|
US6601048B1
(en)
*
|
1997-09-12 |
2003-07-29 |
Mci Communications Corporation |
System and method for detecting and managing fraud
|
|
US5623600A
(en)
|
1995-09-26 |
1997-04-22 |
Trend Micro, Incorporated |
Virus detection and removal apparatus for computer networks
|
|
US6151643A
(en)
|
1996-06-07 |
2000-11-21 |
Networks Associates, Inc. |
Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
|
|
US6035423A
(en)
|
1997-12-31 |
2000-03-07 |
Network Associates, Inc. |
Method and system for providing automated updating and upgrading of antivirus applications using a computer network
|
|
US20030191957A1
(en)
|
1999-02-19 |
2003-10-09 |
Ari Hypponen |
Distributed computer virus detection and scanning
|
|
US7130807B1
(en)
|
1999-11-22 |
2006-10-31 |
Accenture Llp |
Technology sharing during demand and supply planning in a network-based supply chain environment
|
|
US7136860B2
(en)
*
|
2000-02-14 |
2006-11-14 |
Overture Services, Inc. |
System and method to determine the validity of an interaction on a network
|
|
US8677505B2
(en)
|
2000-11-13 |
2014-03-18 |
Digital Doors, Inc. |
Security system with extraction, reconstruction and secure recovery and storage of data
|
|
US9311499B2
(en)
|
2000-11-13 |
2016-04-12 |
Ron M. Redlich |
Data security system and with territorial, geographic and triggering event protocol
|
|
US7546334B2
(en)
|
2000-11-13 |
2009-06-09 |
Digital Doors, Inc. |
Data security system and method with adaptive filter
|
|
US7080000B1
(en)
|
2001-03-30 |
2006-07-18 |
Mcafee, Inc. |
Method and system for bi-directional updating of antivirus database
|
|
US7228565B2
(en)
|
2001-05-15 |
2007-06-05 |
Mcafee, Inc. |
Event reporting between a reporting computer and a receiving computer
|
|
US7340438B2
(en)
|
2001-05-21 |
2008-03-04 |
Nokia Corporation |
Method and apparatus for managing and enforcing user privacy
|
|
US6792543B2
(en)
|
2001-08-01 |
2004-09-14 |
Networks Associates Technology, Inc. |
Virus scanning on thin client devices using programmable assembly language
|
|
US7657935B2
(en)
*
|
2001-08-16 |
2010-02-02 |
The Trustees Of Columbia University In The City Of New York |
System and methods for detecting malicious email transmission
|
|
US6993790B2
(en)
*
|
2001-08-30 |
2006-01-31 |
International Business Machines Corporation |
Host-based systematic attack detection tool
|
|
US7080408B1
(en)
|
2001-11-30 |
2006-07-18 |
Mcafee, Inc. |
Delayed-delivery quarantining of network communications having suspicious contents
|
|
US7342876B2
(en)
*
|
2001-12-20 |
2008-03-11 |
Sri International |
Interference mitigation and adaptive routing in wireless ad-hoc packet-switched networks
|
|
US7650420B2
(en)
*
|
2001-12-28 |
2010-01-19 |
The Directv Group, Inc. |
System and method for content filtering
|
|
US9392002B2
(en)
|
2002-01-31 |
2016-07-12 |
Nokia Technologies Oy |
System and method of providing virus protection at a gateway
|
|
US7237258B1
(en)
*
|
2002-02-08 |
2007-06-26 |
Mcafee, Inc. |
System, method and computer program product for a firewall summary interface
|
|
ATE374493T1
(en)
|
2002-03-29 |
2007-10-15 |
Global Dataguard Inc |
ADAPTIVE BEHAVIORAL INTRUSION DETECTION
|
|
US6785820B1
(en)
|
2002-04-02 |
2004-08-31 |
Networks Associates Technology, Inc. |
System, method and computer program product for conditionally updating a security program
|
|
US20030236995A1
(en)
*
|
2002-06-21 |
2003-12-25 |
Fretwell Lyman Jefferson |
Method and apparatus for facilitating detection of network intrusion
|
|
US20070222589A1
(en)
|
2002-06-27 |
2007-09-27 |
Richard Gorman |
Identifying security threats
|
|
US7373666B2
(en)
|
2002-07-01 |
2008-05-13 |
Microsoft Corporation |
Distributed threat management
|
|
JP3794491B2
(en)
|
2002-08-20 |
2006-07-05 |
日本電気株式会社 |
Attack defense system and attack defense method
|
|
US7418733B2
(en)
*
|
2002-08-26 |
2008-08-26 |
International Business Machines Corporation |
Determining threat level associated with network activity
|
|
US7114183B1
(en)
*
|
2002-08-28 |
2006-09-26 |
Mcafee, Inc. |
Network adaptive baseline monitoring system and method
|
|
US20060041505A1
(en)
|
2002-10-11 |
2006-02-23 |
900Email Inc. |
Fee-based message delivery system
|
|
US7278019B2
(en)
|
2002-11-04 |
2007-10-02 |
Hewlett-Packard Development Company, L.P. |
Method of hindering the propagation of a computer virus
|
|
US7346927B2
(en)
|
2002-12-12 |
2008-03-18 |
Access Business Group International Llc |
System and method for storing and accessing secure data
|
|
US7472272B2
(en)
|
2003-01-23 |
2008-12-30 |
Verdasys, Inc. |
Digital asset usage accountability via event journaling
|
|
US7246156B2
(en)
*
|
2003-06-09 |
2007-07-17 |
Industrial Defender, Inc. |
Method and computer program product for monitoring an industrial network
|
|
US7512808B2
(en)
|
2003-08-29 |
2009-03-31 |
Trend Micro, Inc. |
Anti-computer viral agent suitable for innoculation of computing devices
|
|
US7237267B2
(en)
|
2003-10-16 |
2007-06-26 |
Cisco Technology, Inc. |
Policy-based network security management
|
|
US20050086526A1
(en)
|
2003-10-17 |
2005-04-21 |
Panda Software S.L. (Sociedad Unipersonal) |
Computer implemented method providing software virus infection information in real time
|
|
GB0325504D0
(en)
*
|
2003-10-31 |
2003-12-03 |
Leach John |
Security engineering: A process for developing accurate and reliable security systems
|
|
US20050197889A1
(en)
*
|
2004-02-11 |
2005-09-08 |
Sigma Dynamics, Inc. |
Method and apparatus for comparison over time of prediction model characteristics
|
|
US20050183143A1
(en)
|
2004-02-13 |
2005-08-18 |
Anderholm Eric J. |
Methods and systems for monitoring user, application or device activity
|
|
US7895448B1
(en)
|
2004-02-18 |
2011-02-22 |
Symantec Corporation |
Risk profiling
|
|
US20050188222A1
(en)
|
2004-02-24 |
2005-08-25 |
Covelight Systems, Inc. |
Methods, systems and computer program products for monitoring user login activity for a server application
|
|
US7373524B2
(en)
|
2004-02-24 |
2008-05-13 |
Covelight Systems, Inc. |
Methods, systems and computer program products for monitoring user behavior for a server application
|
|
US20050187934A1
(en)
|
2004-02-24 |
2005-08-25 |
Covelight Systems, Inc. |
Methods, systems and computer program products for geography and time monitoring of a server application user
|
|
US20050188221A1
(en)
*
|
2004-02-24 |
2005-08-25 |
Covelight Systems, Inc. |
Methods, systems and computer program products for monitoring a server application
|
|
US20050198099A1
(en)
*
|
2004-02-24 |
2005-09-08 |
Covelight Systems, Inc. |
Methods, systems and computer program products for monitoring protocol responses for a server application
|
|
JP4480422B2
(en)
|
2004-03-05 |
2010-06-16 |
富士通株式会社 |
Unauthorized access prevention method, apparatus, system, and program
|
|
US20050203881A1
(en)
|
2004-03-09 |
2005-09-15 |
Akio Sakamoto |
Database user behavior monitor system and method
|
|
US7735140B2
(en)
|
2004-06-08 |
2010-06-08 |
Cisco Technology, Inc. |
Method and apparatus providing unified compliant network audit
|
|
US7490356B2
(en)
*
|
2004-07-20 |
2009-02-10 |
Reflectent Software, Inc. |
End user risk management
|
|
US7151447B1
(en)
|
2004-08-31 |
2006-12-19 |
Erudite Holding Llc |
Detection and identification of threats hidden inside cargo shipments
|
|
US7509680B1
(en)
|
2004-09-01 |
2009-03-24 |
Symantec Corporation |
Detecting computer worms as they arrive at local computers through open network shares
|
|
US7870047B2
(en)
*
|
2004-09-17 |
2011-01-11 |
International Business Machines Corporation |
System, method for deploying computing infrastructure, and method for identifying customers at risk of revenue change
|
|
US20060064740A1
(en)
*
|
2004-09-22 |
2006-03-23 |
International Business Machines Corporation |
Network threat risk assessment tool
|
|
GB2420961B
(en)
|
2004-12-07 |
2008-09-17 |
Leigh Melanie Cranley |
Plastic vessel with nucleation area for stimulating bubble formation
|
|
US7594270B2
(en)
*
|
2004-12-29 |
2009-09-22 |
Alert Logic, Inc. |
Threat scoring system and method for intrusion detection security networks
|
|
JP5118020B2
(en)
|
2005-05-05 |
2013-01-16 |
シスコ アイアンポート システムズ エルエルシー |
Identifying threats in electronic messages
|
|
US20080082348A1
(en)
*
|
2006-10-02 |
2008-04-03 |
Paulus Sachar M |
Enterprise Integrity Content Generation and Utilization
|
|
US20070143851A1
(en)
|
2005-12-21 |
2007-06-21 |
Fiberlink |
Method and systems for controlling access to computing resources based on known security vulnerabilities
|
|
CA2531410A1
(en)
|
2005-12-23 |
2007-06-23 |
Snipe Network Security Corporation |
Behavioural-based network anomaly detection based on user and group profiling
|
|
US20090271863A1
(en)
|
2006-01-30 |
2009-10-29 |
Sudhakar Govindavajhala |
Identifying unauthorized privilege escalations
|
|
US8316429B2
(en)
|
2006-01-31 |
2012-11-20 |
Blue Coat Systems, Inc. |
Methods and systems for obtaining URL filtering information
|
|
US20070186282A1
(en)
*
|
2006-02-06 |
2007-08-09 |
Microsoft Corporation |
Techniques for identifying and managing potentially harmful web traffic
|
|
US20070204345A1
(en)
|
2006-02-28 |
2007-08-30 |
Elton Pereira |
Method of detecting computer security threats
|
|
GB0605117D0
(en)
|
2006-03-14 |
2006-04-26 |
Streamshield Networks Ltd |
A method and apparatus for providing network security
|
|
US7530105B2
(en)
*
|
2006-03-21 |
2009-05-05 |
21St Century Technologies, Inc. |
Tactical and strategic attack detection and prediction
|
|
US7739211B2
(en)
|
2006-11-08 |
2010-06-15 |
21St Century Technologies, Inc. |
Dynamic SNA-based anomaly detection using unsupervised learning
|
|
WO2007143226A2
(en)
*
|
2006-06-09 |
2007-12-13 |
Massachusetts Institute Of Technology |
Generating a multiple-prerequisite attack graph
|
|
US20080034424A1
(en)
|
2006-07-20 |
2008-02-07 |
Kevin Overcash |
System and method of preventing web applications threats
|
|
US7756845B2
(en)
*
|
2006-12-28 |
2010-07-13 |
Yahoo! Inc. |
System and method for learning a weighted index to categorize objects
|
|
US8468244B2
(en)
|
2007-01-05 |
2013-06-18 |
Digital Doors, Inc. |
Digital information infrastructure and method for security designated data and with granular data stores
|
|
US7664857B2
(en)
|
2007-01-26 |
2010-02-16 |
Citrix Systems, Inc. |
Systems and methods of using an IP ID field for automatic WAN/LAN detection
|
|
US8760519B2
(en)
|
2007-02-16 |
2014-06-24 |
Panasonic Corporation |
Threat-detection in a distributed multi-camera surveillance system
|
|
US20080222706A1
(en)
*
|
2007-03-06 |
2008-09-11 |
Martin Renaud |
Globally aware authentication system
|
|
US8392997B2
(en)
|
2007-03-12 |
2013-03-05 |
University Of Southern California |
Value-adaptive security threat modeling and vulnerability ranking
|
|
US7899882B2
(en)
*
|
2007-03-29 |
2011-03-01 |
Agile Risk Management Llc |
System and method for providing remote forensics capability
|
|
US9083712B2
(en)
*
|
2007-04-04 |
2015-07-14 |
Sri International |
Method and apparatus for generating highly predictive blacklists
|
|
US8141133B2
(en)
*
|
2007-04-11 |
2012-03-20 |
International Business Machines Corporation |
Filtering communications between users of a shared network
|
|
GB0707839D0
(en)
|
2007-04-21 |
2007-05-30 |
Johnston Michael |
SAR initiation
|
|
US8707431B2
(en)
*
|
2007-04-24 |
2014-04-22 |
The Mitre Corporation |
Insider threat detection
|
|
US8429734B2
(en)
|
2007-07-31 |
2013-04-23 |
Symantec Corporation |
Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
|
|
US8447855B2
(en)
*
|
2007-08-08 |
2013-05-21 |
Radware, Ltd. |
Method, system and computer program product for preventing SIP attacks
|
|
JP5018329B2
(en)
|
2007-08-10 |
2012-09-05 |
富士通株式会社 |
Program for controlling communication device and communication device
|
|
US8195815B2
(en)
*
|
2007-10-31 |
2012-06-05 |
Cisco Technology, Inc. |
Efficient network monitoring and control
|
|
US20090132813A1
(en)
|
2007-11-08 |
2009-05-21 |
Suridx, Inc. |
Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
|
|
KR100935861B1
(en)
*
|
2007-11-12 |
2010-01-07 |
한국전자통신연구원 |
Method and apparatus for predicting network security risk
|
|
US8180886B2
(en)
*
|
2007-11-15 |
2012-05-15 |
Trustwave Holdings, Inc. |
Method and apparatus for detection of information transmission abnormalities
|
|
US8171388B2
(en)
*
|
2007-11-15 |
2012-05-01 |
Yahoo! Inc. |
Trust based moderation
|
|
US10091229B2
(en)
|
2008-01-09 |
2018-10-02 |
Masergy Communications, Inc. |
Systems and methods of network security and threat management
|
|
EP2088742B1
(en)
|
2008-02-11 |
2013-04-10 |
Universita' degli studi di Brescia |
Method for determining if an encrypted flow of packets belongs to a predefined class of flows
|
|
JP4905395B2
(en)
|
2008-03-21 |
2012-03-28 |
富士通株式会社 |
Communication monitoring device, communication monitoring program, and communication monitoring method
|
|
JP5003556B2
(en)
|
2008-03-28 |
2012-08-15 |
富士通株式会社 |
Communication detection device, communication detection method, and communication detection program
|
|
US8595282B2
(en)
*
|
2008-06-30 |
2013-11-26 |
Symantec Corporation |
Simplified communication of a reputation score for an entity
|
|
US8321958B1
(en)
*
|
2008-07-30 |
2012-11-27 |
Next It Corporation |
Detecting presence of a subject string in a target string and security event qualification based on prior behavior by an end user of a computer system
|
|
US8256004B1
(en)
|
2008-10-29 |
2012-08-28 |
Bank Of America Corporation |
Control transparency framework
|
|
US20100125911A1
(en)
*
|
2008-11-17 |
2010-05-20 |
Prakash Bhaskaran |
Risk Scoring Based On Endpoint User Activities
|
|
US8769684B2
(en)
|
2008-12-02 |
2014-07-01 |
The Trustees Of Columbia University In The City Of New York |
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
|
|
US8375452B2
(en)
*
|
2008-12-25 |
2013-02-12 |
Check Point Software Technologies Ltd |
Methods for user profiling for detecting insider threats based on internet search patterns and forensics of search keywords
|
|
US8275899B2
(en)
|
2008-12-29 |
2012-09-25 |
At&T Intellectual Property I, L.P. |
Methods, devices and computer program products for regulating network activity using a subscriber scoring system
|
|
US20100212010A1
(en)
*
|
2009-02-18 |
2010-08-19 |
Stringer John D |
Systems and methods that detect sensitive data leakages from applications
|
|
US8850043B2
(en)
*
|
2009-04-10 |
2014-09-30 |
Raytheon Company |
Network security using trust validation
|
|
US8549649B2
(en)
|
2009-04-30 |
2013-10-01 |
Emc Corporation |
Systems and methods for sensitive data remediation
|
|
US8478708B1
(en)
|
2009-07-30 |
2013-07-02 |
Zscaler, Inc. |
System and method for determining risk posed by a web user
|
|
US8140541B2
(en)
*
|
2009-09-30 |
2012-03-20 |
Michael Campbell Koss |
Time-weighted scoring system and method
|
|
US10467687B2
(en)
|
2009-11-25 |
2019-11-05 |
Symantec Corporation |
Method and system for performing fraud detection for users with infrequent activity
|
|
US8479286B2
(en)
*
|
2009-12-15 |
2013-07-02 |
Mcafee, Inc. |
Systems and methods for behavioral sandboxing
|
|
US8818641B2
(en)
|
2009-12-18 |
2014-08-26 |
Honda Motor Co., Ltd. |
Method of intersection estimation for a vehicle safety system
|
|
US10282702B2
(en)
*
|
2010-01-04 |
2019-05-07 |
Bank Of America Corporation |
Dynamic employee security risk scoring
|
|
US8782209B2
(en)
|
2010-01-26 |
2014-07-15 |
Bank Of America Corporation |
Insider threat correlation tool
|
|
US8474042B2
(en)
*
|
2010-07-22 |
2013-06-25 |
Bank Of America Corporation |
Insider threat correlation tool
|
|
US8800034B2
(en)
|
2010-01-26 |
2014-08-05 |
Bank Of America Corporation |
Insider threat correlation tool
|
|
US8595789B2
(en)
*
|
2010-02-15 |
2013-11-26 |
Bank Of America Corporation |
Anomalous activity detection
|
|
US8868728B2
(en)
*
|
2010-03-11 |
2014-10-21 |
Accenture Global Services Limited |
Systems and methods for detecting and investigating insider fraud
|
|
US8966036B1
(en)
*
|
2010-11-24 |
2015-02-24 |
Google Inc. |
Method and system for website user account management based on event transition matrixes
|