUTOMATED PENETRATION TESTING TO DEVELOP AN INTELLIGENT AND COST EFFICIENT SECURITY STRATEGY 4 2010
 
CISCO TECHNOLOGY, INC. (1)
* 9,306,955 Early policy evaluation of multiphase attributes in high-performance firewalls 0 2015
 
NETAPP, INC. (1)
8,898,289 Distributed event processing method and architecture 0 2011
 
Solutionary, Inc. (2)
* 8,931,077 Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem 0 2012
* 2012/0311,694 SECURITY SYSTEM FOR A COMPUTER NETWORK HAVING A SECURITY SUBSYSTEM AND A MASTER SYSTEM WHICH MONITORS THE INTEGRITY OF A SECURITY SUBSYSTEM 0 2012
 
KnowmTech, LLC (1)
9,269,043 Memristive neural processor utilizing anti-hebbian and hebbian technology 0 2013
 
LINKAGE TECHNOLOGY GROUP CO., LTD. (1)
* 2010/0179,957 Polling Method of Switch Status Based on Timer-triggered Scheduler of Stored Procedures 0 2009
 
WEBROOT INC. (1)
* 2012/0266,208 METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH 2 2012
 
MCAFEE, INC. (9)
8,312,535 System, method, and computer program product for interfacing a plurality of related applications 10 2002
8,122,498 Combined multiple-application alert system and method 12 2002
8,990,723 System, method, and computer program product for managing a plurality of applications via a single interface 0 2002
8,239,941 Push alert system, method, and computer program product 11 2002
8,732,835 System, method, and computer program product for interfacing a plurality of related applications 9 2007
8,115,769 System, method, and computer program product for conveying a status of a plurality of security applications 16 2007
9,177,140 System, method, and computer program product for managing a plurality of applications via a single interface 0 2007
8,230,502 Push alert system, method, and computer program product 10 2009
8,074,282 System, method, and computer program product for conveying a status of a plurality of security applications 17 2009
 
SecurityProfiling, LLC (9)
9,117,069 Real-time vulnerability monitoring 0 2013
9,350,752 Anti-vulnerability system, method, and computer program product 0 2014
9,118,708 Multi-path remediation 0 2014
9,118,709 Anti-vulnerability system, method, and computer program product 0 2014
9,100,431 Computer program product and apparatus for multi-path remediation 0 2014
8,984,644 Anti-vulnerability system, method, and computer program product 0 2014
9,118,710 System, method, and computer program product for reporting an occurrence in different manners 0 2014
9,118,711 Anti-vulnerability system, method, and computer program product 0 2014
9,225,686 Anti-vulnerability system, method, and computer program product 0 2015
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 Oct 5, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Oct 5, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00