US5008814A
(en)
|
1988-08-15 |
1991-04-16 |
Network Equipment Technologies, Inc. |
Method and apparatus for updating system software for a plurality of data processing units in a communication network
|
DE69031191T2
(en)
|
1989-05-15 |
1998-02-12 |
Ibm |
System for controlling access privileges
|
US5210854A
(en)
|
1989-06-14 |
1993-05-11 |
Digital Equipment Corporation |
System for updating program stored in eeprom by storing new version into new location and updating second transfer vector to contain starting address of new version
|
US5272754A
(en)
|
1991-03-28 |
1993-12-21 |
Secure Computing Corporation |
Secure computer interface
|
US5253932A
(en)
|
1991-12-05 |
1993-10-19 |
Nesovic Danilo N |
Modular countertop system
|
US5276735A
(en)
|
1992-04-17 |
1994-01-04 |
Secure Computing Corporation |
Data enclave and trusted path system
|
US5253782A
(en)
|
1992-05-20 |
1993-10-19 |
Paul A. Wiebel |
Article dispensing apparatus
|
US5596718A
(en)
|
1992-07-10 |
1997-01-21 |
Secure Computing Corporation |
Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
|
US5249705A
(en)
|
1992-08-12 |
1993-10-05 |
Paul A. Wiebel |
Coupon dispenser
|
US5361359A
(en)
|
1992-08-31 |
1994-11-01 |
Trusted Information Systems, Inc. |
System and method for controlling the use of a computer
|
US5624737A
(en)
|
1993-02-18 |
1997-04-29 |
General Electric Company |
Method for adhering materials having differing expansion properties and articles produced therefrom
|
JPH06282527A
(en)
*
|
1993-03-29 |
1994-10-07 |
Hitachi Software Eng Co Ltd |
Network control system
|
US5557346A
(en)
|
1994-08-11 |
1996-09-17 |
Trusted Information Systems, Inc. |
System and method for key escrow encryption
|
US5557765A
(en)
|
1994-08-11 |
1996-09-17 |
Trusted Information Systems, Inc. |
System and method for data recovery
|
US5864683A
(en)
|
1994-10-12 |
1999-01-26 |
Secure Computing Corporartion |
System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
|
DE4444635C2
(en)
|
1994-12-15 |
1996-10-31 |
Daimler Benz Aerospace Ag |
Self-defense device against missiles
|
DE4444637C2
(en)
|
1994-12-15 |
1996-09-26 |
Sepp Gunther |
Laser weapon system
|
US6272632B1
(en)
|
1995-02-21 |
2001-08-07 |
Network Associates, Inc. |
System and method for controlling access to a user secret using a key recovery field
|
US5696907A
(en)
|
1995-02-27 |
1997-12-09 |
General Electric Company |
System and method for performing risk and credit analysis of financial service applications
|
US5796836A
(en)
|
1995-04-17 |
1998-08-18 |
Secure Computing Corporation |
Scalable key agile cryptography
|
US5819275A
(en)
|
1995-06-07 |
1998-10-06 |
Trusted Information Systems, Inc. |
System and method for superimposing attributes on hierarchically organized file systems
|
US6321293B1
(en)
|
1995-11-14 |
2001-11-20 |
Networks Associates, Inc. |
Method for caching virtual memory paging and disk input/output requests
|
US5765153A
(en)
|
1996-01-03 |
1998-06-09 |
International Business Machines Corporation |
Information handling system, method, and article of manufacture including object system authorization and registration
|
US5913024A
(en)
|
1996-02-09 |
1999-06-15 |
Secure Computing Corporation |
Secure server utilizing separate protocol stacks
|
US5867647A
(en)
|
1996-02-09 |
1999-02-02 |
Secure Computing Corporation |
System and method for securing compiled program code
|
US5918018A
(en)
|
1996-02-09 |
1999-06-29 |
Secure Computing Corporation |
System and method for achieving network separation
|
US5950012A
(en)
|
1996-03-08 |
1999-09-07 |
Texas Instruments Incorporated |
Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes
|
US6195352B1
(en)
|
1996-03-15 |
2001-02-27 |
Network Associates, Inc. |
System and method for automatically identifying and analyzing currently active channels in an ATM network
|
US6601091B1
(en)
|
1996-03-28 |
2003-07-29 |
Networks Associates Technology, Inc. |
Method for improving the perceived performance of a computer system
|
US6151643A
(en)
|
1996-06-07 |
2000-11-21 |
Networks Associates, Inc. |
Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
|
US6064811A
(en)
|
1996-06-17 |
2000-05-16 |
Network Associates, Inc. |
Computer memory conservation system
|
US6298422B1
(en)
|
1996-06-17 |
2001-10-02 |
Network Associates, Inc. |
Method for reducing the memory requirements for an application program executing in a multi-tasking environment
|
US6134601A
(en)
|
1996-06-17 |
2000-10-17 |
Networks Associates, Inc. |
Computer resource management system
|
US5831987A
(en)
|
1996-06-17 |
1998-11-03 |
Network Associates, Inc. |
Method for testing cache memory systems
|
US5683638A
(en)
|
1996-06-20 |
1997-11-04 |
Excelstone International, Inc. |
Seamless flush mounted countertop sink
|
US5872931A
(en)
|
1996-08-13 |
1999-02-16 |
Veritas Software, Corp. |
Management agent automatically executes corrective scripts in accordance with occurrences of specified events regardless of conditions of management interface and management engine
|
US5819255A
(en)
|
1996-08-23 |
1998-10-06 |
Tandem Computers, Inc. |
System and method for database query optimization
|
US5892903A
(en)
|
1996-09-12 |
1999-04-06 |
Internet Security Systems, Inc. |
Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
|
US6003084A
(en)
|
1996-09-13 |
1999-12-14 |
Secure Computing Corporation |
Secure network proxy for connecting entities
|
US6144934A
(en)
|
1996-09-18 |
2000-11-07 |
Secure Computing Corporation |
Binary filter using pattern recognition
|
US5983350A
(en)
|
1996-09-18 |
1999-11-09 |
Secure Computing Corporation |
Secure firewall supporting different levels of authentication based on address or encryption status
|
US6072942A
(en)
|
1996-09-18 |
2000-06-06 |
Secure Computing Corporation |
System and method of electronic mail filtering using interconnected nodes
|
US5950195A
(en)
|
1996-09-18 |
1999-09-07 |
Secure Computing Corporation |
Generalized security policy management system and method
|
US5951698A
(en)
|
1996-10-02 |
1999-09-14 |
Trend Micro, Incorporated |
System, apparatus and method for the detection and removal of viruses in macros
|
US6119236A
(en)
|
1996-10-07 |
2000-09-12 |
Shipley; Peter M. |
Intelligent network security device and method
|
US5991881A
(en)
|
1996-11-08 |
1999-11-23 |
Harris Corporation |
Network surveillance system
|
US5796942A
(en)
|
1996-11-21 |
1998-08-18 |
Computer Associates International, Inc. |
Method and apparatus for automated network-wide surveillance and security breach intervention
|
US6208999B1
(en)
|
1996-12-12 |
2001-03-27 |
Network Associates, Inc. |
Recoverable computer file system with a signature area containing file integrity information located in the storage blocks
|
US5915087A
(en)
|
1996-12-12 |
1999-06-22 |
Secure Computing Corporation |
Transparent security proxy for unreliable message exchange protocols
|
US5987611A
(en)
|
1996-12-31 |
1999-11-16 |
Zone Labs, Inc. |
System and methodology for managing internet access on a per application basis for client computers connected to the internet
|
US5968133A
(en)
|
1997-01-10 |
1999-10-19 |
Secure Computing Corporation |
Enhanced security network time synchronization device and method
|
US6122657A
(en)
|
1997-02-04 |
2000-09-19 |
Networks Associates, Inc. |
Internet computer system with methods for dynamic filtering of hypertext tags and content
|
US5960170A
(en)
|
1997-03-18 |
1999-09-28 |
Trend Micro, Inc. |
Event triggered iterative virus detection
|
US6005942A
(en)
|
1997-03-24 |
1999-12-21 |
Visa International Service Association |
System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
|
US6249585B1
(en)
|
1998-04-08 |
2001-06-19 |
Network Associates, Inc |
Publicly verifiable key recovery
|
US6084510A
(en)
|
1997-04-18 |
2000-07-04 |
Lemelson; Jerome H. |
Danger warning and emergency response system and method
|
US5922051A
(en)
|
1997-05-14 |
1999-07-13 |
Ncr Corporation |
System and method for traffic management in a network management system
|
US6314190B1
(en)
|
1997-06-06 |
2001-11-06 |
Networks Associates Technology, Inc. |
Cryptographic system with methods for user-controlled message recovery
|
US5822750A
(en)
|
1997-06-30 |
1998-10-13 |
International Business Machines Corporation |
Optimization of correlated SQL queries in a relational database management system
|
US6341267B1
(en)
|
1997-07-02 |
2002-01-22 |
Enhancement Of Human Potential, Inc. |
Methods, systems and apparatuses for matching individuals with behavioral requirements and for managing providers of services to evaluate or increase individuals' behavioral capabilities
|
US6073172A
(en)
|
1997-07-14 |
2000-06-06 |
Freegate Corporation |
Initializing and reconfiguring a secure network interface
|
US5987473A
(en)
|
1997-09-09 |
1999-11-16 |
Beologic A/S |
Interactive configuration via network
|
US5983348A
(en)
|
1997-09-10 |
1999-11-09 |
Trend Micro Incorporated |
Computer network malicious code scanner
|
US5991856A
(en)
|
1997-09-30 |
1999-11-23 |
Network Associates, Inc. |
System and method for computer operating system protection
|
US6041347A
(en)
|
1997-10-24 |
2000-03-21 |
Unified Access Communications |
Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
|
US6119165A
(en)
|
1997-11-17 |
2000-09-12 |
Trend Micro, Inc. |
Controlled distribution of application programs in a computer network
|
US5999179A
(en)
|
1997-11-17 |
1999-12-07 |
Fujitsu Limited |
Platform independent computer network management client
|
US6044466A
(en)
|
1997-11-25 |
2000-03-28 |
International Business Machines Corp. |
Flexible and dynamic derivation of permissions
|
US7055173B1
(en)
|
1997-12-19 |
2006-05-30 |
Avaya Technology Corp. |
Firewall pooling in a network flowswitch
|
US6006035A
(en)
|
1997-12-31 |
1999-12-21 |
Network Associates |
Method and system for custom computer software installation
|
US6035423A
(en)
|
1997-12-31 |
2000-03-07 |
Network Associates, Inc. |
Method and system for providing automated updating and upgrading of antivirus applications using a computer network
|
US6029256A
(en)
|
1997-12-31 |
2000-02-22 |
Network Associates, Inc. |
Method and system for allowing computer programs easy access to features of a virus scanning engine
|
US6088804A
(en)
|
1998-01-12 |
2000-07-11 |
Motorola, Inc. |
Adaptive system and method for responding to computer network security attacks
|
US5987610A
(en)
|
1998-02-12 |
1999-11-16 |
Ameritech Corporation |
Computer virus screening methods and systems
|
US6131163A
(en)
|
1998-02-17 |
2000-10-10 |
Cisco Technology, Inc. |
Network gateway mechanism having a protocol stack proxy
|
US6357010B1
(en)
|
1998-02-17 |
2002-03-12 |
Secure Computing Corporation |
System and method for controlling access to documents stored on an internal network
|
US7016811B2
(en)
|
2001-08-15 |
2006-03-21 |
National Instruments Corporation |
Network-based system for configuring a programmable hardware element in a measurement system using hardware configuration programs generated based on a user specification
|
US6321336B1
(en)
|
1998-03-13 |
2001-11-20 |
Secure Computing Corporation |
System and method for redirecting network traffic to provide secure communication
|
US6279113B1
(en)
|
1998-03-16 |
2001-08-21 |
Internet Tools, Inc. |
Dynamic signature inspection-based network intrusion detection
|
US6453419B1
(en)
|
1998-03-18 |
2002-09-17 |
Secure Computing Corporation |
System and method for implementing a security policy
|
US6182226B1
(en)
|
1998-03-18 |
2001-01-30 |
Secure Computing Corporation |
System and method for controlling interactions between networks
|
US6345361B1
(en)
|
1998-04-06 |
2002-02-05 |
Microsoft Corporation |
Directional set operations for permission based security in a computer system
|
AU3781399A
(en)
|
1998-04-30 |
1999-11-16 |
Bindview Development Corporation |
Computer security
|
US6408391B1
(en)
|
1998-05-06 |
2002-06-18 |
Prc Inc. |
Dynamic system defense for information warfare
|
US6275942B1
(en)
|
1998-05-20 |
2001-08-14 |
Network Associates, Inc. |
System, method and computer program product for automatic response to computer system misuse using active response modules
|
AU4568299A
(en)
|
1998-06-15 |
2000-01-05 |
Dmw Worldwide, Inc. |
Method and apparatus for assessing the security of a computer system
|
US6185689B1
(en)
*
|
1998-06-24 |
2001-02-06 |
Richard S. Carson & Assoc., Inc. |
Method for network self security assessment
|
US6336186B1
(en)
|
1998-07-02 |
2002-01-01 |
Networks Associates Technology, Inc. |
Cryptographic system and methodology for creating and managing crypto policy on certificate servers
|
US6442686B1
(en)
|
1998-07-02 |
2002-08-27 |
Networks Associates Technology, Inc. |
System and methodology for messaging server-based management and enforcement of crypto policies
|
US6321334B1
(en)
|
1998-07-15 |
2001-11-20 |
Microsoft Corporation |
Administering permissions associated with a security zone in a computer system security model
|
US6473800B1
(en)
|
1998-07-15 |
2002-10-29 |
Microsoft Corporation |
Declarative permission requests in a computer system
|
US6209101B1
(en)
|
1998-07-17 |
2001-03-27 |
Secure Computing Corporation |
Adaptive security system having a hierarchy of security servers
|
US6711127B1
(en)
|
1998-07-31 |
2004-03-23 |
General Dynamics Government Systems Corporation |
System for intrusion detection and vulnerability analysis in a telecommunications signaling network
|
US6343362B1
(en)
|
1998-09-01 |
2002-01-29 |
Networks Associates, Inc. |
System and method providing custom attack simulation language for testing networks
|
US6219786B1
(en)
|
1998-09-09 |
2001-04-17 |
Surfcontrol, Inc. |
Method and system for monitoring and controlling network access
|
US6301658B1
(en)
|
1998-09-09 |
2001-10-09 |
Secure Computing Corporation |
Method and system for authenticating digital certificates issued by an authentication hierarchy
|
US6324646B1
(en)
|
1998-09-11 |
2001-11-27 |
International Business Machines Corporation |
Method and system for securing confidential data in a computer network
|
US6523166B1
(en)
|
1998-09-21 |
2003-02-18 |
Microsoft Corporation |
Method and system for on-demand installation of software implementations
|
US6418554B1
(en)
|
1998-09-21 |
2002-07-09 |
Microsoft Corporation |
Software implementation installer mechanism
|
US6402689B1
(en)
|
1998-09-30 |
2002-06-11 |
Sicel Technologies, Inc. |
Methods, systems, and associated implantable devices for dynamic monitoring of physiological and biological properties of tumors
|
US6728885B1
(en)
|
1998-10-09 |
2004-04-27 |
Networks Associates Technology, Inc. |
System and method for network access control using adaptive proxies
|
US6560611B1
(en)
|
1998-10-13 |
2003-05-06 |
Netarx, Inc. |
Method, apparatus, and article of manufacture for a network monitoring system
|
US6230288B1
(en)
|
1998-10-29 |
2001-05-08 |
Network Associates, Inc. |
Method of treating whitespace during virus detection
|
US6028514A
(en)
|
1998-10-30 |
2000-02-22 |
Lemelson Jerome H. |
Personal emergency, safety warning system and method
|
US6321338B1
(en)
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
US6820202B1
(en)
|
1998-11-09 |
2004-11-16 |
First Data Corporation |
Account authority digital signature (AADS) system
|
US6285997B1
(en)
|
1998-11-16 |
2001-09-04 |
International Business Machines Corporation |
Query optimization with deferred update and autonomous sources
|
US6530024B1
(en)
|
1998-11-20 |
2003-03-04 |
Centrax Corporation |
Adaptive feedback security system and method
|
EP1006690B1
(en)
|
1998-11-30 |
2005-04-27 |
Concord Communications, Inc. |
Method and programe storage device for updating a list of network elements
|
US6266774B1
(en)
|
1998-12-08 |
2001-07-24 |
Mcafee.Com Corporation |
Method and system for securing, managing or optimizing a personal computer
|
US6499109B1
(en)
|
1998-12-08 |
2002-12-24 |
Networks Associates Technology, Inc. |
Method and apparatus for securing software distributed over a network
|
US6550012B1
(en)
|
1998-12-11 |
2003-04-15 |
Network Associates, Inc. |
Active firewall system and methodology
|
US6226372B1
(en)
|
1998-12-11 |
2001-05-01 |
Securelogix Corporation |
Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
|
US6499107B1
(en)
|
1998-12-29 |
2002-12-24 |
Cisco Technology, Inc. |
Method and system for adaptive network security using intelligent packet analysis
|
US6301668B1
(en)
|
1998-12-29 |
2001-10-09 |
Cisco Technology, Inc. |
Method and system for adaptive network security using network vulnerability assessment
|
US6415321B1
(en)
|
1998-12-29 |
2002-07-02 |
Cisco Technology, Inc. |
Domain mapping method and system
|
US6205552B1
(en)
|
1998-12-31 |
2001-03-20 |
Mci Worldcom, Inc. |
Method and apparatus for checking security vulnerability of networked devices
|
US6173180B1
(en)
|
1999-01-04 |
2001-01-09 |
Ericsson Inc. |
System and method of providing preferential access to subscribers of localized service areas in a radio telecommunications network
|
US6477651B1
(en)
|
1999-01-08 |
2002-11-05 |
Cisco Technology, Inc. |
Intrusion detection system and method having dynamically loaded signatures
|
US6353446B1
(en)
|
1999-01-25 |
2002-03-05 |
Network Associates, Inc. |
Method and system for integrated network management applications
|
US6658571B1
(en)
|
1999-02-09 |
2003-12-02 |
Secure Computing Corporation |
Security framework for dynamically wrapping software applications executing in a computing system
|
US6735766B1
(en)
|
1999-03-03 |
2004-05-11 |
Microsoft Corporation |
Method and computer-readable medium for installing an upgrade to an application program
|
US6405318B1
(en)
|
1999-03-12 |
2002-06-11 |
Psionic Software, Inc. |
Intrusion detection system
|
US6725377B1
(en)
|
1999-03-12 |
2004-04-20 |
Networks Associates Technology, Inc. |
Method and system for updating anti-intrusion software
|
US6477550B1
(en)
|
1999-03-16 |
2002-11-05 |
Mcafee.Com Corporation |
Method and system for processing events related to a first type of browser from a second type of browser
|
US6301699B1
(en)
|
1999-03-18 |
2001-10-09 |
Corekt Security Systems, Inc. |
Method for detecting buffer overflow for computer security
|
US7779406B2
(en)
|
1999-04-16 |
2010-08-17 |
Microsoft Corporation |
Method and system for managing lifecycles of deployed applications
|
US8121874B1
(en)
|
1999-05-27 |
2012-02-21 |
Accenture Global Services Limited |
Phase delivery of components of a system required for implementation technology
|
US6484176B1
(en)
|
1999-06-25 |
2002-11-19 |
Baynet World, Inc. |
System and process for providing remote interactive access to a real estate information database using a portable computing device
|
US6201908B1
(en)
|
1999-07-02 |
2001-03-13 |
Blaze Network Products, Inc. |
Optical wavelength division multiplexer/demultiplexer having preformed passively aligned optics
|
US6584508B1
(en)
|
1999-07-13 |
2003-06-24 |
Networks Associates Technology, Inc. |
Advanced data guard having independently wrapped components
|
US6684329B1
(en)
|
1999-07-13 |
2004-01-27 |
Networks Associates Technology, Inc. |
System and method for increasing the resiliency of firewall systems
|
US6845449B1
(en)
|
1999-07-23 |
2005-01-18 |
Networks Associates Technology, Inc. |
System and method for fast nested message authentication codes and error correction codes
|
US6842860B1
(en)
|
1999-07-23 |
2005-01-11 |
Networks Associates Technology, Inc. |
System and method for selectively authenticating data
|
US6976168B1
(en)
|
1999-07-23 |
2005-12-13 |
Mcafee, Inc. |
System and method for adaptive cryptographically synchronized authentication
|
US6915426B1
(en)
|
1999-07-23 |
2005-07-05 |
Networks Associates Technology, Inc. |
System and method for enabling authentication at different authentication strength-performance levels
|
US7346929B1
(en)
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US6526513B1
(en)
|
1999-08-03 |
2003-02-25 |
International Business Machines Corporation |
Architecture for dynamic permissions in java
|
US7073198B1
(en)
|
1999-08-26 |
2006-07-04 |
Ncircle Network Security, Inc. |
Method and system for detecting a vulnerability in a network
|
US7085931B1
(en)
|
1999-09-03 |
2006-08-01 |
Secure Computing Corporation |
Virtual smart card system and method
|
US6523023B1
(en)
|
1999-09-22 |
2003-02-18 |
Networks Associates Technology, Inc. |
Method system and computer program product for distributed internet information search and retrieval
|
US6687833B1
(en)
|
1999-09-24 |
2004-02-03 |
Networks Associates, Inc. |
System and method for providing a network host decoy using a pseudo network protocol stack implementation
|
JP4084914B2
(en)
*
|
1999-09-29 |
2008-04-30 |
株式会社日立製作所 |
Security evaluation method and apparatus, security measure creation support method and apparatus
|
US6789202B1
(en)
|
1999-10-15 |
2004-09-07 |
Networks Associates Technology, Inc. |
Method and apparatus for providing a policy-driven intrusion detection system
|
US6449624B1
(en)
|
1999-10-18 |
2002-09-10 |
Fisher-Rosemount Systems, Inc. |
Version control and audit trail in a process control system
|
US6493756B1
(en)
|
1999-10-28 |
2002-12-10 |
Networks Associates, Inc. |
System and method for dynamically sensing an asynchronous network event within a modular framework for network event processing
|
US6470384B1
(en)
|
1999-10-28 |
2002-10-22 |
Networks Associates, Inc. |
Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment
|
US6654782B1
(en)
|
1999-10-28 |
2003-11-25 |
Networks Associates, Inc. |
Modular framework for dynamically processing network events using action sets in a distributed computing environment
|
US6611869B1
(en)
|
1999-10-28 |
2003-08-26 |
Networks Associates, Inc. |
System and method for providing trustworthy network security concern communication in an active security management environment
|
US6230199B1
(en)
|
1999-10-29 |
2001-05-08 |
Mcafee.Com, Inc. |
Active marketing based on client computer configurations
|
US6453347B1
(en)
|
1999-10-29 |
2002-09-17 |
Mcafee.Com, Inc. |
Active marketing based on client computer configurations
|
US6882795B1
(en)
|
1999-11-01 |
2005-04-19 |
Sonic Solutions, Inc. |
Image mastering API
|
US7783545B2
(en)
|
1999-11-01 |
2010-08-24 |
Accenture Global Services Gmbh |
Automated coaching for a financial modeling and counseling system
|
US7281268B2
(en)
|
1999-11-14 |
2007-10-09 |
Mcafee, Inc. |
System, method and computer program product for detection of unwanted processes
|
IL132916A
(en)
|
1999-11-14 |
2004-02-08 |
Mcafee Inc |
Method and system for intercepting an application program interface
|
US6707794B1
(en)
|
1999-11-15 |
2004-03-16 |
Networks Associates Technology, Inc. |
Method, system and computer program product for physical link layer handshake protocol analysis
|
US6990591B1
(en)
|
1999-11-18 |
2006-01-24 |
Secureworks, Inc. |
Method and system for remotely configuring and monitoring a communication device
|
EP1234222A2
(en)
|
1999-12-02 |
2002-08-28 |
Secure Computing Corporation |
Security managementsystem in an heterogeneous network environment
|
US7308702B1
(en)
|
2000-01-14 |
2007-12-11 |
Secure Computing Corporation |
Locally adaptable central security management in a heterogeneous network environment
|
US6721727B2
(en)
|
1999-12-02 |
2004-04-13 |
International Business Machines Corporation |
XML documents stored as column data
|
US7231327B1
(en)
|
1999-12-03 |
2007-06-12 |
Digital Sandbox |
Method and apparatus for risk management
|
US6385458B1
(en)
|
1999-12-10 |
2002-05-07 |
Ericsson Inc. |
Priority handling of location services in a mobile communications network
|
US6587888B1
(en)
|
1999-12-15 |
2003-07-01 |
Networks Associates Technology, Inc. |
Dynamic software wrapper
|
US6697950B1
(en)
|
1999-12-22 |
2004-02-24 |
Networks Associates Technology, Inc. |
Method and apparatus for detecting a macro computer virus using static analysis
|
US7076650B1
(en)
|
1999-12-24 |
2006-07-11 |
Mcafee, Inc. |
System and method for selective communication scanning at a firewall and a network node
|
US6608817B1
(en)
|
1999-12-28 |
2003-08-19 |
Networks Associates Technology, Inc. |
Method and apparatus for connection-oriented multiplexing and switching network analysis, management, and troubleshooting
|
US6393424B1
(en)
|
1999-12-29 |
2002-05-21 |
Networks Associates, Inc. |
Method and apparatus for using a static metadata object to reduce database accesses
|
US6701440B1
(en)
|
2000-01-06 |
2004-03-02 |
Networks Associates Technology, Inc. |
Method and system for protecting a computer using a remote e-mail scanning device
|
US8074256B2
(en)
|
2000-01-07 |
2011-12-06 |
Mcafee, Inc. |
Pdstudio design system and method
|
US6779120B1
(en)
|
2000-01-07 |
2004-08-17 |
Securify, Inc. |
Declarative language for specifying a security policy
|
US6957348B1
(en)
|
2000-01-10 |
2005-10-18 |
Ncircle Network Security, Inc. |
Interoperability of vulnerability and intrusion detection systems
|
US6763466B1
(en)
|
2000-01-11 |
2004-07-13 |
Networks Associates Technology, Inc. |
Fast virus scanning
|
US7315801B1
(en)
|
2000-01-14 |
2008-01-01 |
Secure Computing Corporation |
Network security modeling system and method
|
JP2001273388A
(en)
|
2000-01-20 |
2001-10-05 |
Hitachi Ltd |
Security management system and method
|
US6931546B1
(en)
|
2000-01-28 |
2005-08-16 |
Network Associates, Inc. |
System and method for providing application services with controlled access into privileged processes
|
US6697870B1
(en)
|
2000-01-28 |
2004-02-24 |
Networks Associates Technology, Inc. |
Method and apparatus for real-time protocol analysis using an auto-throttling front end process
|
US6782527B1
(en)
|
2000-01-28 |
2004-08-24 |
Networks Associates, Inc. |
System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets
|
US7185361B1
(en)
|
2000-01-31 |
2007-02-27 |
Secure Computing Corporation |
System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server
|
US6510448B1
(en)
|
2000-01-31 |
2003-01-21 |
Networks Associates Technology, Inc. |
System, method and computer program product for increasing the performance of a proxy server
|
US6535227B1
(en)
|
2000-02-08 |
2003-03-18 |
Harris Corporation |
System and method for assessing the security posture of a network and having a graphical user interface
|
US6267039B1
(en)
|
2000-02-09 |
2001-07-31 |
The United States Of America As Represented By The Secretary Of The Air Force |
Aircraft missile-hit survivability using infrared lamp and sacrificial support structure
|
US6851061B1
(en)
|
2000-02-16 |
2005-02-01 |
Networks Associates, Inc. |
System and method for intrusion detection data collection using a network protocol stack multiplexor
|
US6925572B1
(en)
|
2000-02-28 |
2005-08-02 |
Microsoft Corporation |
Firewall with two-phase filtering
|
US6377097B1
(en)
|
2000-03-13 |
2002-04-23 |
The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration |
Method and apparatus for reducing the vulnerability of latches to single event upsets
|
US6775780B1
(en)
|
2000-03-16 |
2004-08-10 |
Networks Associates Technology, Inc. |
Detecting malicious software by analyzing patterns of system calls generated during emulation
|
US6842861B1
(en)
|
2000-03-24 |
2005-01-11 |
Networks Associates Technology, Inc. |
Method and system for detecting viruses on handheld computers
|
JP2003529254A
(en)
|
2000-03-27 |
2003-09-30 |
ネットワーク セキュリティー システムズ, インコーポレーテッド |
Internet / network security method and system for checking customer security from a remote device
|
GB2366640B
(en)
|
2000-03-30 |
2004-12-29 |
Ibm |
Distribution of activation information
|
US6567808B1
(en)
|
2000-03-31 |
2003-05-20 |
Networks Associates, Inc. |
System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment
|
US6785237B1
(en)
|
2000-03-31 |
2004-08-31 |
Networks Associates Technology, Inc. |
Method and system for passive quality of service monitoring of a network
|
US6553377B1
(en)
|
2000-03-31 |
2003-04-22 |
Network Associates, Inc. |
System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment
|
US6748534B1
(en)
|
2000-03-31 |
2004-06-08 |
Networks Associates, Inc. |
System and method for partitioned distributed scanning of a large dataset for viruses and other malware
|
US6553378B1
(en)
|
2000-03-31 |
2003-04-22 |
Network Associates, Inc. |
System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
|
US6789215B1
(en)
|
2000-04-21 |
2004-09-07 |
Sprint Communications Company, L.P. |
System and method for remediating a computer
|
US6925443B1
(en)
|
2000-04-26 |
2005-08-02 |
Safeoperations, Inc. |
Method, system and computer program product for assessing information security
|
AU2001257400A1
(en)
|
2000-04-28 |
2001-11-12 |
Internet Security Systems, Inc. |
System and method for managing security events on a network
|
JP4700884B2
(en)
|
2000-04-28 |
2011-06-15 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
Method and system for managing computer security information
|
US7574740B1
(en)
|
2000-04-28 |
2009-08-11 |
International Business Machines Corporation |
Method and system for intrusion detection in a computer network
|
US7738688B2
(en)
|
2000-05-03 |
2010-06-15 |
Aperio Technologies, Inc. |
System and method for viewing virtual slides
|
US6735629B1
(en)
|
2000-05-04 |
2004-05-11 |
Networks Associates Technology, Inc. |
Method and apparatus for real-time protocol analysis using an active and adaptive auto-throtting CPU allocation front end process
|
US6742124B1
(en)
|
2000-05-08 |
2004-05-25 |
Networks Associates Technology, Inc. |
Sequence-based anomaly detection using a distance matrix
|
US6735703B1
(en)
|
2000-05-08 |
2004-05-11 |
Networks Associates Technology, Inc. |
Multi-platform sequence-based anomaly detection wrapper
|
US6922776B2
(en)
|
2000-05-19 |
2005-07-26 |
Networks Associates Technology, Inc. |
Scalable system and method for management and notification of electronic certificate changes
|
US6950933B1
(en)
|
2000-05-19 |
2005-09-27 |
Networks Associates Technology, Inc. |
Method and system for management and notification of electronic certificate changes
|
KR20020000225A
(en)
|
2000-05-20 |
2002-01-05 |
김활중 |
A system and method for performing remote security management of multiple computer systems
|
US7051097B1
(en)
|
2000-05-20 |
2006-05-23 |
Ciena Corporation |
Embedded database for computer system management
|
US6584504B1
(en)
|
2000-05-26 |
2003-06-24 |
Networks Associates Technology, Inc. |
Method and apparatus for monitoring internet traffic on an internet web page
|
US6973577B1
(en)
|
2000-05-26 |
2005-12-06 |
Mcafee, Inc. |
System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
|
US7426551B1
(en)
|
2000-05-31 |
2008-09-16 |
Mcafee, Inc. |
System, method and computer program product for dynamic system adaptation using contracts
|
US6757822B1
(en)
|
2000-05-31 |
2004-06-29 |
Networks Associates Technology, Inc. |
System, method and computer program product for secure communications using a security service provider manager
|
US6931540B1
(en)
|
2000-05-31 |
2005-08-16 |
Networks Associates Technology, Inc. |
System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed
|
US6973578B1
(en)
|
2000-05-31 |
2005-12-06 |
Networks Associates Technology, Inc. |
System, method and computer program product for process-based selection of virus detection actions
|
US6907396B1
(en)
|
2000-06-01 |
2005-06-14 |
Networks Associates Technology, Inc. |
Detecting computer viruses or malicious software by patching instructions into an emulator
|
US6611925B1
(en)
|
2000-06-13 |
2003-08-26 |
Networks Associates Technology, Inc. |
Single point of entry/origination item scanning within an enterprise or workgroup
|
US7024694B1
(en)
|
2000-06-13 |
2006-04-04 |
Mcafee, Inc. |
Method and apparatus for content-based instrusion detection using an agile kernel-based auditor
|
US7917647B2
(en)
|
2000-06-16 |
2011-03-29 |
Mcafee, Inc. |
Method and apparatus for rate limiting
|
US20030061506A1
(en)
|
2001-04-05 |
2003-03-27 |
Geoffrey Cooper |
System and method for security policy
|
US6950947B1
(en)
|
2000-06-20 |
2005-09-27 |
Networks Associates Technology, Inc. |
System for sharing network state to enhance network throughput
|
US6668054B1
(en)
|
2000-06-30 |
2003-12-23 |
Networks Associates Technology, Inc. |
Service desk system architecture for a mobile service workforce
|
US7162649B1
(en)
|
2000-06-30 |
2007-01-09 |
Internet Security Systems, Inc. |
Method and apparatus for network assessment and authentication
|
US6671368B1
(en)
|
2000-06-30 |
2003-12-30 |
Networks Associates Technology, Inc. |
Service desk system for allowing easily changeable associations for data retrieval and display
|
US6907531B1
(en)
|
2000-06-30 |
2005-06-14 |
Internet Security Systems, Inc. |
Method and system for identifying, fixing, and updating security vulnerabilities
|
AU2001266174A1
(en)
|
2000-06-30 |
2002-01-14 |
British Telecommunications Public Limited Company |
Packet data communications
|
US7991917B1
(en)
|
2000-07-05 |
2011-08-02 |
Mcafee, Inc. |
High performance packet processing using a general purpose processor
|
US6678887B1
(en)
|
2000-07-11 |
2004-01-13 |
Networks Associates Technology, Inc. |
Customizing business logic and data sources by modifying methods defined within an API
|
US6851058B1
(en)
|
2000-07-26 |
2005-02-01 |
Networks Associates Technology, Inc. |
Priority-based virus scanning with priorities based at least in part on heuristic prediction of scanning risk
|
US7085934B1
(en)
|
2000-07-27 |
2006-08-01 |
Mcafee, Inc. |
Method and system for limiting processor utilization by a virus scanner
|
US7086050B2
(en)
|
2000-08-04 |
2006-08-01 |
Mcafee, Inc. |
Updating computer files
|
US6874018B2
(en)
|
2000-08-07 |
2005-03-29 |
Networks Associates Technology, Inc. |
Method and system for playing associated audible advertisement simultaneously with the display of requested content on handheld devices and sending a visual warning when the audio channel is off
|
US7380270B2
(en)
|
2000-08-09 |
2008-05-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance
|
US6901346B2
(en)
|
2000-08-09 |
2005-05-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US6993448B2
(en)
|
2000-08-09 |
2006-01-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US6708292B1
(en)
|
2000-08-18 |
2004-03-16 |
Network Associates, Inc. |
System, method and software for protocol analyzer remote buffer management
|
AU2001294089A1
(en)
|
2000-08-18 |
2002-02-25 |
Camelot Information Technologies Ltd. |
A system and method for a greedy pairwise clustering
|
US7181769B1
(en)
|
2000-08-25 |
2007-02-20 |
Ncircle Network Security, Inc. |
Network security system having a device profiler communicatively coupled to a traffic monitor
|
US6799197B1
(en)
|
2000-08-29 |
2004-09-28 |
Networks Associates Technology, Inc. |
Secure method and system for using a public network or email to administer to software on a plurality of client computers
|
US7089302B1
(en)
|
2000-08-30 |
2006-08-08 |
Mcafee, Inc. |
Method and system for maintaining a communications protocol session
|
AU2001288463A1
(en)
|
2000-08-30 |
2002-03-13 |
Citibank, N.A. |
Method and system for internet hosting and security
|
US6772334B1
(en)
|
2000-08-31 |
2004-08-03 |
Networks Associates, Inc. |
System and method for preventing a spoofed denial of service attack in a networked computing environment
|
US6886099B1
(en)
|
2000-09-12 |
2005-04-26 |
Networks Associates Technology, Inc. |
Computer virus detection
|
US6898715B1
(en)
|
2000-09-12 |
2005-05-24 |
Networks Associates Technology, Inc. |
Response to a computer virus outbreak
|
US6826698B1
(en)
|
2000-09-15 |
2004-11-30 |
Networks Associates Technology, Inc. |
System, method and computer program product for rule based network security policies
|
US6928555B1
(en)
|
2000-09-18 |
2005-08-09 |
Networks Associates Technology, Inc. |
Method and apparatus for minimizing file scanning by anti-virus programs
|
US7178166B1
(en)
|
2000-09-19 |
2007-02-13 |
Internet Security Systems, Inc. |
Vulnerability assessment and authentication of a computer by a local scanner
|
US20040003266A1
(en)
|
2000-09-22 |
2004-01-01 |
Patchlink Corporation |
Non-invasive automatic offsite patch fingerprinting and updating system and method
|
EP1327191B1
(en)
|
2000-09-22 |
2013-10-23 |
Lumension Security, Inc. |
Non-invasive automatic offsite patch fingerprinting and updating system and method
|
US20070192863A1
(en)
|
2005-07-01 |
2007-08-16 |
Harsh Kapoor |
Systems and methods for processing data flows
|
US8010469B2
(en)
*
|
2000-09-25 |
2011-08-30 |
Crossbeam Systems, Inc. |
Systems and methods for processing data flows
|
US6971023B1
(en)
|
2000-10-03 |
2005-11-29 |
Mcafee, Inc. |
Authorizing an additional computer program module for use with a core computer program
|
US6757830B1
(en)
|
2000-10-03 |
2004-06-29 |
Networks Associates Technology, Inc. |
Detecting unwanted properties in received email messages
|
US7013330B1
(en)
|
2000-10-03 |
2006-03-14 |
Networks Associates Technology, Inc. |
Downloading a computer file from a source computer to a target computer
|
US6766458B1
(en)
|
2000-10-03 |
2004-07-20 |
Networks Associates Technology, Inc. |
Testing a computer system
|
US6968461B1
(en)
|
2000-10-03 |
2005-11-22 |
Networks Associates Technology, Inc. |
Providing break points in a malware scanning operation
|
US6802012B1
(en)
|
2000-10-03 |
2004-10-05 |
Networks Associates Technology, Inc. |
Scanning computer files for unwanted properties
|
US7496960B1
(en)
|
2000-10-30 |
2009-02-24 |
Trend Micro, Inc. |
Tracking and reporting of computer virus information
|
US6834301B1
(en)
|
2000-11-08 |
2004-12-21 |
Networks Associates Technology, Inc. |
System and method for configuration, management, and monitoring of a computer network using inheritance
|
US6983486B1
(en)
|
2000-11-14 |
2006-01-03 |
Mcafee, Inc. |
Method and apparatus for establishing security scanner attributes in a computer system
|
JP2002157221A
(en)
|
2000-11-20 |
2002-05-31 |
Nec Fielding Ltd |
System for automating setting measures to cope with weak points of security
|
US6934857B1
(en)
|
2000-11-27 |
2005-08-23 |
Networks Associates Technology, Inc. |
Security system and method for handheld computers
|
US7155487B2
(en)
|
2000-11-30 |
2006-12-26 |
Intel Corporation |
Method, system and article of manufacture for data distribution over a network
|
US6622150B1
(en)
|
2000-12-18 |
2003-09-16 |
Networks Associates Technology, Inc. |
System and method for efficiently managing computer virus definitions using a structured virus database
|
US7231440B1
(en)
|
2000-12-18 |
2007-06-12 |
Mcafee, Inc. |
System and method for distributing portable computer virus definition records with binary file conversion
|
US7412721B2
(en)
|
2000-12-20 |
2008-08-12 |
Fujitsu Limited |
Method of and system for managing information, and computer product
|
US6983325B1
(en)
|
2000-12-28 |
2006-01-03 |
Mcafee, Inc. |
System and method for negotiating multi-path connections through boundary controllers in a networked computing environment
|
US6775704B1
(en)
|
2000-12-28 |
2004-08-10 |
Networks Associates Technology, Inc. |
System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
|
US6779033B1
(en)
|
2000-12-28 |
2004-08-17 |
Networks Associates Technology, Inc. |
System and method for transacting a validated application session in a networked computing environment
|
EP1352354A2
(en)
|
2001-01-02 |
2003-10-15 |
Trusecure Corporation |
Object-oriented method, system and medium for risk management
|
US20020091819A1
(en)
|
2001-01-05 |
2002-07-11 |
Daniel Melchione |
System and method for configuring computer applications and devices using inheritance
|
FR2819322A1
(en)
|
2001-01-08 |
2002-07-12 |
Verisec |
Method for assessing and managing security of computer system of certain configuration by performing comparative analysis between first and second databases to assess possible problems that might affect computer system
|
US6732950B2
(en)
|
2001-01-16 |
2004-05-11 |
Rain Bird Corporation |
Gear drive sprinkler
|
US6868069B2
(en)
|
2001-01-16 |
2005-03-15 |
Networks Associates Technology, Inc. |
Method and apparatus for passively calculating latency for a network appliance
|
US20030051026A1
(en)
|
2001-01-19 |
2003-03-13 |
Carter Ernst B. |
Network surveillance and security system
|
US6745311B2
(en)
|
2001-01-24 |
2004-06-01 |
Networks Associates Technology, Inc. |
Method of allocating clusters of computer readable medium to a file while minimizing fragmentation of the computer readable medium
|
US7168093B2
(en)
|
2001-01-25 |
2007-01-23 |
Solutionary, Inc. |
Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
|
US7039721B1
(en)
|
2001-01-26 |
2006-05-02 |
Mcafee, Inc. |
System and method for protecting internet protocol addresses
|
WO2002061544A2
(en)
|
2001-01-31 |
2002-08-08 |
Internet Security Systems, Inc. |
Method and system for configuring and scheduling security audits of a computer network
|
US7171681B1
(en)
|
2001-01-31 |
2007-01-30 |
Secure Computing Corporation |
System and method for providing expandable proxy firewall services
|
JP2005503047A
(en)
|
2001-02-06 |
2005-01-27 |
エン ガルデ システムズ、インコーポレイテッド |
Apparatus and method for providing a secure network
|
US6983380B2
(en)
|
2001-02-06 |
2006-01-03 |
Networks Associates Technology, Inc. |
Automatically generating valid behavior specifications for intrusion detection
|
US6763517B2
(en)
*
|
2001-02-12 |
2004-07-13 |
Sun Microsystems, Inc. |
Automated analysis of kernel and user core files including searching, ranking, and recommending patch files
|
US6477041B2
(en)
|
2001-02-13 |
2002-11-05 |
Intel Corporation |
Computer assembly with captivated screw carrier
|
US6964014B1
(en)
|
2001-02-15 |
2005-11-08 |
Networks Associates Technology, Inc. |
Method and system for localizing Web pages
|
US6904521B1
(en)
|
2001-02-16 |
2005-06-07 |
Networks Associates Technology, Inc. |
Non-repudiation of e-mail messages
|
US6938161B2
(en)
|
2001-02-20 |
2005-08-30 |
Networks Associates Technology, Inc. |
Test driver selection
|
US7272724B2
(en)
|
2001-02-20 |
2007-09-18 |
Mcafee, Inc. |
User alerts in an anti computer virus system
|
US6898712B2
(en)
|
2001-02-20 |
2005-05-24 |
Networks Associates Technology, Inc. |
Test driver ordering
|
US8219620B2
(en)
|
2001-02-20 |
2012-07-10 |
Mcafee, Inc. |
Unwanted e-mail filtering system including voting feedback
|
US7281267B2
(en)
|
2001-02-20 |
2007-10-09 |
Mcafee, Inc. |
Software audit system
|
US6721847B2
(en)
|
2001-02-20 |
2004-04-13 |
Networks Associates Technology, Inc. |
Cache hints for computer file access
|
US20020120558A1
(en)
|
2001-02-27 |
2002-08-29 |
Reid William Joseph |
System for managing risks by combining risk insurance policy investments with risk prevention computer-based technology investments using common measurement methods
|
US7185232B1
(en)
|
2001-02-28 |
2007-02-27 |
Cenzic, Inc. |
Fault injection methods and apparatus
|
US7240193B2
(en)
*
|
2001-03-01 |
2007-07-03 |
Invicta Networks, Inc. |
Systems and methods that provide external network access from a protected network
|
US7284267B1
(en)
|
2001-03-08 |
2007-10-16 |
Mcafee, Inc. |
Automatically configuring a computer firewall based on network connection
|
US6965928B1
(en)
|
2001-03-09 |
2005-11-15 |
Networks Associates Technology, Inc. |
System and method for remote maintenance of handheld computers
|
US7013395B1
(en)
|
2001-03-13 |
2006-03-14 |
Sandra Corporation |
Method and tool for network vulnerability analysis
|
US7313822B2
(en)
|
2001-03-16 |
2007-12-25 |
Protegrity Corporation |
Application-layer security method and system
|
US7882555B2
(en)
|
2001-03-16 |
2011-02-01 |
Kavado, Inc. |
Application layer security method and system
|
US7302584B2
(en)
|
2001-03-16 |
2007-11-27 |
Mcafee, Inc. |
Mechanisms for banning computer programs from use
|
US6920493B1
(en)
|
2001-03-19 |
2005-07-19 |
Networks Associates Technology, Inc. |
System and method for communicating coalesced rule parameters in a distributed computing environment
|
US6871279B2
(en)
|
2001-03-20 |
2005-03-22 |
Networks Associates Technology, Inc. |
Method and apparatus for securely and dynamically managing user roles in a distributed system
|
US6920558B2
(en)
|
2001-03-20 |
2005-07-19 |
Networks Associates Technology, Inc. |
Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
|
US6782421B1
(en)
|
2001-03-21 |
2004-08-24 |
Bellsouth Intellectual Property Corporation |
System and method for evaluating the performance of a computer application
|
US7150037B2
(en)
|
2001-03-21 |
2006-12-12 |
Intelliden, Inc. |
Network configuration manager
|
US6751718B1
(en)
|
2001-03-26 |
2004-06-15 |
Networks Associates Technology, Inc. |
Method, system and computer program product for using an instantaneous memory deficit metric to detect and reduce excess paging operations in a computer system
|
US7987510B2
(en)
|
2001-03-28 |
2011-07-26 |
Rovi Solutions Corporation |
Self-protecting digital content
|
WO2002079907A2
(en)
|
2001-03-29 |
2002-10-10 |
Accenture Llp |
Overall risk in a system
|
US7080000B1
(en)
|
2001-03-30 |
2006-07-18 |
Mcafee, Inc. |
Method and system for bi-directional updating of antivirus database
|
US7674298B1
(en)
|
2001-03-30 |
2010-03-09 |
Mcafee, Inc. |
Method and apparatus for implementing a handheld security system
|
US7188367B1
(en)
|
2001-03-30 |
2007-03-06 |
Moafee, Inc. |
Virus scanning prioritization using pre-processor checking
|
US6945780B2
(en)
|
2001-04-02 |
2005-09-20 |
United Defense, L.P. |
Integrated performance simulation system for military weapon systems
|
US6775675B1
(en)
|
2001-04-04 |
2004-08-10 |
Sagemetrics Corporation |
Methods for abstracting data from various data structures and managing the presentation of the data
|
US7055036B2
(en)
|
2001-04-06 |
2006-05-30 |
Mcafee, Inc. |
System and method to verify trusted status of peer in a peer-to-peer network environment
|
US7181506B1
(en)
|
2001-04-06 |
2007-02-20 |
Mcafee, Inc. |
System and method to securely confirm performance of task by a peer in a peer-to-peer network environment
|
US7721110B2
(en)
|
2001-04-06 |
2010-05-18 |
Mcafee, Inc. |
System and method for secure and verified sharing of resources in a peer-to-peer network environment
|
US7062555B1
(en)
|
2001-04-06 |
2006-06-13 |
Networks Associates Technology, Inc. |
System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
|
US6983326B1
(en)
|
2001-04-06 |
2006-01-03 |
Networks Associates Technology, Inc. |
System and method for distributed function discovery in a peer-to-peer network environment
|
US7010807B1
(en)
|
2001-04-13 |
2006-03-07 |
Sonicwall, Inc. |
System and method for network virus protection
|
US7590247B1
(en)
|
2001-04-18 |
2009-09-15 |
Mcafee, Inc. |
System and method for reusable efficient key distribution
|
US7043024B1
(en)
|
2001-04-18 |
2006-05-09 |
Mcafee, Inc. |
System and method for key distribution in a hierarchical tree
|
WO2002087152A1
(en)
|
2001-04-18 |
2002-10-31 |
Caveo Technology, Llc |
Universal, customizable security system for computers and other devices
|
US20060265746A1
(en)
|
2001-04-27 |
2006-11-23 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
US7210041B1
(en)
|
2001-04-30 |
2007-04-24 |
Mcafee, Inc. |
System and method for identifying a macro virus family using a macro virus definitions database
|
US6947986B1
(en)
|
2001-05-08 |
2005-09-20 |
Networks Associates Technology, Inc. |
System and method for providing web-based remote security application client administration in a distributed computing environment
|
US6868413B1
(en)
|
2001-05-10 |
2005-03-15 |
Networks Associates Technology, Inc. |
System and method for customizing and processing business logic rules in a business process system
|
US6768991B2
(en)
|
2001-05-15 |
2004-07-27 |
Networks Associates Technology, Inc. |
Searching for sequences of character data
|
US7228565B2
(en)
|
2001-05-15 |
2007-06-05 |
Mcafee, Inc. |
Event reporting between a reporting computer and a receiving computer
|
US7043634B2
(en)
|
2001-05-15 |
2006-05-09 |
Mcafee, Inc. |
Detecting malicious alteration of stored computer files
|
US7325252B2
(en)
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US20030056116A1
(en)
|
2001-05-18 |
2003-03-20 |
Bunker Nelson Waldo |
Reporter
|
US20030028803A1
(en)
|
2001-05-18 |
2003-02-06 |
Bunker Nelson Waldo |
Network vulnerability assessment system and method
|
US7536715B2
(en)
|
2001-05-25 |
2009-05-19 |
Secure Computing Corporation |
Distributed firewall system and method
|
AU2002344308A1
(en)
|
2001-05-31 |
2002-12-09 |
Internet Security Systems, Inc. |
Method and system for implementing security devices in a network
|
US7237264B1
(en)
*
|
2001-06-04 |
2007-06-26 |
Internet Security Systems, Inc. |
System and method for preventing network misuse
|
US6693888B2
(en)
|
2001-06-06 |
2004-02-17 |
Networks Associates Technology, Inc. |
Method and apparatus for filtering that specifies the types of frames to be captured and to be displayed for an IEEE802.11 wireless LAN
|
US7350234B2
(en)
|
2001-06-11 |
2008-03-25 |
Research Triangle Institute |
Intrusion tolerant communication networks and associated methods
|
US7076801B2
(en)
|
2001-06-11 |
2006-07-11 |
Research Triangle Institute |
Intrusion tolerant server system
|
JP2002366525A
(en)
|
2001-06-12 |
2002-12-20 |
Needs Creator Kk |
Security policy maintenance system
|
US7644352B2
(en)
|
2001-06-13 |
2010-01-05 |
Mcafee, Inc. |
Content scanning of copied data
|
WO2002101516A2
(en)
|
2001-06-13 |
2002-12-19 |
Intruvert Networks, Inc. |
Method and apparatus for distributed network security
|
US7418737B2
(en)
|
2001-06-13 |
2008-08-26 |
Mcafee, Inc. |
Encrypted data file transmission
|
US7069594B1
(en)
|
2001-06-15 |
2006-06-27 |
Mcafee, Inc. |
File system level integrity verification and validation
|
US7043758B2
(en)
|
2001-06-15 |
2006-05-09 |
Mcafee, Inc. |
Scanning computer files for specified content
|
US20040103431A1
(en)
|
2001-06-21 |
2004-05-27 |
Crisis Technologies, Inc. |
Method and system for emergency planning and management of a facility
|
US20020199122A1
(en)
|
2001-06-22 |
2002-12-26 |
Davis Lauren B. |
Computer security vulnerability analysis methodology
|
US6959418B1
(en)
|
2001-06-27 |
2005-10-25 |
Networks Associates Technology, Inc. |
System and method for facilitating editing of codes such as HTML and XML codes by scripts
|
US7124181B1
(en)
|
2001-06-29 |
2006-10-17 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values
|
US6981280B2
(en)
|
2001-06-29 |
2005-12-27 |
Mcafee, Inc. |
Intelligent network scanning system and method
|
US7003561B1
(en)
|
2001-06-29 |
2006-02-21 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
|
US6851113B2
(en)
|
2001-06-29 |
2005-02-01 |
International Business Machines Corporation |
Secure shell protocol access control
|
US7096503B1
(en)
|
2001-06-29 |
2006-08-22 |
Mcafee, Inc. |
Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
|
US6513122B1
(en)
|
2001-06-29 |
2003-01-28 |
Networks Associates Technology, Inc. |
Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
|
US7146642B1
(en)
|
2001-06-29 |
2006-12-05 |
Mcafee, Inc. |
System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
|
US7231665B1
(en)
|
2001-07-05 |
2007-06-12 |
Mcafee, Inc. |
Prevention of operating system identification through fingerprinting techniques
|
US7069330B1
(en)
|
2001-07-05 |
2006-06-27 |
Mcafee, Inc. |
Control of interaction between client computer applications and network resources
|
US7546629B2
(en)
|
2002-03-06 |
2009-06-09 |
Check Point Software Technologies, Inc. |
System and methodology for security policy arbitration
|
US8200818B2
(en)
|
2001-07-06 |
2012-06-12 |
Check Point Software Technologies, Inc. |
System providing internet access management with router-based policy enforcement
|
US7228566B2
(en)
|
2001-07-10 |
2007-06-05 |
Core Sdi, Incorporated |
Automated computer system security compromise
|
US6789082B2
(en)
|
2001-07-13 |
2004-09-07 |
Networks Associates Technology, Inc. |
Method and apparatus to facilitate fast network management protocol replies in large tables
|
US7162698B2
(en)
|
2001-07-17 |
2007-01-09 |
Mcafee, Inc. |
Sliding window packet management systems
|
US7296080B2
(en)
|
2001-07-17 |
2007-11-13 |
Mcafee, Inc. |
Method of simulating network communications
|
US7149189B2
(en)
|
2001-07-17 |
2006-12-12 |
Mcafee, Inc. |
Network data retrieval and filter systems and methods
|
US7047297B2
(en)
|
2001-07-17 |
2006-05-16 |
Mcafee, Inc. |
Hierarchically organizing network data collected from full time recording machines and efficiently filtering the same
|
US7277957B2
(en)
|
2001-07-17 |
2007-10-02 |
Mcafee, Inc. |
Method of reconstructing network communications
|
US7315894B2
(en)
|
2001-07-17 |
2008-01-01 |
Mcafee, Inc. |
Network data retrieval and filter systems and methods
|
US6751627B2
(en)
|
2001-07-23 |
2004-06-15 |
Networks Associates Technology, Inc. |
Method and apparatus to facilitate accessing data in network management protocol tables
|
US7243373B2
(en)
|
2001-07-25 |
2007-07-10 |
Mcafee, Inc. |
On-access malware scanning
|
US7647376B1
(en)
|
2001-07-26 |
2010-01-12 |
Mcafee, Inc. |
SPAM report generation system and method
|
US7673342B2
(en)
|
2001-07-26 |
2010-03-02 |
Mcafee, Inc. |
Detecting e-mail propagated malware
|
US7231637B1
(en)
|
2001-07-26 |
2007-06-12 |
Mcafee, Inc. |
Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server
|
US7310817B2
(en)
|
2001-07-26 |
2007-12-18 |
Mcafee, Inc. |
Centrally managed malware scanning
|
US6769016B2
(en)
|
2001-07-26 |
2004-07-27 |
Networks Associates Technology, Inc. |
Intelligent SPAM detection system using an updateable neural analysis engine
|
US7000250B1
(en)
|
2001-07-26 |
2006-02-14 |
Mcafee, Inc. |
Virtual opened share mode system with virus protection
|
US7665137B1
(en)
|
2001-07-26 |
2010-02-16 |
Mcafee, Inc. |
System, method and computer program product for anti-virus scanning in a storage subsystem
|
US6944775B2
(en)
|
2001-07-26 |
2005-09-13 |
Networks Associates Technology, Inc. |
Scanner API for executing multiple scanning engines
|
US7421587B2
(en)
|
2001-07-26 |
2008-09-02 |
Mcafee, Inc. |
Detecting computer programs within packed computer files
|
US7016939B1
(en)
|
2001-07-26 |
2006-03-21 |
Mcafee, Inc. |
Intelligent SPAM detection system using statistical analysis
|
US7023861B2
(en)
|
2001-07-26 |
2006-04-04 |
Mcafee, Inc. |
Malware scanning using a network bridge
|
US6980992B1
(en)
|
2001-07-26 |
2005-12-27 |
Mcafee, Inc. |
Tree pattern system and method for multiple virus signature recognition
|
US6963978B1
(en)
|
2001-07-26 |
2005-11-08 |
Mcafee, Inc. |
Distributed system and method for conducting a comprehensive search for malicious code in software
|
US7673343B1
(en)
|
2001-07-26 |
2010-03-02 |
Mcafee, Inc. |
Anti-virus scanning co-processor
|
US7181015B2
(en)
|
2001-07-31 |
2007-02-20 |
Mcafee, Inc. |
Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
|
US6718469B2
(en)
|
2001-08-01 |
2004-04-06 |
Networks Associates Technology, Inc. |
System and method for executing computer virus definitions containing general purpose programming language extensions
|
US7024432B2
(en)
|
2001-08-01 |
2006-04-04 |
Mcafee, Inc. |
Updating computer files on wireless data processing devices
|
US7861303B2
(en)
|
2001-08-01 |
2010-12-28 |
Mcafee, Inc. |
Malware scanning wireless service agent system and method
|
US6792543B2
(en)
|
2001-08-01 |
2004-09-14 |
Networks Associates Technology, Inc. |
Virus scanning on thin client devices using programmable assembly language
|
US7089259B1
(en)
|
2001-08-03 |
2006-08-08 |
Mcafee, Inc. |
System and method for providing a framework for network appliance management in a distributed computing environment
|
US6993660B1
(en)
|
2001-08-03 |
2006-01-31 |
Mcafee, Inc. |
System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
|
US7461403B1
(en)
|
2001-08-03 |
2008-12-02 |
Mcafee, Inc. |
System and method for providing passive screening of transient messages in a distributed computing environment
|
US7117533B1
(en)
|
2001-08-03 |
2006-10-03 |
Mcafee, Inc. |
System and method for providing dynamic screening of transient messages in a distributed computing environment
|
US7146155B2
(en)
|
2001-08-03 |
2006-12-05 |
Mcafee, Inc. |
System and method for providing telephonic content security service in a wireless network environment
|
US7240102B1
(en)
|
2001-08-03 |
2007-07-03 |
Mcafee, Inc. |
System and method for providing web browser-based secure remote network appliance configuration in a distributed computing environment
|
US6745192B1
(en)
|
2001-08-03 |
2004-06-01 |
Networks Associates Technology Inc. |
System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames
|
US7120252B1
(en)
|
2001-08-16 |
2006-10-10 |
Mcafee, Inc. |
System and method for automatically protecting private video content using cryptographic security for legacy systems
|
US20030037258A1
(en)
|
2001-08-17 |
2003-02-20 |
Izchak Koren |
Information security system and method`
|
US6769292B2
(en)
|
2001-08-24 |
2004-08-03 |
Symyx Technologies, Inc |
High throughput rheological testing of materials
|
US7263561B1
(en)
|
2001-08-24 |
2007-08-28 |
Mcafee, Inc. |
Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient
|
US7640361B1
(en)
|
2001-08-24 |
2009-12-29 |
Mcafee, Inc. |
Systems and methods for converting infected electronic files to a safe format
|
US7590859B2
(en)
|
2001-08-24 |
2009-09-15 |
Secure Computing Corporation |
System and method for accomplishing two-factor user authentication using the internet
|
US7543334B2
(en)
|
2001-08-27 |
2009-06-02 |
Mcafee, Inc. |
Update status alerting for a malware scanner
|
US7269649B1
(en)
|
2001-08-31 |
2007-09-11 |
Mcafee, Inc. |
Protocol layer-level system and method for detecting virus activity
|
US7302706B1
(en)
|
2001-08-31 |
2007-11-27 |
Mcafee, Inc |
Network-based file scanning and solution delivery in real time
|
US7007302B1
(en)
|
2001-08-31 |
2006-02-28 |
Mcafee, Inc. |
Efficient management and blocking of malicious code and hacking attempts in a network environment
|
US6986160B1
(en)
|
2001-08-31 |
2006-01-10 |
Mcafee, Inc. |
Security scanning system and method utilizing generic IP addresses
|
US6836860B2
(en)
|
2001-09-04 |
2004-12-28 |
Networks Associates Technology, Inc. |
Data scanning for updatable predefined properties
|
US6978454B2
(en)
|
2001-09-05 |
2005-12-20 |
Mcafee, Inc. |
Checking computer program installation
|
US7234167B2
(en)
|
2001-09-06 |
2007-06-19 |
Mcafee, Inc. |
Automatic builder of detection and cleaning routines for computer viruses
|
US7331061B1
(en)
|
2001-09-07 |
2008-02-12 |
Secureworks, Inc. |
Integrated computer security management system and method
|
US20030051163A1
(en)
|
2001-09-13 |
2003-03-13 |
Olivier Bidaud |
Distributed network architecture security system
|
US6976068B2
(en)
|
2001-09-13 |
2005-12-13 |
Mcafee, Inc. |
Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure
|
US6697337B1
(en)
|
2001-09-17 |
2004-02-24 |
Networks Associates Technology, Inc. |
Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
|
US7302469B2
(en)
|
2001-09-17 |
2007-11-27 |
Ricoh Company, Ltd. |
System, method, and computer program product for transferring remote device support data to a monitor using e-mail
|
US6674738B1
(en)
|
2001-09-17 |
2004-01-06 |
Networks Associates Technology, Inc. |
Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LAN
|
US8621077B2
(en)
|
2001-09-21 |
2013-12-31 |
Mcafee, Inc. |
Distribution of security policies for small to medium-sized organizations
|
US7107618B1
(en)
|
2001-09-25 |
2006-09-12 |
Mcafee, Inc. |
System and method for certifying that data received over a computer network has been checked for viruses
|
US7266844B2
(en)
|
2001-09-27 |
2007-09-04 |
Mcafee, Inc. |
Heuristic detection of polymorphic computer viruses based on redundancy in viral code
|
US7043756B2
(en)
|
2001-09-27 |
2006-05-09 |
Mcafee, Inc. |
Method and apparatus for detecting denial-of-service attacks using kernel execution profiles
|
US7134140B2
(en)
|
2001-09-27 |
2006-11-07 |
Mcafee, Inc. |
Token-based authentication for network connection
|
US6892241B2
(en)
|
2001-09-28 |
2005-05-10 |
Networks Associates Technology, Inc. |
Anti-virus policy enforcement system and method
|
US6757727B1
(en)
|
2001-09-28 |
2004-06-29 |
Networks Associates Technology, Inc. |
Top-down network analysis system and method with adaptive filtering capabilities
|
US7278161B2
(en)
|
2001-10-01 |
2007-10-02 |
International Business Machines Corporation |
Protecting a data processing system from attack by a vandal who uses a vulnerability scanner
|
US8776230B1
(en)
|
2001-10-02 |
2014-07-08 |
Mcafee, Inc. |
Master security policy server
|
JP3984895B2
(en)
|
2001-10-03 |
2007-10-03 |
キヤノン株式会社 |
Information processing apparatus, server apparatus, driver updating method, computer-readable storage medium, and program
|
US6907430B2
(en)
|
2001-10-04 |
2005-06-14 |
Booz-Allen Hamilton, Inc. |
Method and system for assessing attacks on computer networks using Bayesian networks
|
US7069581B2
(en)
|
2001-10-04 |
2006-06-27 |
Mcafee, Inc. |
Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
|
US7210168B2
(en)
|
2001-10-15 |
2007-04-24 |
Mcafee, Inc. |
Updating malware definition data for mobile data processing devices
|
US7107617B2
(en)
|
2001-10-15 |
2006-09-12 |
Mcafee, Inc. |
Malware scanning of compressed computer files
|
US7340774B2
(en)
|
2001-10-15 |
2008-03-04 |
Mcafee, Inc. |
Malware scanning as a low priority task
|
US6654751B1
(en)
|
2001-10-18 |
2003-11-25 |
Networks Associates Technology, Inc. |
Method and apparatus for a virus information patrol
|
US7237122B2
(en)
|
2001-10-19 |
2007-06-26 |
Mcafee, Inc. |
Method and apparatus to facilitate software installation using embedded user credentials
|
WO2003036549A1
(en)
|
2001-10-25 |
2003-05-01 |
Kla-Tencor Technologies Corporation |
Apparatus and methods for managing reliability of semiconductor devices
|
US7310818B1
(en)
|
2001-10-25 |
2007-12-18 |
Mcafee, Inc. |
System and method for tracking computer viruses
|
US6768721B1
(en)
|
2001-10-26 |
2004-07-27 |
Networks Associates Technology, Inc. |
Method and apparatus for monitoring different channels in an IEEE 802.11 wireless LAN
|
US7917444B1
(en)
|
2001-10-29 |
2011-03-29 |
Mcafee, Inc. |
Secure single-use transaction numbers
|
US7444679B2
(en)
|
2001-10-31 |
2008-10-28 |
Hewlett-Packard Development Company, L.P. |
Network, method and computer readable medium for distributing security updates to select nodes on a network
|
US20030101353A1
(en)
|
2001-10-31 |
2003-05-29 |
Tarquini Richard Paul |
Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto
|
US20030135749A1
(en)
*
|
2001-10-31 |
2003-07-17 |
Gales George S. |
System and method of defining the security vulnerabilities of a computer system
|
US20030159060A1
(en)
|
2001-10-31 |
2003-08-21 |
Gales George S. |
System and method of defining the security condition of a computer system
|
US20030083831A1
(en)
|
2001-11-01 |
2003-05-01 |
International Business Machines Corporation |
System and method for evaluating electromagnetic emanation vulnerabilities of computing systems
|
US6609908B2
(en)
|
2001-11-13 |
2003-08-26 |
Ets Schaefer Corporation |
Replaceable heater cover
|
CA2363795A1
(en)
|
2001-11-26 |
2003-05-26 |
Cloakware Corporation |
Computer system protection by communication diversity
|
US8266703B1
(en)
|
2001-11-30 |
2012-09-11 |
Mcafee, Inc. |
System, method and computer program product for improving computer network intrusion detection by risk prioritization
|
US7080408B1
(en)
|
2001-11-30 |
2006-07-18 |
Mcafee, Inc. |
Delayed-delivery quarantining of network communications having suspicious contents
|
US6546493B1
(en)
|
2001-11-30 |
2003-04-08 |
Networks Associates Technology, Inc. |
System, method and computer program product for risk assessment scanning based on detected anomalous events
|
US20030105973A1
(en)
|
2001-12-04 |
2003-06-05 |
Trend Micro Incorporated |
Virus epidemic outbreak command system and method using early warning monitors in a network environment
|
US7093002B2
(en)
|
2001-12-06 |
2006-08-15 |
Mcafee, Inc. |
Handling of malware scanning of files stored within a file storage device of a computer network
|
US7150042B2
(en)
|
2001-12-06 |
2006-12-12 |
Mcafee, Inc. |
Techniques for performing malware scanning of files stored within a file storage device of a computer network
|
US7346781B2
(en)
|
2001-12-06 |
2008-03-18 |
Mcafee, Inc. |
Initiating execution of a computer program from an encrypted version of a computer program
|
US7159036B2
(en)
|
2001-12-10 |
2007-01-02 |
Mcafee, Inc. |
Updating data from a source computer to groups of destination computers
|
US6604139B1
(en)
|
2001-12-14 |
2003-08-05 |
Networks Associates Technology, Inc. |
Voice protocol filtering system and method
|
US6970823B1
(en)
|
2001-12-14 |
2005-11-29 |
Networks Associates Technology, Inc. |
System, method and computer program product for monitoring voice application calls over a network
|
US6814842B1
(en)
|
2001-12-14 |
2004-11-09 |
Networks Associates Technology, Inc. |
System and method for organizing objects of a voice call in a tree representation
|
US7058975B2
(en)
|
2001-12-14 |
2006-06-06 |
Mcafee, Inc. |
Method and system for delayed write scanning for detecting computer malwares
|
US7036147B1
(en)
|
2001-12-20 |
2006-04-25 |
Mcafee, Inc. |
System, method and computer program product for eliminating disk read time during virus scanning
|
US8185943B1
(en)
|
2001-12-20 |
2012-05-22 |
Mcafee, Inc. |
Network adapter firewall system and method
|
US7373659B1
(en)
|
2001-12-20 |
2008-05-13 |
Mcafee, Inc. |
System, method and computer program product for applying prioritized security policies with predetermined limitations
|
US6789201B2
(en)
|
2001-12-20 |
2004-09-07 |
Networks Associates Technology, Inc. |
Anti-virus toolbar system and method for use with a network browser
|
US7761605B1
(en)
|
2001-12-20 |
2010-07-20 |
Mcafee, Inc. |
Embedded anti-virus scanner for a network adapter
|
US7340775B1
(en)
|
2001-12-20 |
2008-03-04 |
Mcafee, Inc. |
System, method and computer program product for precluding writes to critical files
|
US6754705B2
(en)
|
2001-12-21 |
2004-06-22 |
Networks Associates Technology, Inc. |
Enterprise network analyzer architecture framework
|
US7065790B1
(en)
|
2001-12-21 |
2006-06-20 |
Mcafee, Inc. |
Method and system for providing computer malware names from multiple anti-virus scanners
|
US6714513B1
(en)
|
2001-12-21 |
2004-03-30 |
Networks Associates Technology, Inc. |
Enterprise network analyzer agent system and method
|
US7401359B2
(en)
|
2001-12-21 |
2008-07-15 |
Mcafee, Inc. |
Generating malware definition data for mobile computing devices
|
US6941358B1
(en)
|
2001-12-21 |
2005-09-06 |
Networks Associates Technology, Inc. |
Enterprise interface for network analysis reporting
|
US7016948B1
(en)
|
2001-12-21 |
2006-03-21 |
Mcafee, Inc. |
Method and apparatus for detailed protocol analysis of frames captured in an IEEE 802.11 (b) wireless LAN
|
US7154857B1
(en)
|
2001-12-21 |
2006-12-26 |
Mcafee, Inc. |
Enterprise network analyzer zone controller system and method
|
US7062783B1
(en)
|
2001-12-21 |
2006-06-13 |
Mcafee, Inc. |
Comprehensive enterprise network analyzer, scanner and intrusion detection framework
|
US7840663B1
(en)
|
2001-12-21 |
2010-11-23 |
Mcafee, Inc. |
Desktop security in peer-to-peer networks
|
US7096500B2
(en)
|
2001-12-21 |
2006-08-22 |
Mcafee, Inc. |
Predictive malware scanning of internet data
|
US7483861B1
(en)
|
2001-12-21 |
2009-01-27 |
Mcafee, Inc. |
System, method and computer program product for a network analyzer business model
|
US6892227B1
(en)
|
2001-12-21 |
2005-05-10 |
Networks Associates Technology, Inc. |
Enterprise network analyzer host controller/zone controller interface system and method
|
US6789117B1
(en)
|
2001-12-21 |
2004-09-07 |
Networks Associates Technology, Inc. |
Enterprise network analyzer host controller/agent interface system and method
|
US6961783B1
(en)
|
2001-12-21 |
2005-11-01 |
Networks Associates Technology, Inc. |
DNS server access control system and method
|
US7114185B2
(en)
|
2001-12-26 |
2006-09-26 |
Mcafee, Inc. |
Identifying malware containing computer files using embedded text
|
US7266843B2
(en)
|
2001-12-26 |
2007-09-04 |
Mcafee, Inc. |
Malware scanning to create clean storage locations
|
US7035544B1
(en)
|
2001-12-27 |
2006-04-25 |
Mcafee, Inc. |
Identification of related communications channels in a wavelength division multiplexed optical network
|
US7415726B2
(en)
|
2001-12-28 |
2008-08-19 |
Mcafee, Inc. |
Controlling access to suspicious files
|
EP1461707A1
(en)
|
2001-12-31 |
2004-09-29 |
Citadel Security Software Inc. |
Automated computer vulnerability resolution system
|
US7269851B2
(en)
|
2002-01-07 |
2007-09-11 |
Mcafee, Inc. |
Managing malware protection upon a computer network
|
US7093121B2
(en)
|
2002-01-10 |
2006-08-15 |
Mcafee, Inc. |
Transferring data via a secure network connection
|
US6633835B1
(en)
|
2002-01-10 |
2003-10-14 |
Networks Associates Technology, Inc. |
Prioritized data capture, classification and filtering in a network monitoring environment
|
US7640335B1
(en)
|
2002-01-11 |
2009-12-29 |
Mcafee, Inc. |
User-configurable network analysis digest system and method
|
US7140042B2
(en)
|
2002-01-14 |
2006-11-21 |
Mcafee, Inc. |
System and method for preventing software piracy
|
US7257630B2
(en)
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7664845B2
(en)
|
2002-01-15 |
2010-02-16 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
WO2003060717A1
(en)
|
2002-01-15 |
2003-07-24 |
Foundstone, Inc. |
System and method for network vulnerability detection and reporting
|
US7543056B2
(en)
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7243148B2
(en)
|
2002-01-15 |
2007-07-10 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7152105B2
(en)
|
2002-01-15 |
2006-12-19 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7392545B1
(en)
*
|
2002-01-18 |
2008-06-24 |
Cigital, Inc. |
Systems and methods for detecting software security vulnerabilities
|
JP4152108B2
(en)
|
2002-01-18 |
2008-09-17 |
株式会社コムスクエア |
Vulnerability monitoring method and system
|
JP4190765B2
(en)
|
2002-01-18 |
2008-12-03 |
株式会社コムスクエア |
Security level information providing method and system
|
US8256002B2
(en)
|
2002-01-18 |
2012-08-28 |
Alcatel Lucent |
Tool, method and apparatus for assessing network security
|
US7222366B2
(en)
|
2002-01-28 |
2007-05-22 |
International Business Machines Corporation |
Intrusion event filtering
|
US6665269B1
(en)
|
2002-01-30 |
2003-12-16 |
Networks Associates Technology, Inc. |
Method and apparatus for filtering network traffic based on the correct channel in an IEEE 802.11(b) wireless lan
|
US7587759B1
(en)
|
2002-02-04 |
2009-09-08 |
Mcafee, Inc. |
Intrusion prevention for active networked applications
|
US8090816B1
(en)
|
2002-02-07 |
2012-01-03 |
Mcafee, Inc. |
System and method for real-time triggered event upload
|
AU2003210900A1
(en)
|
2002-02-07 |
2003-09-02 |
Empirix Inc. |
Automated security threat testing of web pages
|
US7237258B1
(en)
|
2002-02-08 |
2007-06-26 |
Mcafee, Inc. |
System, method and computer program product for a firewall summary interface
|
US6772345B1
(en)
|
2002-02-08 |
2004-08-03 |
Networks Associates Technology, Inc. |
Protocol-level malware scanner
|
US7093292B1
(en)
|
2002-02-08 |
2006-08-15 |
Mcafee, Inc. |
System, method and computer program product for monitoring hacker activities
|
US6760845B1
(en)
|
2002-02-08 |
2004-07-06 |
Networks Associates Technology, Inc. |
Capture file format system and method for a network analyzer
|
US6801756B1
(en)
|
2002-02-08 |
2004-10-05 |
Networks Associates Technology, Inc. |
Method and system for dynamic evaluation of a wireless network with a portable computing device
|
US6879812B2
(en)
|
2002-02-08 |
2005-04-12 |
Networks Associates Technology Inc. |
Portable computing device and associated method for analyzing a wireless local area network
|
US7383556B1
(en)
|
2002-02-08 |
2008-06-03 |
Mcafee, Inc. |
Extractor system, method and computer program product for managing network access on a per-application basis
|
US6839852B1
(en)
|
2002-02-08 |
2005-01-04 |
Networks Associates Technology, Inc. |
Firewall system and method with network mapping capabilities
|
US7257773B1
(en)
|
2002-02-14 |
2007-08-14 |
Mcafee, Inc. |
Method and system for identifying unsolicited mail utilizing checksums
|
US20030154269A1
(en)
|
2002-02-14 |
2003-08-14 |
Nyanchama Matunda G. |
Method and system for quantitatively assessing computer network vulnerability
|
US7069316B1
(en)
|
2002-02-19 |
2006-06-27 |
Mcafee, Inc. |
Automated Internet Relay Chat malware monitoring and interception
|
US6826608B1
(en)
|
2002-03-01 |
2004-11-30 |
Networks Associates Technology, Inc. |
System, method and computer program product for translating SNMP (ASN.1) protocol decodes
|
US6754488B1
(en)
|
2002-03-01 |
2004-06-22 |
Networks Associates Technologies, Inc. |
System and method for detecting and locating access points in a wireless network
|
US7493659B1
(en)
|
2002-03-05 |
2009-02-17 |
Mcafee, Inc. |
Network intrusion detection and analysis system and method
|
US7424744B1
(en)
|
2002-03-05 |
2008-09-09 |
Mcafee, Inc. |
Signature based network intrusion detection system and method
|
US7237222B1
(en)
|
2002-03-07 |
2007-06-26 |
Mcafee, Inc. |
Protocol for controlling an execution process on a destination computer from a source computer
|
US7328234B1
(en)
|
2002-03-07 |
2008-02-05 |
Mcafee, Inc. |
Agent architecture for triggering remotely initiated data processing operations
|
US7107574B1
(en)
|
2002-03-07 |
2006-09-12 |
Mcafee, Inc. |
Managing computer program configuration data
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7458098B2
(en)
|
2002-03-08 |
2008-11-25 |
Secure Computing Corporation |
Systems and methods for enhancing electronic communication security
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US6941467B2
(en)
|
2002-03-08 |
2005-09-06 |
Ciphertrust, Inc. |
Systems and methods for adaptive message interrogation through multiple queues
|
US7376842B1
(en)
|
2002-03-13 |
2008-05-20 |
Mcafee, Inc. |
Malware scanning messages containing multiple data records
|
ES2381185T3
(en)
|
2002-03-22 |
2012-05-23 |
Kuros Biosurgery Ag |
Composition for increase in hard tissue
|
US6715084B2
(en)
|
2002-03-26 |
2004-03-30 |
Bellsouth Intellectual Property Corporation |
Firewall system and method via feedback from broad-scope monitoring for intrusion detection
|
US20030196123A1
(en)
|
2002-03-29 |
2003-10-16 |
Rowland Craig H. |
Method and system for analyzing and addressing alarms from network intrusion detection systems
|
US7841007B2
(en)
|
2002-03-29 |
2010-11-23 |
Scanalert |
Method and apparatus for real-time security verification of on-line services
|
US20030188194A1
(en)
|
2002-03-29 |
2003-10-02 |
David Currie |
Method and apparatus for real-time security verification of on-line services
|
US6785820B1
(en)
|
2002-04-02 |
2004-08-31 |
Networks Associates Technology, Inc. |
System, method and computer program product for conditionally updating a security program
|
US7810091B2
(en)
|
2002-04-04 |
2010-10-05 |
Mcafee, Inc. |
Mechanism to check the malicious alteration of malware scanner
|
US8656502B2
(en)
|
2002-04-04 |
2014-02-18 |
Mcafee, Inc. |
Controlling use of a computer program installed on a computer
|
US7660731B2
(en)
|
2002-04-06 |
2010-02-09 |
International Business Machines Corporation |
Method and apparatus for technology resource management
|
US7080141B1
(en)
|
2002-04-12 |
2006-07-18 |
Cisco Technology, Inc. |
Arrangement for automated fault detection and fault resolution of a network device
|
US6675042B2
(en)
|
2002-04-15 |
2004-01-06 |
Charles D. Swerdlow |
Defibrillation shock strength determination technology
|
US7440471B1
(en)
|
2002-04-17 |
2008-10-21 |
Mcafee, Inc. |
System and method for facilitating IPv6 protocol usage by an application program
|
US7178144B2
(en)
|
2002-04-23 |
2007-02-13 |
Secure Resolutions, Inc. |
Software distribution via stages
|
US7552480B1
(en)
|
2002-04-23 |
2009-06-23 |
Citibank, N.A. |
Method and system of assessing risk using a one-dimensional risk assessment model
|
US7039702B1
(en)
|
2002-04-26 |
2006-05-02 |
Mcafee, Inc. |
Network analyzer engine system and method
|
US7590844B1
(en)
|
2002-04-26 |
2009-09-15 |
Mcafee, Inc. |
Decryption system and method for network analyzers and security programs
|
US20030212779A1
(en)
|
2002-04-30 |
2003-11-13 |
Boyter Brian A. |
System and Method for Network Security Scanning
|
US7590855B2
(en)
|
2002-04-30 |
2009-09-15 |
Tippingpoint Technologies, Inc. |
Steganographically authenticated packet traffic
|
US7359962B2
(en)
|
2002-04-30 |
2008-04-15 |
3Com Corporation |
Network security system integration
|
US6959393B2
(en)
|
2002-04-30 |
2005-10-25 |
Threat Guard, Inc. |
System and method for secure message-oriented network communications
|
US7237008B1
(en)
|
2002-05-10 |
2007-06-26 |
Mcafee, Inc. |
Detecting malware carried by an e-mail message
|
US8140642B1
(en)
|
2002-05-17 |
2012-03-20 |
Mcafee, Inc. |
Network connection-independent updating system and method
|
US20040073800A1
(en)
|
2002-05-22 |
2004-04-15 |
Paragi Shah |
Adaptive intrusion detection system
|
US7308493B2
(en)
|
2002-06-05 |
2007-12-11 |
Trend Micro Incorporated |
Task-based automatic network management system with distributed control and management information base
|
US7904955B1
(en)
|
2002-06-13 |
2011-03-08 |
Mcafee, Inc. |
Method and apparatus for detecting shellcode
|
US7788718B1
(en)
|
2002-06-13 |
2010-08-31 |
Mcafee, Inc. |
Method and apparatus for detecting a distributed denial of service attack
|
US7203963B1
(en)
|
2002-06-13 |
2007-04-10 |
Mcafee, Inc. |
Method and apparatus for adaptively classifying network traffic
|
JP2005530239A
(en)
|
2002-06-18 |
2005-10-06 |
コンピュータ アソシエイツ シンク,インコーポレイテッド |
Method and system for managing enterprise assets
|
US20040006704A1
(en)
|
2002-07-02 |
2004-01-08 |
Dahlstrom Dale A. |
System and method for determining security vulnerabilities
|
US20040015737A1
(en)
|
2002-07-19 |
2004-01-22 |
Martin Robert J. |
Method and apparatus for automated signal integrity checking based on storage device functionality
|
US20040015338A1
(en)
|
2002-07-19 |
2004-01-22 |
Lawrence William Richard |
Method and apparatus for automated signal integrity checking
|
US7350203B2
(en)
|
2002-07-23 |
2008-03-25 |
Alfred Jahn |
Network security software
|
US8393001B1
(en)
|
2002-07-26 |
2013-03-05 |
Mcafee, Inc. |
Secure signature server system and associated method
|
US8260906B1
(en)
|
2002-07-26 |
2012-09-04 |
Mcafee, Inc. |
System and method for heuristic determination of network protocols
|
US20040021889A1
(en)
|
2002-07-30 |
2004-02-05 |
Mcafee David A. |
Method of transmitting information from a document to a remote location, and a computer peripheral device
|
US6922462B2
(en)
|
2002-07-31 |
2005-07-26 |
Ge Medical Systems Global Technology Company, Llc |
Method, system and computer product for plaque characterization
|
US6663000B1
(en)
|
2002-08-01 |
2003-12-16 |
Networks Associates Technology, Inc. |
Validating components of a malware scanner
|
US20040024781A1
(en)
|
2002-08-01 |
2004-02-05 |
The Regents Of The University Of California |
Method of comparing version strings
|
US7305005B1
(en)
|
2002-08-05 |
2007-12-04 |
Mcafee, Inc. |
Correlation system and method for monitoring high-speed networks
|
US7412722B1
(en)
|
2002-08-08 |
2008-08-12 |
Verizon Laboratories Inc. |
Detection of softswitch attacks
|
WO2004015958A2
(en)
|
2002-08-12 |
2004-02-19 |
Wireless Security Corporation |
Fine grained access control for wireless networks
|
US7421266B1
(en)
|
2002-08-12 |
2008-09-02 |
Mcafee, Inc. |
Installation and configuration process for wireless network
|
WO2004019186A2
(en)
|
2002-08-26 |
2004-03-04 |
Guardednet, Inc. |
Determining threat level associated with network activity
|
US7669237B2
(en)
|
2002-08-27 |
2010-02-23 |
Trust Digital, Llc |
Enterprise-wide security system for computer devices
|
US6742128B1
(en)
|
2002-08-28 |
2004-05-25 |
Networks Associates Technology |
Threat assessment orchestrator system and method
|
US7114183B1
(en)
|
2002-08-28 |
2006-09-26 |
Mcafee, Inc. |
Network adaptive baseline monitoring system and method
|
US7594262B2
(en)
|
2002-09-04 |
2009-09-22 |
Secure Computing Corporation |
System and method for secure group communications
|
US7334222B2
(en)
|
2002-09-11 |
2008-02-19 |
International Business Machines Corporation |
Methods and apparatus for dependency-based impact simulation and vulnerability analysis
|
US7370092B2
(en)
|
2002-09-12 |
2008-05-06 |
Computer Sciences Corporation |
System and method for enhanced software updating and revision
|
US7234163B1
(en)
|
2002-09-16 |
2007-06-19 |
Cisco Technology, Inc. |
Method and apparatus for preventing spoofing of network addresses
|
US7216343B2
(en)
|
2002-09-20 |
2007-05-08 |
International Business Machines Corporation |
Method and apparatus for automatic updating and testing of software
|
US20040064731A1
(en)
|
2002-09-26 |
2004-04-01 |
Nguyen Timothy Thien-Kiem |
Integrated security administrator
|
US20040064726A1
(en)
|
2002-09-30 |
2004-04-01 |
Mario Girouard |
Vulnerability management and tracking system (VMTS)
|
US8069480B1
(en)
|
2002-09-30 |
2011-11-29 |
Mcafee, Inc. |
Method and system for defining a safe storage area for use in recovering a computer system
|
US7472421B2
(en)
|
2002-09-30 |
2008-12-30 |
Electronic Data Systems Corporation |
Computer model of security risks
|
US8407798B1
(en)
|
2002-10-01 |
2013-03-26 |
Skybox Secutiry Inc. |
Method for simulation aided security event management
|
US8359650B2
(en)
|
2002-10-01 |
2013-01-22 |
Skybox Secutiry Inc. |
System, method and computer readable medium for evaluating potential attacks of worms
|
US6952779B1
(en)
|
2002-10-01 |
2005-10-04 |
Gideon Cohen |
System and method for risk detection and analysis in a computer network
|
US20040064722A1
(en)
|
2002-10-01 |
2004-04-01 |
Dinesh Neelay |
System and method for propagating patches to address vulnerabilities in computers
|
US7440403B2
(en)
|
2002-10-10 |
2008-10-21 |
P-Cube Ltd. |
Method and software for calculating rate constraints
|
US20050033988A1
(en)
|
2002-10-18 |
2005-02-10 |
Neoscale Systems, Inc. |
Method and system for transparent encryption and authentication of file data protocols over internet protocol
|
US20040153171A1
(en)
|
2002-10-21 |
2004-08-05 |
Brandt David D. |
System and methodology providing automation security architecture in an industrial controller environment
|
US8909926B2
(en)
|
2002-10-21 |
2014-12-09 |
Rockwell Automation Technologies, Inc. |
System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
|
CA2503343A1
(en)
|
2002-10-22 |
2004-05-06 |
Unho Choi |
Integrated emergency response system in information infrastructure and operating method therefor
|
US8046835B2
(en)
|
2002-10-23 |
2011-10-25 |
Frederick S. M. Herz |
Distributed computer network security activity model SDI-SCAM
|
US7308706B2
(en)
|
2002-10-28 |
2007-12-11 |
Secure Computing Corporation |
Associative policy model
|
US7603711B2
(en)
|
2002-10-31 |
2009-10-13 |
Secnap Networks Security, LLC |
Intrusion detection system
|
US7353539B2
(en)
|
2002-11-04 |
2008-04-01 |
Hewlett-Packard Development Company, L.P. |
Signal level propagation mechanism for distribution of a payload to vulnerable systems
|
US7278019B2
(en)
|
2002-11-04 |
2007-10-02 |
Hewlett-Packard Development Company, L.P. |
Method of hindering the propagation of a computer virus
|
US8230497B2
(en)
|
2002-11-04 |
2012-07-24 |
Hewlett-Packard Development Company, L.P. |
Method of identifying software vulnerabilities on a computer system
|
US7343626B1
(en)
|
2002-11-12 |
2008-03-11 |
Microsoft Corporation |
Automated detection of cross site scripting vulnerabilities
|
US7991827B1
(en)
|
2002-11-13 |
2011-08-02 |
Mcafee, Inc. |
Network analysis system and method utilizing collected metadata
|
US6983221B2
(en)
|
2002-11-27 |
2006-01-03 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
|
US7827607B2
(en)
|
2002-11-27 |
2010-11-02 |
Symantec Corporation |
Enhanced client compliancy using database of security sensor data
|
US7249187B2
(en)
|
2002-11-27 |
2007-07-24 |
Symantec Corporation |
Enforcement of compliance with network security policies
|
US6980927B2
(en)
|
2002-11-27 |
2005-12-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
|
US7650638B1
(en)
|
2002-12-02 |
2010-01-19 |
Arcsight, Inc. |
Network security monitoring system employing bi-directional communication
|
US20040107274A1
(en)
|
2002-12-03 |
2004-06-03 |
Mastrianni Steven J. |
Policy-based connectivity
|
US7941854B2
(en)
|
2002-12-05 |
2011-05-10 |
International Business Machines Corporation |
Method and system for responding to a computer intrusion
|
US7428300B1
(en)
|
2002-12-09 |
2008-09-23 |
Verizon Laboratories Inc. |
Diagnosing fault patterns in telecommunication networks
|
US8312535B1
(en)
|
2002-12-12 |
2012-11-13 |
Mcafee, Inc. |
System, method, and computer program product for interfacing a plurality of related applications
|
US8122498B1
(en)
|
2002-12-12 |
2012-02-21 |
Mcafee, Inc. |
Combined multiple-application alert system and method
|
BR0317286A
(en)
|
2002-12-13 |
2005-11-08 |
Computer Ass Think Inc |
Content Management System
|
US8990723B1
(en)
|
2002-12-13 |
2015-03-24 |
Mcafee, Inc. |
System, method, and computer program product for managing a plurality of applications via a single interface
|
US6732157B1
(en)
|
2002-12-13 |
2004-05-04 |
Networks Associates Technology, Inc. |
Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
|
US8380791B1
(en)
|
2002-12-13 |
2013-02-19 |
Mcafee, Inc. |
Anti-spam system, method, and computer program product
|
US8239941B1
(en)
|
2002-12-13 |
2012-08-07 |
Mcafee, Inc. |
Push alert system, method, and computer program product
|
US7418730B2
(en)
|
2002-12-17 |
2008-08-26 |
International Business Machines Corporation |
Automatic client responses to worm or hacker attacks
|
US7526800B2
(en)
|
2003-02-28 |
2009-04-28 |
Novell, Inc. |
Administration of protection of data accessible by a mobile device
|
US6859793B1
(en)
|
2002-12-19 |
2005-02-22 |
Networks Associates Technology, Inc. |
Software license reporting and control system and method
|
US7412723B2
(en)
|
2002-12-31 |
2008-08-12 |
International Business Machines Corporation |
Method and system for morphing honeypot with computer security incident correlation
|
US7296293B2
(en)
|
2002-12-31 |
2007-11-13 |
Symantec Corporation |
Using a benevolent worm to assess and correct computer security vulnerabilities
|
US7383578B2
(en)
|
2002-12-31 |
2008-06-03 |
International Business Machines Corporation |
Method and system for morphing honeypot
|
US20050240756A1
(en)
|
2003-01-12 |
2005-10-27 |
Yaron Mayer |
System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows.
|
US7711662B2
(en)
|
2003-01-15 |
2010-05-04 |
Bracco Imaging S.P.A. |
System and method for optimization of a database for the training and testing of prediction algorithms
|
US7793346B1
(en)
|
2003-01-17 |
2010-09-07 |
Mcafee, Inc. |
System, method, and computer program product for preventing trojan communication
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US20050195975A1
(en)
|
2003-01-21 |
2005-09-08 |
Kevin Kawakita |
Digital media distribution cryptography using media ticket smart cards
|
US7900254B1
(en)
|
2003-01-24 |
2011-03-01 |
Mcafee, Inc. |
Identifying malware infected reply messages
|
US20040148520A1
(en)
|
2003-01-29 |
2004-07-29 |
Rajesh Talpade |
Mitigating denial of service attacks
|
US20040158545A1
(en)
|
2003-02-12 |
2004-08-12 |
Symantec Corporation |
System and method for an expert architecture
|
US8561175B2
(en)
|
2003-02-14 |
2013-10-15 |
Preventsys, Inc. |
System and method for automated policy audit and remediation management
|
US7627891B2
(en)
|
2003-02-14 |
2009-12-01 |
Preventsys, Inc. |
Network audit and policy assurance system
|
JP4346326B2
(en)
|
2003-02-27 |
2009-10-21 |
富士通株式会社 |
Security system, information management system, encryption support system, and computer program
|
US7555749B2
(en)
|
2003-03-10 |
2009-06-30 |
Microsoft Corporation |
Software updating system and method
|
FR2852413B1
(en)
|
2003-03-12 |
2005-05-20 |
|
SECURE, INVIOLABLE AND INFALSIFIABLE DEVICE FOR THE STORAGE OF AUTHENTICATED AND DATED DATA WITH LEGAL OR LEGAL VALUE
|
US8042178B1
(en)
|
2003-03-13 |
2011-10-18 |
Mcafee, Inc. |
Alert message control of security mechanisms in data processing systems
|
US7398272B2
(en)
|
2003-03-24 |
2008-07-08 |
Bigfix, Inc. |
Enterprise console
|
US20040193918A1
(en)
|
2003-03-28 |
2004-09-30 |
Kenneth Green |
Apparatus and method for network vulnerability detection and compliance assessment
|
US7218891B2
(en)
|
2003-03-31 |
2007-05-15 |
Nortel Networks Limited |
Multi-hop intelligent relaying method and apparatus for use in a frequency division duplexing based wireless access network
|
US6898632B2
(en)
|
2003-03-31 |
2005-05-24 |
Finisar Corporation |
Network security tap for use with intrusion detection system
|
US8171551B2
(en)
|
2003-04-01 |
2012-05-01 |
Mcafee, Inc. |
Malware detection using external call characteristics
|
US8127359B2
(en)
|
2003-04-11 |
2012-02-28 |
Samir Gurunath Kelekar |
Systems and methods for real-time network-based vulnerability assessment
|
US7941855B2
(en)
|
2003-04-14 |
2011-05-10 |
New Mexico Technical Research Foundation |
Computationally intelligent agents for distributed intrusion detection system and method of practicing same
|
US8122499B2
(en)
|
2003-04-16 |
2012-02-21 |
Hobnob, Inc. |
Network security apparatus and method
|
CA2465151A1
(en)
|
2003-04-16 |
2004-10-16 |
Novadigm, Inc. |
Method and system for patch management
|
CA2464430A1
(en)
|
2003-04-16 |
2004-10-16 |
Wms Gaming Inc. |
Layered security methods and apparatus in a gaming system environment
|
US6970697B2
(en)
|
2003-04-17 |
2005-11-29 |
Ntt Docomo, Inc. |
Platform-independent scanning subsystem API for use in a mobile communication framework
|
US7392043B2
(en)
|
2003-04-17 |
2008-06-24 |
Ntt Docomo, Inc. |
API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework
|
US7254811B2
(en)
|
2003-04-17 |
2007-08-07 |
Ntt Docomo, Inc. |
Update system and method for updating a scanning subsystem in a mobile communication framework
|
US6987963B2
(en)
|
2003-04-17 |
2006-01-17 |
Ntt Docomo, Inc. |
System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
|
US8291505B2
(en)
|
2003-04-17 |
2012-10-16 |
Mcafee, Inc. |
Detecting computer data containing compressed video data as banned computer data
|
US7240332B2
(en)
|
2003-04-18 |
2007-07-03 |
Ounce Labs, Inc. |
Method and system for detecting vulnerabilities in source code
|
US7398516B2
(en)
|
2003-04-18 |
2008-07-08 |
Ounce Labs, Inc. |
Method and system for detecting race condition vulnerabilities in source code
|
US20040250115A1
(en)
|
2003-04-21 |
2004-12-09 |
Trend Micro Incorporated. |
Self-contained mechanism for deploying and controlling data security services via a web browser platform
|
JP4222184B2
(en)
|
2003-04-24 |
2009-02-12 |
日本電気株式会社 |
Security management support system, security management support method and program
|
US7451488B2
(en)
|
2003-04-29 |
2008-11-11 |
Securify, Inc. |
Policy-based vulnerability assessment
|
US20040221176A1
(en)
|
2003-04-29 |
2004-11-04 |
Cole Eric B. |
Methodology, system and computer readable medium for rating computer system vulnerabilities
|
US7949732B1
(en)
|
2003-05-12 |
2011-05-24 |
Sourcefire, Inc. |
Systems and methods for determining characteristics of a network and enforcing policy
|
US20040243603A1
(en)
|
2003-05-28 |
2004-12-02 |
Nec Corporation |
Configuration setting apparatus, configuration setting method, and configuration setting program product
|
US8065725B2
(en)
|
2003-05-30 |
2011-11-22 |
Yuliang Zheng |
Systems and methods for enhanced network security
|
US20040250128A1
(en)
|
2003-06-03 |
2004-12-09 |
Bush Stephen F. |
System and method for network security analysis
|
US8010387B2
(en)
|
2003-06-04 |
2011-08-30 |
California Institute Of Technology |
Method, computer program product, and system for risk management
|
US8019082B1
(en)
|
2003-06-05 |
2011-09-13 |
Mcafee, Inc. |
Methods and systems for automated configuration of 802.1x clients
|
WO2004110026A1
(en)
|
2003-06-05 |
2004-12-16 |
Wireless Security Corporation |
Methods and systems of remote authentication for computer networks
|
US7437763B2
(en)
|
2003-06-05 |
2008-10-14 |
Microsoft Corporation |
In-context security advisor in a computing environment
|
US8555344B1
(en)
|
2003-06-05 |
2013-10-08 |
Mcafee, Inc. |
Methods and systems for fallback modes of operation within wireless computer networks
|
US8068441B1
(en)
|
2003-06-05 |
2011-11-29 |
Mcafee, Inc. |
Automated discovery of access points in wireless computer networks
|
US7926113B1
(en)
|
2003-06-09 |
2011-04-12 |
Tenable Network Security, Inc. |
System and method for managing network vulnerability analysis systems
|
GB2424811B
(en)
|
2003-06-17 |
2006-12-06 |
Accenture Global Services Gmbh |
Method and system for selectively distributing data to a set of network devices
|
US8024076B2
(en)
|
2003-06-27 |
2011-09-20 |
Intelilcon, Inc. |
Voltage collapse diagnostic and ATC system
|
US7051077B2
(en)
|
2003-06-30 |
2006-05-23 |
Mx Logic, Inc. |
Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
|
US7409593B2
(en)
|
2003-06-30 |
2008-08-05 |
At&T Delaware Intellectual Property, Inc. |
Automated diagnosis for computer networks
|
US6843190B1
(en)
|
2003-06-30 |
2005-01-18 |
Lapierre-Mcafee Florence L. |
Free motion sewing methods and mechanisms
|
US7590725B1
(en)
|
2003-07-01 |
2009-09-15 |
Mcafee, Inc. |
Network analyzer system, method and computer program product for multi-dimensional analysis of network tunnels
|
US20050005152A1
(en)
|
2003-07-01 |
2005-01-06 |
Navjot Singh |
Security vulnerability monitor
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US8984644B2
(en)
*
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118711B2
(en)
*
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
*
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US20070113272A2
(en)
*
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US7640586B1
(en)
|
2003-07-07 |
2009-12-29 |
Mcafee, Inc. |
Reducing HTTP malware scanner latency using HTTP range queries for random access
|
US8634309B2
(en)
|
2003-07-10 |
2014-01-21 |
Mcafee, Inc. |
Security network processor system and method
|
US8117273B1
(en)
|
2003-07-11 |
2012-02-14 |
Mcafee, Inc. |
System, device and method for dynamically securing instant messages
|
US7035107B2
(en)
|
2003-07-11 |
2006-04-25 |
Intel Corporation |
High serviceability heatsink retainer method and apparatus
|
US7424706B2
(en)
|
2003-07-16 |
2008-09-09 |
Microsoft Corporation |
Automatic detection and patching of vulnerable files
|
US7257842B2
(en)
|
2003-07-21 |
2007-08-14 |
Mcafee, Inc. |
Pre-approval of computer files during a malware detection
|
US20050022021A1
(en)
|
2003-07-22 |
2005-01-27 |
Bardsley Jeffrey S. |
Systems, methods and data structures for generating computer-actionable computer security threat management information
|
US7228564B2
(en)
*
|
2003-07-24 |
2007-06-05 |
Hewlett-Packard Development Company, L.P. |
Method for configuring a network intrusion detection system
|
US8225407B1
(en)
|
2003-08-21 |
2012-07-17 |
Symantec Corporation |
Incident prioritization and adaptive response recommendations
|
US8539063B1
(en)
|
2003-08-29 |
2013-09-17 |
Mcafee, Inc. |
Method and system for containment of networked application client software by explicit human input
|
US7464408B1
(en)
|
2003-08-29 |
2008-12-09 |
Solidcore Systems, Inc. |
Damage containment by translation
|
US20050097199A1
(en)
|
2003-10-10 |
2005-05-05 |
Keith Woodard |
Method and system for scanning network devices
|
US7805762B2
(en)
|
2003-10-15 |
2010-09-28 |
Cisco Technology, Inc. |
Method and system for reducing the false alarm rate of network intrusion detection systems
|
US7814543B2
(en)
|
2004-02-13 |
2010-10-12 |
Microsoft Corporation |
System and method for securing a computer system connected to a network from attacks
|
US20050216957A1
(en)
|
2004-03-25 |
2005-09-29 |
Banzhof Carl E |
Method and apparatus for protecting a remediated computer network from entry of a vulnerable computer system thereinto
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US7383271B2
(en)
|
2004-04-06 |
2008-06-03 |
Microsoft Corporation |
Centralized configuration data management for distributed clients
|
US7519954B1
(en)
|
2004-04-08 |
2009-04-14 |
Mcafee, Inc. |
System and method of operating system identification
|
US20050267954A1
(en)
|
2004-04-27 |
2005-12-01 |
Microsoft Corporation |
System and methods for providing network quarantine
|
US7084760B2
(en)
|
2004-05-04 |
2006-08-01 |
International Business Machines Corporation |
System, method, and program product for managing an intrusion detection system
|
US7698275B2
(en)
|
2004-05-21 |
2010-04-13 |
Computer Associates Think, Inc. |
System and method for providing remediation management
|
US20050273853A1
(en)
|
2004-05-24 |
2005-12-08 |
Toshiba America Research, Inc. |
Quarantine networking
|
US7634812B2
(en)
|
2004-07-21 |
2009-12-15 |
Microsoft Corporation |
Filter generation
|
US7761920B2
(en)
|
2004-09-03 |
2010-07-20 |
Fortinet, Inc. |
Data structure for policy-based remediation selection
|
US7509676B2
(en)
|
2004-07-30 |
2009-03-24 |
Electronic Data Systems Corporation |
System and method for restricting access to an enterprise network
|
US20060041936A1
(en)
|
2004-08-19 |
2006-02-23 |
International Business Machines Corporation |
Method and apparatus for graphical presentation of firewall security policy
|
US7353390B2
(en)
|
2004-08-20 |
2008-04-01 |
Microsoft Corporation |
Enabling network devices within a virtual network to communicate while the networks's communications are restricted due to security threats
|
US20060085852A1
(en)
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US20060101517A1
(en)
|
2004-10-28 |
2006-05-11 |
Banzhof Carl E |
Inventory management-based computer vulnerability resolution system
|
US7716727B2
(en)
|
2004-10-29 |
2010-05-11 |
Microsoft Corporation |
Network security device and method for protecting a computing device in a networked environment
|
US20060101518A1
(en)
|
2004-11-05 |
2006-05-11 |
Schumaker Troy T |
Method to generate a quantitative measurement of computer security vulnerabilities
|
US7610610B2
(en)
|
2005-01-10 |
2009-10-27 |
Mcafee, Inc. |
Integrated firewall, IPS, and virus scanner system and method
|
US8266320B1
(en)
|
2005-01-27 |
2012-09-11 |
Science Applications International Corporation |
Computer network defense
|
US8250654B1
(en)
|
2005-01-27 |
2012-08-21 |
Science Applications International Corporation |
Systems and methods for implementing and scoring computer network defense exercises
|
US7278163B2
(en)
|
2005-02-22 |
2007-10-02 |
Mcafee, Inc. |
Security risk analysis system and method
|
US7788723B2
(en)
|
2005-05-17 |
2010-08-31 |
Computer Associates Think, Inc. |
Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning
|
US7979368B2
(en)
*
|
2005-07-01 |
2011-07-12 |
Crossbeam Systems, Inc. |
Systems and methods for processing data flows
|
CN1917426B
(en)
*
|
2005-08-17 |
2010-12-08 |
国际商业机器公司 |
Port scanning method and device, port scanning detection method and device, port scanning system
|
US8438643B2
(en)
*
|
2005-09-22 |
2013-05-07 |
Alcatel Lucent |
Information system service-level security risk analysis
|
US8170020B2
(en)
*
|
2005-12-08 |
2012-05-01 |
Microsoft Corporation |
Leveraging active firewalls for network intrusion detection and retardation of attack
|
US8230505B1
(en)
*
|
2006-08-11 |
2012-07-24 |
Avaya Inc. |
Method for cooperative intrusion prevention through collaborative inference
|
US20080047016A1
(en)
|
2006-08-16 |
2008-02-21 |
Cybrinth, Llc |
CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations
|
KR100862187B1
(en)
|
2006-10-27 |
2008-10-09 |
한국전자통신연구원 |
Network-based Internet Worm Detection Apparatus and Method Using Vulnerability Analysis and Attack Modeling
|
US9473529B2
(en)
|
2006-11-08 |
2016-10-18 |
Verizon Patent And Licensing Inc. |
Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
|
US8966619B2
(en)
|
2006-11-08 |
2015-02-24 |
Verizon Patent And Licensing Inc. |
Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
|
US8392997B2
(en)
|
2007-03-12 |
2013-03-05 |
University Of Southern California |
Value-adaptive security threat modeling and vulnerability ranking
|
CA2685292C
(en)
*
|
2007-04-30 |
2013-09-24 |
Sourcefire, Inc. |
Real-time user awareness for a computer network
|
US8256003B2
(en)
|
2007-05-10 |
2012-08-28 |
Microsoft Corporation |
Real-time network malware protection
|
US8739288B2
(en)
|
2007-07-31 |
2014-05-27 |
Hewlett-Packard Development Company, L.P. |
Automatic detection of vulnerability exploits
|
US9026394B2
(en)
|
2007-10-08 |
2015-05-05 |
Wurldtech Security Technologies |
Testing and mitigation framework for networked devices
|
US8181173B2
(en)
|
2007-10-12 |
2012-05-15 |
International Business Machines Corporation |
Determining priority for installing a patch into multiple patch recipients of a network
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
CN101350745B
(en)
*
|
2008-08-15 |
2011-08-03 |
北京启明星辰信息技术股份有限公司 |
Intrude detection method and device
|
US20100218256A1
(en)
|
2009-02-26 |
2010-08-26 |
Network Security Systems plus, Inc. |
System and method of integrating and managing information system assessments
|
US20100241478A1
(en)
|
2009-03-20 |
2010-09-23 |
Mehmet Sahinoglu |
Method of automating security risk assessment and management with a cost-optimized allocation plan
|
US8261355B2
(en)
*
|
2009-07-24 |
2012-09-04 |
Cisco Technology, Inc. |
Topology-aware attack mitigation
|
US9077609B2
(en)
|
2009-12-07 |
2015-07-07 |
Verizon Patent And Licensing Inc. |
Scalable reusable scanning of application networks/systems
|
US8610368B2
(en)
|
2009-12-21 |
2013-12-17 |
Top Victory Investments Ltd. |
Serial-type light-emitting diode (LED) device
|
US8689336B2
(en)
*
|
2010-09-27 |
2014-04-01 |
Bank Of America Corporation |
Tiered exposure model for event correlation
|
US9607155B2
(en)
|
2010-10-29 |
2017-03-28 |
Hewlett Packard Enterprise Development Lp |
Method and system for analyzing an environment
|
US10043011B2
(en)
|
2011-01-19 |
2018-08-07 |
Rapid7, Llc |
Methods and systems for providing recommendations to address security vulnerabilities in a network of computing systems
|
WO2012109633A2
(en)
|
2011-02-11 |
2012-08-16 |
Achilles Guard, Inc. D/B/A Critical Watch |
Security countermeasure management platform
|
US8650637B2
(en)
|
2011-08-24 |
2014-02-11 |
Hewlett-Packard Development Company, L.P. |
Network security risk assessment
|
US9443086B2
(en)
*
|
2012-02-23 |
2016-09-13 |
Infosys Limited |
Systems and methods for fixing application vulnerabilities through a correlated remediation approach
|
US9912638B2
(en)
*
|
2012-04-30 |
2018-03-06 |
Zscaler, Inc. |
Systems and methods for integrating cloud services with information management systems
|
US9083736B2
(en)
|
2013-01-28 |
2015-07-14 |
Hewlett-Packard Development Company, L.P. |
Monitoring and mitigating client-side exploitation of application flaws
|
WO2014182738A1
(en)
|
2013-05-06 |
2014-11-13 |
Staples, Inc. |
It vulnerability management system
|
US9158922B2
(en)
*
|
2013-05-29 |
2015-10-13 |
Lucent Sky Corporation |
Method, system, and computer-readable medium for automatically mitigating vulnerabilities in source code
|
US10630714B2
(en)
*
|
2013-05-29 |
2020-04-21 |
Lucent Sky Corporation |
Method, system, and computer program product for automatically mitigating vulnerabilities in source code
|
US9319425B2
(en)
*
|
2013-07-23 |
2016-04-19 |
Crypteia Networks S.A. |
Systems and methods for self-tuning network intrusion detection and prevention
|
US9886581B2
(en)
|
2014-02-25 |
2018-02-06 |
Accenture Global Solutions Limited |
Automated intelligence graph construction and countermeasure deployment
|
US9584536B2
(en)
*
|
2014-12-12 |
2017-02-28 |
Fortinet, Inc. |
Presentation of threat history associated with network activity
|
US10122748B1
(en)
*
|
2015-08-21 |
2018-11-06 |
InsCyt, LLC |
Network protection system and threat correlation engine
|
US20170078309A1
(en)
*
|
2015-09-11 |
2017-03-16 |
Beyondtrust Software, Inc. |
Systems and methods for detecting vulnerabilities and privileged access using cluster movement
|
US10681074B2
(en)
*
|
2015-10-28 |
2020-06-09 |
Qomplx, Inc. |
System and method for comprehensive data loss prevention and compliance management
|
WO2017151602A1
(en)
*
|
2016-02-29 |
2017-09-08 |
Craxel, Inc. |
Efficient encrypted data management system and method
|
US10395040B2
(en)
*
|
2016-07-18 |
2019-08-27 |
vThreat, Inc. |
System and method for identifying network security threats and assessing network security
|
US10999308B2
(en)
*
|
2017-01-30 |
2021-05-04 |
Xm Cyber Ltd. |
Setting-up penetration testing campaigns
|
US10536482B2
(en)
*
|
2017-03-26 |
2020-01-14 |
Microsoft Technology Licensing, Llc |
Computer security attack detection using distribution departure
|
US11290479B2
(en)
*
|
2018-08-11 |
2022-03-29 |
Rapid7, Inc. |
Determining insights in an electronic environment
|
US11184384B2
(en)
*
|
2019-06-13 |
2021-11-23 |
Bank Of America Corporation |
Information technology security assessment model for process flows and associated automated remediation
|