Finjan Blue Patent Portfolio

Patent No.Title
6,199,204*DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK
6,202,207*METHOD AND A MECHANISM FOR SYNCHRONIZED UPDATING OF INTEROPERATING SOFTWARE
6,314,428*METHOD AND APPARATUS FOR APPLICATION MANAGEMENT IN COMPUTER NETWORKS
6,584,569*SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
6,779,021METHOD AND SYSTEM FOR PREDICTING AND MANAGING UNDESIRABLE ELECTRONIC MAIL
6,785,732WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
6,826,716TEST PROGRAMS FOR ENTERPRISE WEB APPLICATIONS
6,907,531METHOD AND SYSTEMS FOR IDENTIFYING, FIXING, AND UPDATING SECURITY VULNERABILITIES
7,084,760SYSTEM, METHOD, AND PROGRAM PRODUCT FOR MANAGING AN INTRUSION DETECTION SYSTEM
7,140,041DETECTING DISSEMINATION OF MALICIOUS PROGRAMS
7,177,937WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,237,265*SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
7,340,776METHOD AND SYSTEM FOR CONFIGURING AND SCHEDULING SECURITY AUDITS OF A COMPUTER NETWORK
7,346,929METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,437,760ANTIVIRAL NETWORK SYSTEM
7,475,427APPARATUS, METHODS AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK
7,487,543METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
7,490,354VIRUS DETECTION IN A NETWORK
7,739,739ANTIVIRAL NETWORK SYSTEM
7,770,225*METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,779,474VIRUS DETECTION IN A NETWORK
7,895,340WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,945,957ANTIVIRAL NETWORK SYSTEM
7,996,905METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
8,006,289METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
8,261,354SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,381,242STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,458,793METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
8,495,357DATA SECURITY POLICY ENFORCEMENT
8,510,842PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,572,750WEB APPLICATION EXPLOIT MITIGATION IN AN INFORMATION TECHNOLOGY ENVIRONMENT
8,640,252OBFUSCATING ENTRY OF SENSITIVE INFORMATION
8,646,086IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
8,683,599STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,694,786VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING
8,695,098DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
8,752,182PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,782,351PROTECTING MEMORY OF A VIRTUAL GUEST
8,788,763PROTECTING MEMORY OF A VIRTUAL GUEST
8,793,800STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,800,047SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,910,291BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
8,935,794VERIFYING APPLICATION SECURITY VULNERABILITIES
8,943,599CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,949,995CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,955,094USER SESSION MANAGEMENT FOR WEB APPLICATIONS
8,984,642DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
9,003,480CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE
9,032,528BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
9,032,529DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,094,446IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,124,624DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,160,756METHOD AND APPARATUS FOR PROTECTING MARKUP LANGUAGE DOCUMENT AGAINST CROSS-SITE SCRIPTING ATTACK
9,160,762VERIFYING APPLICATION SECURITY VULNERABILITIES
9,172,717SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,189,625DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,231,970SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,256,511COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,264,443BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY
9,271,146MOBILE PRIVACY INFORMATION PROXY
9,317,697PROCESSING OF RESTRICTED ACCESS DATA
9,460,291DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,471,787DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,497,209IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,530,016USING SOURCE TAINT ANALYSIS TO REDUCE FALSE POSITIVES IN AN ADVANCED PERSISTENT THREAT (APT) PROTECTION SOLUTION
9,536,085DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,544,327PRIORITIZING SECURITY FINDINGS IN A SAST TOOL BASED ON HISTORICAL SECURITY ANALYSIS
9,679,159MOBILE PRIVACY INFORMATION PROXY
9,762,606IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,838,412COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,876,816DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,882,926DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
Application/Patent No.Title
GB 2333864*DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK
GB 2333865*SYNCHRONISED UPDATING OF INTEROPERATING SOFTWARE
JP 3385590*SOFTWARE UPDATE THE COMPUTER-READABLE RECORDING MEDIUM FOR USE WHEN UPDATING A COMPUTER PROGRAM THROUGH A COMPUTER NETWORK
GB 2508553PROTECTING MEMORY OF A VIRTUAL GUEST
JP 5736090METHOD OF THE MEMORY PROTECTION OF THE VIRTUAL GUEST, SYSTEM AND COMPUTER PROGRAM
ZL201280049932.4A METHOD FOR PROTECTING VIRTUAL GUEST MEMORY, DEVICES AND SYSTEMS
DE 602006036331.1METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
GB 1964360METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 5030967B2METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
ZL200680047306.6METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 4852542B2METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
ZL20050022471.1METHODS FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
GB 2505623BDETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
JP 6226990B2GUARANTEE OF SERVER-SIDE APPLICATIONS FOR SECURITY VULNERABILITIES
ZL201380047234.5THE METHOD USED FOR SERVER AUTHENTICATION AND SECURITY SYSTEMS
ZL201310397293.7SELF-TESTING OF COMPUTER SOFTWARE APPLICATION, METHOD AND SYSTEM THEREOF
GB 2494738BDETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
ZL 03817429.4METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
ZL201380007724.2METHOD AND SYSTEM FOR OPTIMIZATION OF ACCESS TO RESTRICTED DATA
CA 2777434VERIFYING APPLICATION SECURITY VULNERABILITIES
Application/Publication No.Title
DE 112012003988PROTECTING MEMORY OF A VIRTUAL GUEST
DE 112013000473A METHOD OF OPTIMIZING THE PROCESSING DATA WITH LIMITED ACCESS
GB 201415069A METHOD FOR OPTIMIZING PROCESSING OF RESTRICTED-ACCESS DATA
DE 112012002718DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
*Gray text indicates expired patent.