Finjan Blue Patent Portfolio


UNITED STATES PATENTS

Patent No. Title
6,584,569 SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
6,779,021 METHOD AND SYSTEM FOR PREDICTING AND MANAGING UNDESIRABLE ELECTRONIC MAIL
6,785,732 WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
6,826,716 TEST PROGRAMS FOR ENTERPRISE WEB APPLICATIONS
6,907,531 METHOD AND SYSTEMS FOR IDENTIFYING, FIXING, AND UPDATING SECURITY VULNERABILITIES
7,084,760 SYSTEM, METHOD, AND PROGRAM PRODUCT FOR MANAGING AN INTRUSION DETECTION SYSTEM
7,140,041 DETECTING DISSEMINATION OF MALICIOUS PROGRAMS
7,177,937 WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,237,265 SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
7,340,776 METHOD AND SYSTEM FOR CONFIGURING AND SCHEDULING SECURITY AUDITS OF A COMPUTER NETWORK
7,346,929 METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,437,760 ANTIVIRAL NETWORK SYSTEM
7,475,427 APPARATUS, METHODS AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK
7,487,543 METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
7,490,354 VIRUS DETECTION IN A NETWORK
7,739,739 ANTIVIRAL NETWORK SYSTEM
7,770,225 METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,779,474 VIRUS DETECTION IN A NETWORK
7,895,340 WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,945,957 ANTIVIRAL NETWORK SYSTEM
7,996,905 METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
8,006,289 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
8,261,354 SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,381,242 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,458,793 METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
8,495,357 DATA SECURITY POLICY ENFORCEMENT
8,510,842 PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,572,750 WEB APPLICATION EXPLOIT MITIGATION IN AN INFORMATION TECHNOLOGY ENVIRONMENT
8,640,252 OBFUSCATING ENTRY OF SENSITIVE INFORMATION
8,646,086 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
8,683,599 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,694,786 VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING
8,695,098 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
8,752,182 PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,782,351 PROTECTING MEMORY OF A VIRTUAL GUEST
8,788,763 PROTECTING MEMORY OF A VIRTUAL GUEST
8,793,800 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,800,047 SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,910,291 BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
8,935,794 VERIFYING APPLICATION SECURITY VULNERABILITIES
8,943,599 CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,949,995 CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,955,094 USER SESSION MANAGEMENT FOR WEB APPLICATIONS
8,984,642 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
9,003,480 CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE
9,032,528 BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
9,032,529 DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,094,446 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,124,624 DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,160,756 METHOD AND APPARATUS FOR PROTECTING MARKUP LANGUAGE DOCUMENT AGAINST CROSS-SITE SCRIPTING ATTACK
9,160,762 VERIFYING APPLICATION SECURITY VULNERABILITIES
9,172,717 SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,189,625 DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,231,970 SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,256,511 COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,264,443 BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY
9,271,146 MOBILE PRIVACY INFORMATION PROXY
9,317,697 PROCESSING OF RESTRICTED ACCESS DATA
9,460,291 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,471,787 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,497,209 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,530,016 USING SOURCE TAINT ANALYSIS TO REDUCE FALSE POSITIVES IN AN ADVANCED PERSISTENT THREAT (APT) PROTECTION SOLUTION
9,536,085 DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,544,327 PRIORITIZING SECURITY FINDINGS IN A SAST TOOL BASED ON HISTORICAL SECURITY ANALYSIS
9,679,159 MOBILE PRIVACY INFORMATION PROXY
9,762,606 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,838,412 COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,876,816 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,882,926 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS

INTERNATIONAL ISSUED PATENTS

Application/Patent No. Title
GB 2333865 SYNCHRONISED UPDATING OF INTEROPERATING SOFTWARE
JP 3385590 SOFTWARE UPDATE THE COMPUTER-READABLE RECORDING MEDIUM FOR USE WHEN UPDATING A COMPUTER PROGRAM THROUGH A COMPUTER NETWORK
GB 2508553 PROTECTING MEMORY OF A VIRTUAL GUEST
JP 5736090 METHOD OF THE MEMORY PROTECTION OF THE VIRTUAL GUEST, SYSTEM AND COMPUTER PROGRAM
CN 103858113B (ZL201280049932.4) A METHOD FOR PROTECTING VIRTUAL GUEST MEMORY, DEVICES AND SYSTEMS
DE 602006036331.1 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
GB 1964360 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 5030967B2 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
CN 101331735 (ZL200680047306.6) METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 4852542B2 METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
CN 1981289B (ZL20050022471.1) METHODS FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
GB 2505623B DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
JP 6226990B2 GUARANTEE OF SERVER-SIDE APPLICATIONS FOR SECURITY VULNERABILITIES
CN 104620225B (ZL201380047234.5) THE METHOD USED FOR SERVER AUTHENTICATION AND SECURITY SYSTEMS
CN 103678113A (ZL201310397293.7) SELF-TESTING OF COMPUTER SOFTWARE APPLICATION, METHOD AND SYSTEM THEREOF
GB 2494738B DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
CN 1672111A (CN1318932C) METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
CN 104094261B (ZL201380007724.2) METHOD AND SYSTEM FOR OPTIMIZATION OF ACCESS TO RESTRICTED DATA

PENDING INTERNATIONAL APPLICATIONS & PUBLICATIONS

Application/Publication No. Title
DE 112012003988 PROTECTING MEMORY OF A VIRTUAL GUEST
DE 112013000473 A METHOD OF OPTIMIZING THE PROCESSING DATA WITH LIMITED ACCESS
CA 2777434 VERIFYING APPLICATION SECURITY VULNERABILITIES
GB 201415069 A METHOD FOR OPTIMIZING PROCESSING OF RESTRICTED-ACCESS DATA
DE 112012002718 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
This web page is provided to satisfy the virtual patent marking provisions of various jurisdictions, including the virtual patent marking provisions of the America Invents Act (AIA). The list will be updated from time to time, as more products, patent applications, and patents become available.