UNITED STATES PATENTS
Patent No. | Title |
---|---|
6,199,204* | DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK |
6,202,207* | METHOD AND A MECHANISM FOR SYNCHRONIZED UPDATING OF INTEROPERATING SOFTWARE |
6,314,428* | METHOD AND APPARATUS FOR APPLICATION MANAGEMENT IN COMPUTER NETWORKS |
6,584,569 | SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES |
6,779,021 | METHOD AND SYSTEM FOR PREDICTING AND MANAGING UNDESIRABLE ELECTRONIC MAIL |
6,785,732 | WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
6,826,716 | TEST PROGRAMS FOR ENTERPRISE WEB APPLICATIONS |
6,907,531 | METHOD AND SYSTEMS FOR IDENTIFYING, FIXING, AND UPDATING SECURITY VULNERABILITIES |
7,084,760 | SYSTEM, METHOD, AND PROGRAM PRODUCT FOR MANAGING AN INTRUSION DETECTION SYSTEM |
7,140,041 | DETECTING DISSEMINATION OF MALICIOUS PROGRAMS |
7,177,937 | WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
7,237,265 | SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES |
7,340,776 | METHOD AND SYSTEM FOR CONFIGURING AND SCHEDULING SECURITY AUDITS OF A COMPUTER NETWORK |
7,346,929 | METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY |
7,437,760 | ANTIVIRAL NETWORK SYSTEM |
7,475,427 | APPARATUS, METHODS AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK |
7,487,543 | METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM |
7,490,354 | VIRUS DETECTION IN A NETWORK |
7,739,739 | ANTIVIRAL NETWORK SYSTEM |
7,770,225 | METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY |
7,779,474 | VIRUS DETECTION IN A NETWORK |
7,895,340 | WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
7,945,957 | ANTIVIRAL NETWORK SYSTEM |
7,996,905 | METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM |
8,006,289 | METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
8,261,354 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT |
8,381,242 | STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,458,793 | METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS |
8,495,357 | DATA SECURITY POLICY ENFORCEMENT |
8,510,842 | PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS |
8,572,750 | WEB APPLICATION EXPLOIT MITIGATION IN AN INFORMATION TECHNOLOGY ENVIRONMENT |
8,640,252 | OBFUSCATING ENTRY OF SENSITIVE INFORMATION |
8,646,086 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
8,683,599 | STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,694,786 | VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING |
8,695,098 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |
8,752,182 | PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS |
8,782,351 | PROTECTING MEMORY OF A VIRTUAL GUEST |
8,788,763 | PROTECTING MEMORY OF A VIRTUAL GUEST |
8,793,800 | STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,800,047 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT |
8,910,291 | BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION |
8,935,794 | VERIFYING APPLICATION SECURITY VULNERABILITIES |
8,943,599 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES |
8,949,995 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES |
8,955,094 | USER SESSION MANAGEMENT FOR WEB APPLICATIONS |
8,984,642 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |
9,003,480 | CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE |
9,032,528 | BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION |
9,032,529 | DETECTING VULNERABILITIES IN WEB APPLICATIONS |
9,094,446 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,124,624 | DETECTING VULNERABILITIES IN WEB APPLICATIONS |
9,160,756 | METHOD AND APPARATUS FOR PROTECTING MARKUP LANGUAGE DOCUMENT AGAINST CROSS-SITE SCRIPTING ATTACK |
9,160,762 | VERIFYING APPLICATION SECURITY VULNERABILITIES |
9,172,717 | SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM |
9,189,625 | DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT |
9,231,970 | SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM |
9,256,511 | COMPUTER SOFTWARE APPLICATION SELF-TESTING |
9,264,443 | BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY |
9,271,146 | MOBILE PRIVACY INFORMATION PROXY |
9,317,697 | PROCESSING OF RESTRICTED ACCESS DATA |
9,460,291 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,471,787 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,497,209 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,530,016 | USING SOURCE TAINT ANALYSIS TO REDUCE FALSE POSITIVES IN AN ADVANCED PERSISTENT THREAT (APT) PROTECTION SOLUTION |
9,536,085 | DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT |
9,544,327 | PRIORITIZING SECURITY FINDINGS IN A SAST TOOL BASED ON HISTORICAL SECURITY ANALYSIS |
9,679,159 | MOBILE PRIVACY INFORMATION PROXY |
9,762,606 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,838,412 | COMPUTER SOFTWARE APPLICATION SELF-TESTING |
9,876,816 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,882,926 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
INTERNATIONAL ISSUED PATENTS
Application/Patent No. | Title |
---|---|
GB 2333864* | DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK |
GB 2333865* | SYNCHRONISED UPDATING OF INTEROPERATING SOFTWARE |
JP 3385590* | SOFTWARE UPDATE THE COMPUTER-READABLE RECORDING MEDIUM FOR USE WHEN UPDATING A COMPUTER PROGRAM THROUGH A COMPUTER NETWORK |
GB 2508553 | PROTECTING MEMORY OF A VIRTUAL GUEST |
JP 5736090 | METHOD OF THE MEMORY PROTECTION OF THE VIRTUAL GUEST, SYSTEM AND COMPUTER PROGRAM |
ZL201280049932.4 | A METHOD FOR PROTECTING VIRTUAL GUEST MEMORY, DEVICES AND SYSTEMS |
DE 602006036331.1 | METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
GB 1964360 | METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
JP 5030967B2 | METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
ZL200680047306.6 | METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
JP 4852542B2 | METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS |
ZL20050022471.1 | METHODS FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS |
GB 2505623B | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |
JP 6226990B2 | GUARANTEE OF SERVER-SIDE APPLICATIONS FOR SECURITY VULNERABILITIES |
ZL201380047234.5 | THE METHOD USED FOR SERVER AUTHENTICATION AND SECURITY SYSTEMS |
ZL201310397293.7 | SELF-TESTING OF COMPUTER SOFTWARE APPLICATION, METHOD AND SYSTEM THEREOF |
GB 2494738B | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
ZL 03817429.4 | METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM |
ZL201380007724.2 | METHOD AND SYSTEM FOR OPTIMIZATION OF ACCESS TO RESTRICTED DATA |
CA 2777434 | VERIFYING APPLICATION SECURITY VULNERABILITIES |
PENDING INTERNATIONAL APPLICATIONS & PUBLICATIONS
Application/Publication No. | Title |
---|---|
DE 112012003988 | PROTECTING MEMORY OF A VIRTUAL GUEST |
DE 112013000473 | A METHOD OF OPTIMIZING THE PROCESSING DATA WITH LIMITED ACCESS |
GB 201415069 | A METHOD FOR OPTIMIZING PROCESSING OF RESTRICTED-ACCESS DATA |
DE 112012002718 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |