Validity Report
Full Report
US10873595B1 — Real-time vulnerability monitoring
Priority Date: 2003-07-01, Publication Date: 2020-12-22, Current Assignee: SecurityProfiling IncReport Generated: 2021-12-08

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP1512075A11.352ADAPTIVE INTRUSION DETECTION SYSTEMGRANT2005-03-092002-05-2229584270GreatLucid Security CorpLucid Security Corp
US7926113B11.301System and method for managing network vulnerability analysis systemsGRANT2011-04-122003-06-0943837264GreatTenable Network Security IncTenable Inc
EP1461707A11.262AUTOMATED COMPUTER VULNERABILITY RESOLUTION SYSTEMGRANT2004-09-292001-12-3123356073GreatCitadel Security Software IncCitadel Security Software Inc
EP1559008A11.228SYSTEM AND METHOD FOR RISK DETECTION AND ANALYSIS IN A COMPUTER NETWORKGRANT2005-08-032002-10-0132068260GreatSkybox Security LtdSkybox Security Ltd
US7359962B21.191Network security system integrationGRANT2008-04-152002-04-3029249691Great3Com CorpTrend Micro Inc, HP Inc
US7181769B11.165Network security system having a device profiler communicatively coupled to a traffic monitorGRANT2007-02-202000-08-2537745156GreatNcircle Network Security IncTripwire Inc
US6546493B11.158System  method and computer program product for risk assessment scanning based on detected anomalous eventsGRANT2003-04-082001-11-3021721419GreatNetworks Associates Technology IncMcAfee LLC
US7451488B21.158Policy-based vulnerability assessmentGRANT2008-11-112003-04-2933567380GreatSecurify IncMcAfee LLC
US8266703B11.128System  method and computer program product for improving computer network intrusion detection by risk prioritizationGRANT2012-09-112001-11-3046760803GreatMcAfee LLCMcAfee LLC
US20040064726A11.116Vulnerability management and tracking system (VMTS)APPLICATION2004-04-012002-09-3032029555GreatElectronic Data Systems LLCHewlett Packard Development Co LP
US7574740B11.085Method and system for intrusion detection in a computer networkGRANT2009-08-112000-04-2824242590GreatInternational Business Machines CorpInternational Business Machines Corp
US7278161B21.073Protecting a data processing system from attack by a vandal who uses a vulnerability scannerGRANT2007-10-022001-10-0125513663GreatInternational Business Machines CorpTrend Micro Inc
US20030135749A11.032System and method of defining the security vulnerabilities of a computer systemAPPLICATION2003-07-172001-10-3121695887GreatHewlett Packard CoHewlett Packard Development Co LP
EP1470691B10.994INTEGRATED NETWORK INTRUSION DETECTIONGRANT2012-06-132002-02-0127658645GreatIntel CorpIntel Corp
EP1574013B10.986CONTENT MANAGEMENT SYSTEMGRANT2009-06-172002-12-1332595144GreatComputer Associates Think IncCA Inc
US9507944B20.975Method for simulation aided security event managementGRANT2016-11-292002-10-0147892470GreatSkybox Security IncSkybox Security Inc
EP1481508A10.974MULTI-METHOD GATEWAY-BASED NETWORK SECURITY SYSTEMS AND METHODSGRANT2004-12-012002-02-0827659532GreatJuniper Networks IncJuniper Networks Inc
WO2004097584A20.970METHOD AND SYSTEM FOR REMOTE NETWORK SECURITY MANAGEMENTAPPLICATION2004-11-112003-04-2833418368Great
EP1552406A10.965METHODS AND SYSTEMS FOR MANAGING ENTERPRISE ASSETSGRANT2005-07-132002-06-1829736653GreatComputer Associates Think IncCA Inc
EP1324535B10.965Configuration and management system for mobile and embedded devicesGRANT2012-01-252001-12-0526879639GreatMicrosoft CorpMicrosoft Corp
US7603711B20.956Intrusion detection systemGRANT2009-10-132002-10-3132302582GreatSECNAP Network Security LLCSECNAP Network Security LLC
US20040128543A10.942Method and system for morphing honeypot with computer security incident correlationAPPLICATION2004-07-012002-12-3132655046GreatInternational Business Machines CorpTrend Micro Inc
EP1451999A10.942DETECTING INTRUSIONS IN A NETWORKGRANT2004-09-012001-12-0621747187GreatIntel CorpIntel Corp
US6957348B10.935Interoperability of vulnerability and intrusion detection systemsGRANT2005-10-182000-01-1035066308GreatNcircle Network Security IncTripwire Inc
EP1376930B10.932Systems and methods for application delivery and configuration management of mobile devicesGRANT2008-04-232002-06-2829718038GreatMicrosoft CorpMicrosoft Corp
US6298445B10.928Computer securityGRANT2001-10-021998-04-3022096866GreatNetect LtdNetect Ltd, NortonLifeLock Inc
US7657927B20.923Behavior-based host-based intrusion prevention systemGRANT2010-02-022003-01-1632711886GreatSymantec CorpCA Inc
EP1535164B10.922DETERMINING THREAT LEVEL ASSOCIATED WITH NETWORK ACTIVITYGRANT2012-01-042002-08-2631946943GreatInternational Business Machines CorpInternational Business Machines Corp
EP1593228A20.921NETWORK AUDIT POLICY ASSURANCE SYSTEMGRANT2005-11-092003-02-1432908575GreatPreventsys IncMcAfee LLC
US6301668B10.918Method and system for adaptive network security using network vulnerability assessmentGRANT2001-10-091998-12-2922832087GreatCisco Technology IncCisco Technology Inc
US7444679B20.907Network  method and computer readable medium for distributing security updates to select nodes on a networkGRANT2008-10-282001-10-3121696049GreatHewlett Packard Development Co LPHTC Corp
US7913303B10.906Method and system for dynamically protecting a computer system from attackGRANT2011-03-222003-01-2143741918GreatInternational Business Machines CorpAlibaba Group Holding Ltd
US8135815B20.899Method and apparatus for network wide policy-based analysis of configurations of devicesGRANT2012-03-132001-03-2746323120GreatRedSeal Systems IncREDSEAL Inc
EP2403219B10.899Method for name to address resolutionGRANT2014-10-222001-09-2823266770GreatLevel 3 CDN International IncLevel 3 CDN International Inc
US7376969B10.899Real time monitoring and analysis of events from multiple network security devicesGRANT2008-05-202002-12-0239387745GreatArcSight LLCMicro Focus LLC
EP1290852A20.899DISTRIBUTED FIREWALL SYSTEM AND METHODGRANT2003-03-122000-05-2524312336GreatSecure Computing LLCMcAfee LLC
EP1143662A20.895Virtual private network having automatic updating of client reachability informationGRANT2001-10-101999-06-1027585868GreatAlcatel Internetworking IncAlcatel Internetworking Inc
EP1259882A10.895INTERNET/NETWORK SECURITY METHOD AND SYSTEM FOR CHECKING SECURITY OF A CLIENT FROM A REMOTE FACILITYGRANT2002-11-272000-03-2722709344GreatNetwork Security Systems IncNetwork Security Systems Inc
EP1634175B10.893MULTILAYER ACCESS CONTROL SECURITY SYSTEMGRANT2015-06-242003-05-2833490678GreatCitrix Systems IncCitrix Systems Inc
EP1145519A20.892POLICY BASED NETWORK ARCHITECTUREGRANT2001-10-171999-06-1027585810GreatAlcatel Internetworking IncAlcatel Internetworking Inc
US7350234B20.888Intrusion tolerant communication networks and associated methodsGRANT2008-03-252001-06-1126862679GreatResearch Triangle InstituteResearch Triangle Institute
EP1611509A20.885NON-INVASIVE AUTOMATIC OFFSITE PATCH FINGERPRINTING AND UPDATING SYSTEM AND METHODGRANT2006-01-042003-03-2033096760GreatPATCHLINK CORP, PatchLink com CorpPATCHLINK CORP, PatchLink com Corp
US20030188189A10.884Multi-level and multi-platform intrusion detection and response systemAPPLICATION2003-10-022002-03-2728452490GreatNETPLEXUS CorpNETPLEXUS Corp
EP1381928A20.882COMPUTER SECURITY AND MANAGEMENT SYSTEMGRANT2004-01-212001-01-1022992142GreatCisco Technology IncCisco Technology Inc
EP1230778A20.880METHOD AND SYSTEM FOR REMOTELY CONFIGURING AND MONITORING A COMMUNICATION DEVICEGRANT2002-08-141999-11-1826862122GreatSecureWorks IncSecureWorks Inc
US7627891B20.880Network audit and policy assurance systemGRANT2009-12-012003-02-1435310855GreatPreventsys IncMcAfee LLC
US7827607B20.879Enhanced client compliancy using database of security sensor dataGRANT2010-11-022002-11-2736585642GreatSymantec CorpCA Inc
WO1999056196A10.877COMPUTER SECURITYAPPLICATION1999-11-041998-04-3022096390Great
US7418730B20.875Automatic client responses to worm or hacker attacksGRANT2008-08-262002-12-1732507038GreatInternational Business Machines CorpTrend Micro Inc
US7197762B20.874Method  computer readable medium  and node for a three-layered intrusion prevention system for detecting network exploitsGRANT2007-03-272001-10-3121707384GreatHewlett Packard Development Co LPTrend Micro Inc
US20030145225A10.870Intrusion event filtering and generic attack signaturesAPPLICATION2003-07-312002-01-2827609652GreatInternational Business Machines CorpTrend Micro Inc
US8359650B20.868System  method and computer readable medium for evaluating potential attacks of wormsGRANT2013-01-222002-10-0138878279GreatSkybox Security IncSkybox Security Inc
US6785821B10.865Intrusion detection system and method having dynamically loaded signaturesGRANT2004-08-311999-01-0822855284GreatCisco Technology IncCisco Technology Inc
US20060156407A10.865Computer model of security risksAPPLICATION2006-07-132002-09-3032068181GreatElectronic Data Systems LLCValtrus Innovations Ltd, Hewlett Packard Enterprise Development LP
EP1558937B10.863ACTIVE NETWORK DEFENSE SYSTEM AND METHODGRANT2011-08-242002-11-0732229193GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US6715084B20.858Firewall system and method via feedback from broad-scope monitoring for intrusion detectionGRANT2004-03-302002-03-2628452786GreatBellSouth Intellectual Property CorpIntellectual Ventures II LLC
EP1488316B10.855SYSTEMS AND METHODS FOR ENHANCING ELECTRONIC COMMUNICATION SECURITYGRANT2017-10-042002-03-0827808883GreatMcAfee LLCMcAfee LLC
US6499107B10.854Method and system for adaptive network security using intelligent packet analysisGRANT2002-12-241998-12-2922834897GreatCisco Technology IncCisco Technology Inc
US7234168B20.849Hierarchy-based method and apparatus for detecting attacks on a computer systemGRANT2007-06-192001-06-1323149555GreatMcAfee LLCMcAfee LLC
US8122499B20.841Network security apparatus and methodGRANT2012-02-212003-04-1634083031GreatHobnob IncHobnob Inc
US6513122B10.839Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilitiesGRANT2003-01-282001-06-2925404594GreatNetworks Associates Technology IncMcAfee LLC
US9800608B20.835Processing data flows with a data flow processorGRANT2017-10-242000-09-2544648095GreatSymantec CorpCA Inc
US6708187B10.834Method for selective LDAP database synchronizationGRANT2004-03-161999-06-1031951014GreatAlcatel SAAlcatel SA
US6185689B10.830Method for network self security assessmentGRANT2001-02-061998-06-2422297714GreatRichard S Carson and Assoc IncRichard S Carson and Assoc Inc
US7607169B10.829User interface for network security consoleGRANT2009-10-202002-12-0241170444GreatArcSight LLCMicro Focus LLC
EP1494429B10.826Method for implementing secure corporate communicationGRANT2012-05-092003-06-3033435363GreatNokia IncNokia Inc
US20030056116A10.820ReporterAPPLICATION2003-03-202001-05-1846280619GreatAchilles Guard IncAchilles Guard Inc
US7296293B20.820Using a benevolent worm to assess and correct computer security vulnerabilitiesGRANT2007-11-132002-12-3132655162GreatSymantec CorpCA Inc
US6725377B10.818Method and system for updating anti-intrusion softwareGRANT2004-04-201999-03-1232068372GreatNetworks Associates Technology IncMcAfee LLC
US6279113B10.815Dynamic signature inspection-based network intrusion detectionGRANT2001-08-211998-03-1627373258GreatInternet Tools IncCA Inc
EP1327191A10.815NON-INVASIVE AUTOMATIC OFFSITE PATCH FINGERPRINTING AND UPDATING SYSTEM AND METHODGRANT2003-07-162000-09-2222882357GreatPatchLink com CorpLumension Security Inc, PatchLink com Corp
WO2004104793A20.813SYSTEM AND METHOD FOR ENTREPRISE SECURITY MONITORING AND CONFIGURATION MANAGEMENTAPPLICATION2004-12-022003-05-2033476885Great
EP1494428B10.811Method and apparatus for implementing secure VPN access via modified certificate stringsGRANT2007-01-172003-06-3033435362GreatNokia IncNokia Inc
EP1368726A20.805APPARATUS AND METHOD FOR PROVIDING SECURE NETWORK COMMUNICATIONGRANT2003-12-102001-02-0623015340GreatEn garde SystemsEn garde Systems
US8042149B20.805Systems and methods for message threat managementGRANT2011-10-182002-03-0829554084GreatMcAfee LLCMcAfee LLC
US6873988B20.799System and methods providing anti-virus cooperative enforcementGRANT2005-03-292001-07-0627538599GreatCheck Point Software Technologies IncCheck Point Software Technologies Inc
US6907430B20.798Method and system for assessing attacks on computer networks using Bayesian networksGRANT2005-06-142001-10-0425515905GreatBooz Allen Hamilton IncBooz Allen Hamilton Inc
US8135657B20.796Systems and methods for processing data flowsGRANT2012-03-132000-09-2546329602GreatCrossbeam Systems IncCA Inc
US7350203B20.796Network security softwareGRANT2008-03-252002-07-2330769643Great
US9525696B20.795Systems and methods for processing data flowsGRANT2016-12-202000-09-2546829547GreatBlue Coat Systems LLCCA Inc
US7281270B20.795Attack impact prediction systemGRANT2007-10-092003-04-0135542820GreatLockheed Martin CorpLockheed Martin Corp
US7237264B10.794System and method for preventing network misuseGRANT2007-06-262001-06-0438178918GreatInternet Security Systems IncKyndryl Inc
US6205551B10.794Computer security using virus probingGRANT2001-03-201998-01-2921772149GreatNokia of America CorpNokia of America Corp, Provenance Asset Group LLC, Nokia USA Inc
US7058821B10.793System and method for detection of intrusion attacks on packets transmitted on a networkGRANT2006-06-062001-01-1736569088GreatiPolicy Networks IncTech Mahindra Ltd
US20040064731A10.793Integrated security administratorAPPLICATION2004-04-012002-09-2632033663GreatSchlumberger Omnes IncDexa Systems Inc
WO2001033359A10.791NETCENTRIC COMPUTER SECURITY FRAMEWORKAPPLICATION2001-05-101999-11-0322590178Great
US7325252B20.791Network security testingGRANT2008-01-292001-05-1826720669GreatAchilles Guard IncAlert Logic Inc
US7249187B20.790Enforcement of compliance with network security policiesGRANT2007-07-242002-11-2732325473GreatSymantec CorpCA Inc
US20030084319A10.782Node  method and computer readable medium for inserting an intrusion prevention system into a network stackAPPLICATION2003-05-012001-10-3121696042GreatHewlett Packard CoHewlett Packard Development Co LP
US20030140249A10.782Security level information offering method and systemAPPLICATION2003-07-242002-01-1819191625GreatTEAMGIA KKTEAMGIA KK
US8769687B20.781Network security architectureGRANT2014-07-012001-07-2426698171GreatVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
EP1090492B10.778NETWORK POLICY MANAGEMENT AND EFFECTIVENESS SYSTEMGRANT2005-08-311998-06-2522303285GreatJacobson Family Holdings LLCJacobson Family Holdings LLC
US6088804A0.778Adaptive system and method for responding to computer network security attacksGRANT2000-07-111998-01-1221719077GreatMotorola Solutions IncGeneral Dynamics Mission Systems Inc
US20110214157A10.775SECURING A NETWORK WITH DATA FLOW PROCESSINGAPPLICATION2011-09-012000-09-2544506014GreatCrossbeam Systems IncCA Inc
US6611869B10.774System and method for providing trustworthy network security concern communication in an active security management environmentGRANT2003-08-261999-10-2827760070GreatNetworks Associates IncMcAfee LLC
US6892241B20.771Anti-virus policy enforcement system and methodGRANT2005-05-102001-09-2825513742GreatNetworks Associates Technology IncNetworks Associates Technology Inc, McAfee LLC
US20110219035A10.769DATABASE SECURITY VIA DATA FLOW PROCESSINGAPPLICATION2011-09-082000-09-2544532213GreatCrossbeam Systems IncBlue Coat Systems LLC
US20110213869A10.769PROCESSING DATA FLOWS WITH A DATA FLOW PROCESSORAPPLICATION2011-09-012000-09-2544505889GreatCrossbeam Systems IncBlue Coat Systems LLC
US20030084322A10.769System and method of an OS-integrated intrusion detection and anti-virus systemAPPLICATION2003-05-012001-10-3121699134GreatHewlett Packard CoHewlett Packard Development Co LP
US8135823B20.769System and method for network vulnerability detection and reportingGRANT2012-03-132002-01-1546299044GreatMcAfee LLCMcAfee LLC
US7516490B20.764System  method and software for supplying activation information to a subsystemGRANT2009-04-072000-03-308168287GreatInternational Business Machines CorpInternational Business Machines Corp
US7127743B10.762Comprehensive security structure platform for network managersGRANT2006-10-242000-06-2337110723GreatNetforensics IncBLACKSTRATUS Inc, LOG STORM SECURITY Inc, SIGMA OPPORTUNITY FUND II LLC
EP1468533B10.759Anti-virus protection at a network gatewayGRANT2009-11-112002-01-259929688GreatF Secure OyjF Secure Oyj
US7089428B20.759Method and system for managing computer security informationGRANT2006-08-082000-04-2822741198GreatInternet Security Systems IncInternational Business Machines Corp
US7058976B10.758Intelligent feedback loop process control systemGRANT2006-06-062000-05-1724286392GreatDeep Nines IncTrend Micro Inc
US7565692B10.758Floating intrusion detection platformsGRANT2009-07-212000-05-3024322132GreatAT&T Wireless Services IncAT&T Mobility II LLC, AT&T Wireless Services Inc
US7673043B20.756System and method for network vulnerability detection and reportingGRANT2010-03-022002-01-1546299043GreatMcAfee LLCMcAfee LLC
EP1461720A10.755DYNAMIC FILE ACCESS CONTROL AND MANAGEMENTGRANT2004-09-292001-11-2025535144GreatAereous LLCEMC Corp
US7712133B20.753Integrated intrusion detection system and methodGRANT2010-05-042003-06-2033517668GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6014700A0.753Workload management in a client-server network with distributed objectsGRANT2000-01-111997-05-0825315054GreatInternational Business Machines CorpInternational Business Machines Corp
US6487666B10.752Intrusion detection signature analysis using regular expressions and logical operatorsGRANT2002-11-261999-01-1522872886GoodCisco Technology IncCisco Technology Inc
US7228566B20.751Automated computer system security compromiseGRANT2007-06-052001-07-1027368607GoodCore SDI IncHELP/SYSTEMS LLC
US9027121B20.747Method and system for creating a record for one or more computer security incidentsGRANT2015-05-052000-10-1038950745GoodInternational Business Machines CorpKyndryl Inc
US7461404B20.746Detection of unauthorized access in a networkGRANT2008-12-022002-11-0433304098GoodMazu Networks IncRiverbed Technology Inc
WO2003103214A10.746SYSTEMS AND METHODS FOR ENHANCED NETWORK SECURITYAPPLICATION2003-12-112002-06-0329712094Good
WO2004100011A10.746SYSTEM AND METHOD FOR NETWORK SECURITY SCANNINGAPPLICATION2004-11-182003-04-2933434670Good
US11171974B20.745Distributed agent based model for security monitoring and responseGRANT2021-11-092002-12-2451352318GoodInventship LLCInventship LLC
US7162649B10.743Method and apparatus for network assessment and authenticationGRANT2007-01-092000-06-3024431992GoodInternet Security Systems IncInternational Business Machines Corp
US6550012B10.742Active firewall system and methodologyGRANT2003-04-151998-12-1126809330GoodNetwork Associates IncMcAfee LLC
US8479057B20.740Aggregator for connection based anomaly detectionGRANT2013-07-022002-11-0433314432GoodRiverbed Technology IncRiverbed Technology Inc
US9280667B10.739Persistent host determinationGRANT2016-03-082000-08-2555410465GoodTripwire IncTripwire Inc
US20030188190A10.737System and method of intrusion detection employing broad-scope monitoringAPPLICATION2003-10-022002-03-2628452650GoodBellSouth Intellectual Property CorpAT&T Delaware Intellectual Property Inc
US6907531B10.735Method and system for identifying  fixing  and updating security vulnerabilitiesGRANT2005-06-142000-06-3034633059GoodInternet Security Systems IncFinjan Blue Inc
US7779466B20.733Systems and methods for anomaly detection in patterns of monitored communicationsGRANT2010-08-172002-03-0829548128GoodMcAfee LLCMcAfee LLC
US8504879B20.729Connection based anomaly detectionGRANT2013-08-062002-11-0433136175GoodRiverbed Technology IncRiverbed Technology Inc
US6941467B20.729Systems and methods for adaptive message interrogation through multiple queuesGRANT2005-09-062002-03-0829548096GoodCiphertrust IncMcAfee LLC
EP1547303A10.727SERVER  COMPUTER MEMORY  AND METHOD TO SUPPORT SECURITY POLICY MAINTENANCE AND DISTRIBUTIONGRANT2005-06-292002-09-2332034384GoodCredant Technologies IncCredant Technologies Inc
US20030212779A10.724System and Method for Network Security ScanningAPPLICATION2003-11-132002-04-3029406449GoodThreatGuard IncThreatGuard Inc
US7562388B20.723Method and system for implementing security devices in a networkGRANT2009-07-142001-05-3123134533GoodInternational Business Machines CorpKyndryl Inc
US7716737B20.723Connection based detection of scanning attacksGRANT2010-05-112002-11-0433102426GoodRiverbed Technology IncRiverbed Technology Inc
US20030084318A10.722System and method of graphically correlating data for an intrusion protection systemAPPLICATION2003-05-012001-10-3121695593GoodHewlett Packard CoHewlett Packard Development Co LP
EP1616263B10.721METHOD AND SYSTEM FOR PROVIDING SECURE ACCESS TO PRIVATE NETWORKS WITH CLIENT REDIRECTIONGRANT2018-08-222003-04-0833298314GoodPulse Secure LLCJuniper Networks Inc, Pulse Secure LLC
US6584569B20.718System for determining web application vulnerabilitiesGRANT2003-06-242000-03-0322686713GoodSanctum LtdFinjan Blue Inc
US8438241B20.717Detecting and protecting against worm traffic on a networkGRANT2013-05-072001-08-1456290524GoodCisco Technology IncCisco Technology Inc, Riverhead Networks Inc
US6883101B10.712System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rulesGRANT2005-04-192000-02-0823988703GoodHarris CorpHarris Corp
US6944772B20.708System and method of enforcing executable code identity verification over the networkGRANT2005-09-132001-12-2628044887GoodCA IncINTERNET SECURITY ALLIANCE Inc
US20040049698A10.708Computer network security system utilizing dynamic mobile sensor agentsAPPLICATION2004-03-112002-09-0631977636GoodOrincon Corp InternationalLockheed Martin Corp
US7694128B20.707Systems and methods for secure communication deliveryGRANT2010-04-062002-03-0846282089GoodMcAfee LLCMcAfee LLC
US6243815B10.707Method and apparatus for reconfiguring and managing firewalls and security devicesGRANT2001-06-051997-04-2526722071GoodMicro Focus Software IncRPX Corp
EP1111507A20.707Remote computer virus scanningGRANT2001-06-271999-12-2410867020GoodF Secure OyjF Secure Oyj
US7921459B20.705System and method for managing security events on a networkGRANT2011-04-052000-04-2822741185GoodInternational Business Machines CorpInternational Business Machines Corp
US20030084340A10.705System and method of graphically displaying data for an intrusion protection systemAPPLICATION2003-05-012001-10-3121699098GoodHewlett Packard CoHewlett Packard Development Co LP
US20040123141A10.705Multi-tier intrusion detection systemAPPLICATION2004-06-242002-12-1832593227GoodIntel CorpIntel Corp
EP1451702A10.704CLIENT-SIDE NETWORK ACCESS POLICES AND MANAGEMENT APPLICATIONSGRANT2004-09-012001-09-2826984863GoodFiberlink Communications CorpFiberlink Communications Corp
US8087083B10.701Systems and methods for detecting a network snifferGRANT2011-12-272002-01-0445349954GoodVerizon Laboratories IncPalo Alto Networks Inc
US8266674B20.700Method and system for implementing changes to security policies in a distributed security systemGRANT2012-09-112001-12-1240872738GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US5960170A0.698Event triggered iterative virus detectionGRANT1999-09-281997-03-1825231376GoodTrend Micro IncTrend Micro Inc
US6996845B10.697Internet security analysis system and processGRANT2006-02-072000-11-2835734400GoodS P I Dynamics IncMicro Focus LLC
US6530024B10.697Adaptive feedback security system and methodGRANT2003-03-041998-11-2022728379GoodCentrax CorpCheck Point Software Technologies Inc, Centrax Corp
US5931946A0.697Network system having external/internal audit system for computer securityGRANT1999-08-031996-02-0812092223GoodHitachi LtdHitachi Ltd
US7941854B20.696Method and system for responding to a computer intrusionGRANT2011-05-102002-12-0532468329GoodInternational Business Machines CorpInternational Business Machines Corp
US6408391B10.691Dynamic system defense for information warfareGRANT2002-06-181998-05-0622114955GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US20030188194A10.690Method and apparatus for real-time security verification of on-line servicesAPPLICATION2003-10-022002-03-2928453695GoodScanAlertScanAlert
US8327442B20.690System and method for a distributed application and network security system (SDI-SCAM)GRANT2012-12-042002-12-2435997647GoodInventship LLCInventship LLC
US7693947B20.687Systems and methods for graphically displaying messaging trafficGRANT2010-04-062002-03-0838832662GoodMcAfee LLCMcAfee LLC
US8209756B10.687Compound attack detection in a computer networkGRANT2012-06-262002-02-0846273023GoodJuniper Networks IncJuniper Networks Inc
US7089589B20.686Method and apparatus for the detection  notification  and elimination of certain computer viruses on a network using a promiscuous system as baitGRANT2006-08-082001-04-1025255481GoodLenovo Singapore Pte LtdLenovo PC International Ltd
US7152105B20.683System and method for network vulnerability detection and reportingGRANT2006-12-192002-01-1528791862GoodMcAfee LLCMcAfee LLC
WO2004095192A20.682SYSTEMS AND METHODS FOR SECURING WIRELESS COMPUTER NETWORKSAPPLICATION2004-11-042003-04-2133314627Good
US5991881A0.682Network surveillance systemGRANT1999-11-231996-11-0824994205GoodHarris CorpRPX Corp
US7543056B20.681System and method for network vulnerability detection and reportingGRANT2009-06-022002-01-1529418181GoodMcAfee LLCMcAfee LLC
US7322044B20.681Systems and methods for automated network policy exception detection and correctionGRANT2008-01-222002-06-0332303897GoodAirDefense IncExtreme Networks Inc
US7042852B20.679System and method for wireless LAN dynamic channel change with honeypot trapGRANT2006-05-092002-05-2029552760GoodAirDefense IncExtreme Networks Inc
US7058796B20.678Method and system for actively defending a wireless LAN against attacksGRANT2006-06-062002-05-2029731938GoodAirDefense IncExtreme Networks Inc
US7290282B10.678Reducing false positive computer virus detectionsGRANT2007-10-302002-04-0838623463GoodSymantec CorpNortonLifeLock Inc
US6321338B10.677Network surveillanceGRANT2001-11-201998-11-0922694340GoodSRI International IncSRI International Inc
US7260846B20.677Intrusion detection systemGRANT2007-08-212002-07-3031186832GoodSteelCloud IncLonghorn Hd LLC
US20020073337A10.676Method and system for internet hosting and securityAPPLICATION2002-06-132000-08-3022859104GoodCitibank NACitibank NA
US6405318B10.674Intrusion detection systemGRANT2002-06-111999-03-1223021397GoodPsionic Software IncCisco Technology Inc
US6839850B10.673Method and system for detecting intrusion into and misuse of a data processing systemGRANT2005-01-041999-03-0433538841GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US7073198B10.673Method and system for detecting a vulnerability in a networkGRANT2006-07-041999-08-2636613932GoodNcircle Network Security IncTripwire Inc
US7383577B20.672Method and system for encrypted network management and intrusion detectionGRANT2008-06-032002-05-2029423094GoodAirDefense IncExtreme Networks Inc
US9392002B20.670System and method of providing virus protection at a gatewayGRANT2016-07-122002-01-3127609762GoodNokia Technologies OyPiece Future Pte Ltd
US7168093B20.670Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measuresGRANT2007-01-232001-01-2525088850GoodSolutionary IncHERCULES TECHNOLOGY II LP, NTT Security US Inc
US9219755B20.666Malicious mobile code runtime monitoring system and methodsGRANT2015-12-221996-11-0855018096GoodFinjan IncFinjan LLC
US7277404B20.666System and method for sensing wireless LAN activityGRANT2007-10-022002-05-2030119493GoodAirDefense IncExtreme Networks Inc
US8578490B20.665System and method for using timestamps to detect attacksGRANT2013-11-051999-08-3037904356GoodSymantec CorpNortonLifeLock Inc
US7398272B20.664Enterprise consoleGRANT2008-07-082003-03-2433098226GoodBigFix IncInternational Business Machines Corp
US6714513B10.663Enterprise network analyzer agent system and methodGRANT2004-03-302001-12-2131989907GoodNetworks Associates Technology IncMcAfee LLC
US10552603B20.662Malicious mobile code runtime monitoring system and methodsGRANT2020-02-042000-05-1727394815GoodFinjan IncFinjan LLC
US7086089B20.661Systems and methods for network securityGRANT2006-08-012002-05-2029731930GoodAirDefense IncExtreme Networks Inc
US7903549B20.660Content-based policy compliance systems and methodsGRANT2011-03-082002-03-0838049357GoodSecure Computing LLCMcAfee LLC
US7085936B10.658System and method for using login correlations to detect intrusionsGRANT2006-08-011999-08-3036710681GoodSymantec CorpNortonLifeLock Inc
US6119165A0.658Controlled distribution of application programs in a computer networkGRANT2000-09-121997-11-1725519023GoodTrend Micro IncTrend Micro Inc
US7324804B20.657Systems and methods for dynamic sensor discovery and selectionGRANT2008-01-292003-04-2133313477GoodAirDefense IncExtreme Networks Inc
US6996843B10.657System and method for detecting computer intrusionsGRANT2006-02-071999-08-3035734399GoodSymantec CorpNortonLifeLock Inc
US7509675B20.656Non-invasive monitoring of the effectiveness of electronic security servicesGRANT2009-03-242002-05-2940347726GoodAT&T Intellectual Property I LPRPX Corp
US7532895B20.656Systems and methods for adaptive location trackingGRANT2009-05-122002-05-2032830767GoodAirDefense IncExtreme Networks Inc
US6647400B10.655System and method for analyzing filesystems to detect intrusionsGRANT2003-11-111999-08-3029406289GoodSymantec CorpNortonLifeLock Inc
US7340776B20.654Method and system for configuring and scheduling security audits of a computer networkGRANT2008-03-042001-01-3123010780GoodInternational Business Machines CorpFinjan Blue Inc
US7302706B10.654Network-based file scanning and solution delivery in real timeGRANT2007-11-272001-08-3138722094GoodMcAfee LLCMcAfee LLC
US8099758B20.653Policy based composite file system and methodGRANT2012-01-171999-05-1237420699GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030097409A10.653Systems and methods for securing computersAPPLICATION2003-05-222001-10-0525519862GoodBAO TRANRESOLUTE FOCUS LLC
US6799197B10.651Secure method and system for using a public network or email to administer to software on a plurality of client computersGRANT2004-09-282000-08-2932991241GoodNetworks Associates Technology IncMcAfee LLC
WO2004100486A10.648NETWORK INTELLIGENCE SYSTEMAPPLICATION2004-11-182003-05-0833426199Good
US7076650B10.648System and method for selective communication scanning at a firewall and a network nodeGRANT2006-07-111999-12-2436644234GoodMcAfee LLCMcAfee LLC
US20030097588A10.647Method and system for modeling  analysis and display of network security eventsAPPLICATION2003-05-222001-10-2526993249GoodGeneral Dynamics C4 Systems IncGeneral Dynamics Mission Systems Inc
US8677494B20.647Malicious mobile code runtime monitoring system and methodsGRANT2014-03-181997-01-2936642059GoodFinjan IncFinjan LLC
US7673323B10.646System and method for maintaining security in a distributed computer networkGRANT2010-03-021998-10-2841717768GoodBEA Systems IncOracle International Corp
EP1269321B10.646METHOD  AND SYSTEM FOR AN AUTOMATED SCRIPTING SOLUTION FOR ENTERPRISE TESTINGGRANT2008-06-182000-03-2727415181GoodAccenture LLPAccenture LLP
US7359676B20.645Systems and methods for adaptively scanning for wireless communicationsGRANT2008-04-152003-04-2133162442GoodAirDefense IncExtreme Networks Inc
US7003561B10.644System  method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedureGRANT2006-02-212001-06-2935810804GoodMcAfee LLCMcAfee LLC
US20070294369A10.643Event monitoring and managementAPPLICATION2007-12-202003-06-0933555439GoodIndustrial Defender IncLeidos Cyber Inc
US7213265B20.643Real time active network compartmentalizationGRANT2007-05-012000-11-1526939670GoodLockheed Martin CorpLockheed Martin Corp
US8204082B20.641Transparent provisioning of services over a networkGRANT2012-06-192000-06-2341201048GoodCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
US6775657B10.640Multilayered intrusion detection system and methodGRANT2004-08-101999-12-2232825491GoodCisco Technology IncCisco Technology Inc
US7020783B20.638Method and system for overcoming denial of service attacksGRANT2006-03-282000-04-1722729619GoodCircadence CorpSons Of Innovation LLC
US7406713B20.638Systems and methods for distributed network protectionGRANT2008-07-292000-08-1822847504GoodInvicta Networks IncInvicta Networks Inc
US8819285B10.635System and method for managing network communicationsGRANT2014-08-262002-10-0151358741GoodTrustwave Holdings IncTrustwave Holdings Inc, TW Acquisition Inc
US5864683A0.635System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rightsGRANT1999-01-261994-10-1223253318GoodSecure Computing LLCMcAfee LLC
US6253337B10.634Information security analysis systemGRANT2001-06-261998-07-2122239553GoodRaytheon CoCA Inc
US20040030931A10.632System and method for providing enhanced network securityAPPLICATION2004-02-122002-08-1231498185Good
US6182227B10.631Lightweight authentication system and method for validating a server access requestGRANT2001-01-301998-06-2222289767GoodInternational Business Machines CorpTrend Micro Inc
US7269649B10.628Protocol layer-level system and method for detecting virus activityGRANT2007-09-112001-08-3138473348GoodMcAfee LLCMcAfee LLC
US6269456B10.628Method and system for providing automated updating and upgrading of antivirus applications using a computer networkGRANT2001-07-311997-12-3121696973GoodNetwork Associates IncMcAfee LLC
US7089303B20.626Systems and methods for distributed network protectionGRANT2006-08-082000-05-3126902856GoodInvicta Networks IncInvicta Networks Inc
US6304262B10.625Information security analysis systemGRANT2001-10-161998-07-2122239613GoodRaytheon CoCA Inc
US7506360B10.624Tracking communication for determining device statesGRANT2009-03-172002-10-0140434218GoodMirage Networks IncTrustwave Holdings Inc, TW Acquisition Inc
US7197563B20.622Systems and methods for distributed network protectionGRANT2007-03-272001-05-3137420710GoodInvicta Networks IncInvicta Networks Inc
US7640434B20.622Identification of undesirable content in responses sent in reply to a user request for contentGRANT2009-12-292001-05-3127346840GoodTrend Micro IncTrend Micro Inc
US7921450B10.621Security system using indirect key generation from access rules and methods thereforGRANT2011-04-052001-12-1243805960GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US20020087882A10.620Mehtod and system for dynamic network intrusion monitoring detection and responseAPPLICATION2002-07-042000-03-1626885991GoodCounterpane Internet Security IncBT Americas Inc
US5826014A0.620Firewall system for protecting network elements connected to a public networkGRANT1998-10-201996-02-0624385402GoodNetwork Engr SoftwareSCIENTIFIC RESEARCH MANAGEMENT Corp, GraphOn Corp
US10360545B20.620Method and apparatus for accessing secured electronic data off-lineGRANT2019-07-232001-12-1226756098GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US7603710B20.620Method and system for detecting characteristics of a wireless networkGRANT2009-10-132003-04-0333298267GoodNetwork Security Technologies IncOzmo Licensing LLC
US6836794B10.619Method and system for assigning and publishing applicationsGRANT2004-12-281998-09-2133516638GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6070244A0.618Computer network security management systemGRANT2000-05-301997-11-1025512030GoodChase Manhattan Bank NAJPMorgan Chase Bank NA
US20030084323A10.618Network intrusion detection system and methodAPPLICATION2003-05-012001-10-3121700683GoodHewlett Packard CoHewlett Packard Development Co LP
US6983221B20.618Enhanced system  method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment modelGRANT2006-01-032002-11-2732325314GoodTelos CorpTelos Corp
US7886357B20.616Method and system for reducing the false alarm rate of network intrusion detection systemsGRANT2011-02-082002-03-2928675210GoodCisco Technology IncCisco Technology Inc
US6389589B10.615Class store schemaGRANT2002-05-141998-09-2122566388GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7039953B20.615Hierarchical correlation of intrusion detection eventsGRANT2006-05-022001-08-3025478383GoodInternational Business Machines CorpInternational Business Machines Corp
US8046835B20.615Distributed computer network security activity model SDI-SCAMGRANT2011-10-252002-10-2345974139GoodInventship LLCInventship LLC
US20050171737A10.615Method and apparatus for assessing the security of a computer systemAPPLICATION2005-08-041998-06-1522226918GoodDMW WORLDWIDE IncDMW WORLDWIDE Inc, TVIIM LLC
US9444785B20.614Transparent provisioning of network access to an applicationGRANT2016-09-132000-06-2342117405GoodCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
US7681235B20.614Dynamic network protectionGRANT2010-03-162003-05-1933489317GoodRadware LtdRadware Ltd
US7685254B20.612Runtime adaptable search processorGRANT2010-03-232003-06-1038228814GoodBlue Lobster Series 110 Of Allied Security Trust IBlue Lobster Series 110 Of Allied Security Trust I
US6269447B10.611Information security analysis systemGRANT2001-07-311998-07-2122239608GoodRaytheon CoCA Inc
US6577920B10.609Computer virus screeningGRANT2003-06-101998-10-0222598238GoodData Fellows OyjF Secure Oyj
US7134142B20.609System and method for providing exploit protection for networksGRANT2006-11-072001-04-1323087427GoodNokia IncNokia Technologies Oy
US8201249B20.609Steady state computer intrusion and misuse detectionGRANT2012-06-122003-05-1433417369GoodNorthrop Grumman Systems CorpNorthrop Grumman Systems Corp
US7913311B20.608Methods and systems for providing access control to electronic dataGRANT2011-03-222001-12-1226757862GoodGuardian Data Storage LLCSeceretseal Inc, Intellectual Ventures I LLC, Seceretseal Inc
US6980927B20.606Enhanced system  method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessmentGRANT2005-12-272002-11-2732325315GoodTelos CorpTelos Corp
US20030191957A10.606DISTRIBUTED COMPUTER VIRUS DETECTION AND SCANNINGAPPLICATION2003-10-091999-02-1928675126GoodF Secure OyjF Secure Oyj
US6842861B10.605Method and system for detecting viruses on handheld computersGRANT2005-01-112000-03-2424132216GoodNetworks Associates Technology IncMcAfee LLC
US7761605B10.605Embedded anti-virus scanner for a network adapterGRANT2010-07-202001-12-2042332735GoodMcAfee LLCMcAfee LLC
US7483993B20.605Temporal access control for computer virus preventionGRANT2009-01-272001-04-0626723992GoodSymantec CorpNortonLifeLock Inc
US7146642B10.605System  method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate deviceGRANT2006-12-052001-06-2937480748GoodMcAfee LLCMcAfee LLC
US5621889A0.604Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facilityGRANT1997-04-151993-06-099447936GoodAlcatel SAAlcatel SA
US7225467B20.604Active intrusion resistant environment of layered object and compartment keys (airelock)GRANT2007-05-292000-11-1525521208GoodLockheed Martin CorpLockheed Martin Corp
US7603709B20.602Method and apparatus for predicting and preventing attacks in communications networksGRANT2009-10-132001-05-0326836592GoodComputer Associates Think IncCA Inc, Scientific Systems Co Inc, Concord Communications LLC
EP1454247A10.601SYSTEM AND METHOD FOR DOWNLOADING DATA USING A PROXYGRANT2004-09-082001-12-1323334399GoodThomson Licensing SASThomson Licensing SAS
US7010696B10.600Method and apparatus for predicting the incidence of a virusGRANT2006-03-072001-03-3035966415GoodMcAfee LLCMcAfee LLC
US20040203764A10.600Methods and systems for identifying nodes and mapping their locationsAPPLICATION2004-10-142002-06-0333129760GoodAirDefense IncAirDefense Inc
US7103650B10.600Client computer configuration based on server computer updateGRANT2006-09-052000-09-2636939614GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7330908B20.599System and method for processing packets using location and content addressable memoriesGRANT2008-02-122000-06-2335658574GoodCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc, Cloudshield Technologies Inc
US7921288B10.599System and method for providing different levels of key security for controlling access to secured itemsGRANT2011-04-052001-12-1243805941GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US5557742A0.598Method and system for detecting intrusion into and misuse of a data processing systemGRANT1996-09-171994-03-0722772890GoodHaystack Labs IncMcAfee LLC
US20040210654A10.596Systems and methods for determining wireless network topologyAPPLICATION2004-10-212003-04-2133162443GoodAirDefense IncAirDefense Inc
US7591017B20.594Apparatus  and method for implementing remote client integrity verificationGRANT2009-09-152003-06-2433540039GoodNokia IncNokia Technologies Oy
US6574737B10.594System for penetrating computer or computer networkGRANT2003-06-031998-12-2322822173GoodSymantec CorpCA Inc
US7934254B20.594Method and apparatus for providing network and computer system securityGRANT2011-04-261998-12-0926809096GoodInternational Business Machines CorpInternational Business Machines Corp
US7047423B10.594Information security analysis systemGRANT2006-05-161998-07-2136318306GoodComputer Associates Think IncCA Inc
US8918839B20.593System and method for providing multi-location access management to secured itemsGRANT2014-12-232001-12-1244936937GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US7743089B20.592Method and system for dynamic application layer gatewaysGRANT2010-06-221999-10-1346300577GoodIntel CorpIntel Corp
US6965928B10.591System and method for remote maintenance of handheld computersGRANT2005-11-152001-03-0935266494GoodNetworks Associates Technology IncMcAfee LLC
US8407683B20.590Software uninstallation system  method and computer program productGRANT2013-03-261996-06-0724649735GoodMcAfee LLCMcAfee LLC
US5892903A0.589Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication systemGRANT1999-04-061996-09-1224852875GoodInternet Security Systems IncInternational Business Machines Corp
US7469418B10.588Deterring network incursionGRANT2008-12-232002-10-0140134300GoodMirage Networks IncTrustwave Holdings Inc, TW Acquisition Inc
US7320142B10.587Method and system for configurable network intrusion detectionGRANT2008-01-152001-11-0938227158GoodCisco Technology IncCisco Technology Inc
US6134664A0.587Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sourcesGRANT2000-10-171998-07-0622329977GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US5898830A0.586Firewall providing enhanced network security and user transparencyGRANT1999-04-271996-10-1724947298GoodNetwork Engr SoftwareNETWORK ENGINEERING TECHNOLOGIES Inc, GraphOn Corp
US8543827B20.585Methods and systems for providing access control to secured dataGRANT2013-09-242001-12-1226756071GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US8006280B10.585Security system for generating keys from access rules in a decentralized manner and methods thereforGRANT2011-08-232001-12-1244455544GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US7062552B20.584System and method for blocking harmful information online  and computer readable medium thereforGRANT2006-06-131999-12-3126636628GoodInca Internet Co LtdInca Internet Co Ltd
US7496960B10.583Tracking and reporting of computer virus informationGRANT2009-02-242000-10-3040364738GoodTrend Micro IncTrend Micro Inc
US6345386B10.583Method and system for advertising applicationsGRANT2002-02-051998-09-2122570513GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5440723A0.582Automatic immune system for computers and computer networksGRANT1995-08-081993-01-1921712935GoodInternational Business Machines CorpTrend Micro Inc
US7516227B20.582Method and apparatus for network deception/emulationGRANT2009-04-071999-11-1526861507Good
US6772349B10.582Detection of an attack such as a pre-attack on a computer networkGRANT2004-08-032000-05-0332772246Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6044465A0.580User profile storage on and retrieval from a non-native server domain for use in a client running a native operating systemGRANT2000-03-281997-07-0725393782GoodInternational Business Machines CorpInternational Business Machines Corp
US20020199116A10.578System and method for computer network virus exclusionAPPLICATION2002-12-262001-06-2525391923GoodHewlett Packard CoHewlett Packard Development Co LP
US7730169B10.577Business method and system for serving third party software applicationsGRANT2010-06-011999-04-1242200311GoodSoftricity IncMicrosoft Technology Licensing LLC
US7634806B20.577Peer assembly inspectionGRANT2009-12-152002-05-3029582396GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7120933B20.576Method for intrusion detection in a database systemGRANT2006-10-102001-11-238179327GoodProtegrity CorpProtegrity Research & Development, Protegrity Corp
US7917393B20.574Probabilistic alert correlationGRANT2011-03-292000-09-0127403000GoodSRI International IncSRI International Inc
US5940591A0.574Apparatus and method for providing network securityGRANT1999-08-171991-07-1124927638GoodITT CorpRound Rock Research LLC
US7308493B20.573Task-based automatic network management system with distributed control and management information baseGRANT2007-12-112002-06-0529709786GoodTrend Micro IncTrend Micro Inc
US7133365B20.573System and method to provide routing control of information over networksGRANT2006-11-072001-11-0226717576GoodInternap Network Services CorpInternap Holding LLC
US8561167B20.573Web reputation scoringGRANT2013-10-152002-03-0838120100GoodMcAfee LLCMcAfee LLC
US6973578B10.572System  method and computer program product for process-based selection of virus detection actionsGRANT2005-12-062000-05-3135430641GoodNetworks Associates Technology IncMcAfee LLC
US20020116607A10.572Firewall subscription service system and methodAPPLICATION2002-08-222001-02-2025149544GoodInternational Business Machines CorpTrend Micro Inc
US6523166B10.572Method and system for on-demand installation of software implementationsGRANT2003-02-181998-09-2122566381GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8549640B20.571System and method for computer securityGRANT2013-10-011999-07-1426848722GoodSymantec CorpNortonLifeLock Inc
US6789201B20.570Anti-virus toolbar system and method for use with a network browserGRANT2004-09-072001-12-2021841857GoodNetworks Associates Technology IncMcAfee LLC
US7673137B20.568System and method for the managed security control of processes on a computer systemGRANT2010-03-022002-01-0423355018GoodInternational Business Machines CorpTAASERA LICENSING LLC
US7331062B20.568Method  computer software  and system for providing end to end security protection of an online transactionGRANT2008-02-122002-08-3046298964GoodSymantec CorpPanasonic Corp, NortonLifeLock Inc
US7461402B10.568System and method for preventing detection of a selected process running on a computerGRANT2008-12-021999-07-1426841423GoodSymantec CorpCA Inc
US7370071B20.568Method for serving third party software applications from servers to client computersGRANT2008-05-062000-03-1746277625GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6931540B10.567System  method and computer program product for selecting virus detection actions based on a process by which files are being accessedGRANT2005-08-162000-05-3134826281GoodNetworks Associates Technology IncNvidia Corp, McAfee LLC
US6622150B10.566System and method for efficiently managing computer virus definitions using a structured virus databaseGRANT2003-09-162000-12-1827805560GoodNetworks Associates Technology IncMcAfee LLC, Networks Associates Inc
US8694610B20.566Apparatus and method for domain name resolutionGRANT2014-04-082000-06-2335810802GoodCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc, SILICON VALLEY INTERNET CAPITAL Inc
US5919257A0.566Networked workstation intrusion detection systemGRANT1999-07-061997-08-0825424254GoodMicro Focus Software IncRPX Corp
US7277937B20.566Distributed computing using syscall proxyingGRANT2007-10-022002-07-1730116057GoodCore SDI IncHELP/SYSTEMS LLC
US7363655B20.565Computer virus screening methods and systemsGRANT2008-04-221998-02-1221809963GoodAuctnyc 8 LLCIntellectual Ventures I LLC
US7363657B20.565Using a virus checker in one file server to check for viruses in another file serverGRANT2008-04-222001-03-1225188691GoodEMC CorpEMC Corp
US6772345B10.565Protocol-level malware scannerGRANT2004-08-032002-02-0832769701GoodNetworks Associates Technology IncMcAfee LLC
US7437482B20.565Method and apparatus for facilitating client server communications over a networkGRANT2008-10-142000-06-2324410081GoodCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc, SILICON VALLEY INTERNET CAPITAL Inc
US6950845B20.563Data collection system and method for reducing latencyGRANT2005-09-272000-10-2322915967GoodAmdocs Israel LtdAmdocs Development Ltd, Amdocs Israel Ltd
US7194623B10.563Data event logging in computing platformGRANT2007-03-201999-05-288241419GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6859881B20.562Method and system for mapping network attacks onto a strategy gameGRANT2005-02-222001-03-2825226798GoodIntel CorpIntel Corp
US5623601A0.561Apparatus and method for providing a secure gateway for communication and data exchanges between networksGRANT1997-04-221994-11-1825677623GoodMilkway Networks CorpMilkway Networks Corp, RPX Corp
US20030046407A10.561Electronic rights managementAPPLICATION2003-03-062001-08-3025476779GoodSamsung Fine Chemicals Co Ltd, Hewlett Packard CoLotte Fine Chemical Co Ltd, Hewlett Packard Development Co LP
US7836443B20.560Network application apparatusGRANT2010-11-162000-09-2522884848GoodCrossbeam Systems IncCA Inc
US6256668B10.559Method for identifying and obtaining computer software from a network computer using a tagGRANT2001-07-031996-04-1824543580GoodMicrosoft CorpZhigu Holdings Ltd
US8578480B20.559Systems and methods for identifying potentially malicious messagesGRANT2013-11-052002-03-0838832665GoodMcAfee LLCMcAfee LLC
US10374973B20.559Method for managing computer network accessGRANT2019-08-062001-01-2326734183GoodWeserve Access LLCWeserve Access LLC
US5987611A0.559System and methodology for managing internet access on a per application basis for client computers connected to the internetGRANT1999-11-161996-12-3126710397GoodZone Labs IncCheck Point Software Technologies Inc
US20040143753A10.558Network risk analysisAPPLICATION2004-07-222003-01-2132712676GoodSymantec CorpCA Inc
US20020069356A10.557Integrated security gateway apparatusAPPLICATION2002-06-062000-06-1219671747GoodFuture Systems IncFuture Systems Inc
US6918043B20.556Method and system for preventing the downloading and execution of executable objectsGRANT2005-07-121997-03-1011069911GoodComputer Associates Think IncGoogle LLC
US6370578B20.555Active marketing based on client computer configurationsGRANT2002-04-091999-10-2923706777GoodMcAfee com IncMcAfee LLC
US7996902B10.554System and method for certifying that data received over a computer network has been checked for virusesGRANT2011-08-092001-09-2536951988GoodMcAfee LLCMcAfee LLC
US5805801A0.554System and method for detecting and preventing securityGRANT1998-09-081997-01-0925120749GoodInternational Business Machines CorpTrend Micro Inc
US20020184533A10.554System and method for providing network security policy enforcementAPPLICATION2002-12-052001-05-3023132858Good
US6728886B10.553Distributed virus scanning arrangements and methods thereforGRANT2004-04-271999-12-0132108233GoodTrend Micro IncTrend Micro Inc
US20030033541A10.552Method and apparatus for detecting improper intrusions from a network into information systemsAPPLICATION2003-02-132001-08-0725448902GoodInternational Business Machines CorpInternational Business Machines Corp
US20040255151A10.552System and method for enforcing security service level agreementsAPPLICATION2004-12-162003-06-0433510393GoodInternational Business Machines CorpServiceNow Inc
US6973577B10.552System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime stateGRANT2005-12-062000-05-2635430640GoodMcAfee LLCMYCIOCOM, McAfee LLC
US5968177A0.552Method and apparatus for processing administration of a secured communityGRANT1999-10-191997-10-1425489332GoodEntrust LtdEntrust Ltd
US7673343B10.552Anti-virus scanning co-processorGRANT2010-03-022001-07-2641717774GoodMcAfee LLCMcAfee LLC
US7353531B20.551Trusted computing environmentGRANT2008-04-012001-02-239909492GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7086090B10.550Method and system for protecting pervasive devices and servers from exchanging virusesGRANT2006-08-012000-10-2024782862GoodInternational Business Machines CorpTrend Micro Inc
US7155461B20.549Information processing systemGRANT2006-12-262002-12-1732501094GoodHitachi LtdGoogle LLC
US7854005B20.549System and method for generating fictitious content for a computerGRANT2010-12-141999-07-1437037446GoodSymantec CorpNortonLifeLock Inc
US7228565B20.549Event reporting between a reporting computer and a receiving computerGRANT2007-06-052001-05-1525318829GoodMcAfee LLCMcAfee LLC
US7107619B20.549System and method for the detection of and reaction to denial of service attacksGRANT2006-09-122001-08-3132991636GoodInternational Business Machines CorpTrend Micro Inc
US20030196123A10.548Method and system for analyzing and addressing alarms from network intrusion detection systemsAPPLICATION2003-10-162002-03-2928794983GoodCisco Technology IncCisco Technology Inc
US20040103309A10.547Enhanced system  method and medium for certifying and accrediting requirements compliance utilizing threat vulnerability feedAPPLICATION2004-05-272002-11-2732325313GoodTelos CorpTelos Corp
US7159149B20.547Heuristic detection and termination of fast spreading network worm attacksGRANT2007-01-022002-10-2432106976GoodSymantec CorpCA Inc
US6938096B10.546METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED  THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRECTING TO AN OPEN PORTGRANT2005-08-301999-04-1234864173GoodSoftricity IncMicrosoft Technology Licensing LLC
US6418554B10.545Software implementation installer mechanismGRANT2002-07-091998-09-2122566375GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7203959B20.545Stream scanning through network proxy serversGRANT2007-04-102003-03-1432962152GoodSymantec CorpCA Inc
US6154844A0.545System and method for attaching a downloadable security profile to a downloadableGRANT2000-11-281996-11-0825542059GoodFinjan Software LtdFinjan LLC
US20040003286A10.544Distributed threat managementAPPLICATION2004-01-012002-07-0129779495GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8793360B10.543Systems and methods for testing denial of service attacksGRANT2014-07-292003-05-2351212182GoodVerizon Laboratories IncVerizon Patent and Licensing Inc
US5905859A0.542Managed network device security method and apparatusGRANT1999-05-181997-01-0925104723GoodInternational Business Machines CorpTrend Micro Inc
US8707034B10.542Method and system for using remote headers to secure electronic filesGRANT2014-04-222003-05-3050482002GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US7200632B10.542Method and system for serving software applications to client computersGRANT2007-04-031999-04-1237897696GoodSoftricity IncMicrosoft Technology Licensing LLC
US6721721B10.541Virus checking and reporting for computer database search resultsGRANT2004-04-132000-06-1524380807GoodInternational Business Machines CorpTrend Micro Inc
US7231440B10.541System and method for distributing portable computer virus definition records with binary file conversionGRANT2007-06-122000-12-1838120612GoodMcAfee LLCMcAfee LLC
US6404743B10.540Enhanced simple network management protocol (SNMP) for network and systems managementGRANT2002-06-111997-11-0426744239GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US6347375B10.539Apparatus and method for remote virus diagnosis and repairGRANT2002-02-121998-07-0822341765GoodOntrack Data International IncKroll Ontrack Inc
US6584505B10.537Authenticating access to a network server without communicating login information through the network serverGRANT2003-06-241999-07-0823373238GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6971094B10.536Deployed agent used in the installation and maintenance of softwareGRANT2005-11-292000-02-2235405435GoodHewlett Packard Development Co LPMicro Focus LLC
US8185943B10.534Network adapter firewall system and methodGRANT2012-05-222001-12-2046061391GoodMcAfee LLCMcAfee LLC
US7636790B10.533Service-based network packet routing redirection using an address serverGRANT2009-12-222001-10-2541427988GoodSprint Communications Co LPT Mobile Innovations LLC
US8887281B20.533System and methods for adaptive model generation for detecting intrusion in computer systemsGRANT2014-11-112002-01-2538056870GoodColumbia University of New YorkColumbia University of New York
US7865931B10.533Universal authorization and access control security measure for applicationsGRANT2011-01-042002-11-2543385109GoodAccenture Global Services LtdINTERKNOWLOGY LLC, Accenture Global Services Ltd
US5586304A0.532Automatic computer upgradingGRANT1996-12-171994-09-0823170839GoodCompaq Computer CorpHewlett Packard Development Co LP
US7540031B20.532Wireless architecture with malware scanning component manager and associated APIGRANT2009-05-262001-08-0127358127GoodMcAfee LLCMcAfee LLC
US7200866B20.532System and method for defending against distributed denial-of-service attack on active networkGRANT2007-04-032002-11-1432291729GoodElectronics and Telecommunications Research Institute ETRIRPX Corp
US7096501B20.531System  method and computer program product for equipping wireless devices with malware scanning capabilitiesGRANT2006-08-222001-08-0126675596GoodMcAfee LLCMcAfee LLC
US7774835B20.531Method and system for extracting application protocol characteristicsGRANT2010-08-101998-09-0923357098GoodF5 Networks IncF5 Networks Inc
US5919258A0.531Security system and method for computers connected to networkGRANT1999-07-061996-02-0812092194GoodHitachi LtdHitachi Ltd
US7647411B10.530System and method for controlling distribution of network communicationsGRANT2010-01-122001-02-2641479570GoodSymantec CorpTURN TIDE Inc, CA Inc
US20100042565A10.530MEZZAZINE IN-DEPTH DATA ANALYSIS FACILITYAPPLICATION2010-02-182000-09-2541681959GoodCrossbeam Systems IncBlue Coat Systems LLC
US7458094B20.529Intrusion prevention systemGRANT2008-11-252001-06-0625363424GoodScience Applications International Corp SAICLeidos Inc
US6266774B10.528Method and system for securing  managing or optimizing a personal computerGRANT2001-07-241998-12-0822775828GoodMcAfee com CorpMcAfee LLC
US6594686B10.527Obtaining user responses in a virtual execution environmentGRANT2003-07-152000-03-0224058496GoodNetworks Associates Technology IncMcAfee LLC
US8301580B20.526Method and system for managing computer systemsGRANT2012-10-302002-04-1029254450GoodIpVenture IncIpVenture Inc
US6993448B20.525System  method and medium for certifying and accrediting requirements complianceGRANT2006-01-312000-08-0925237184GoodTelos CorpTelos Corp
US8006243B20.524Method and apparatus for remote installation of network drivers and softwareGRANT2011-08-231999-12-0737997861GoodInternational Business Machines CorpInternational Business Machines Corp
US7379891B10.524System and method for reallocating and/or upgrading and/or selling tickets  other event admittance means  goods and/or servicesGRANT2008-05-272000-07-2440589642GoodCallahan Cellular LLCCallahan Cellular LLC
US6789255B10.523Determining update availability via set intersection over a sub-optimal pathwayGRANT2004-09-071997-12-1925540834GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5893083A0.523Methods and apparatus for monitoring events and implementing corrective action in a computer systemGRANT1999-04-061995-03-2426140086GoodHewlett Packard CoQNAP Systems Inc
US20040158741A10.522System and method for remote virus scanning in wireless networksAPPLICATION2004-08-122003-02-0732824022GoodNokia OyjNokia Oyj
US7150045B20.522Method and apparatus for protection of electronic mediaGRANT2006-12-122000-12-1426693555GoodWidevine Technologies IncGoogle LLC
US20050015599A10.522Two-phase hash value matching technique in message protection systemsAPPLICATION2005-01-202003-06-2533540120GoodNokia IncNokia Inc
US20040260754A10.520Systems and methods for mitigating cross-site scriptingAPPLICATION2004-12-232003-06-2033517809GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5983273A0.520Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferencesGRANT1999-11-091997-09-1625461399GoodWebTV Networks IncMicrosoft Technology Licensing LLC
US7930753B20.519Methods and systems for performing security risk assessments of internet merchant entitiesGRANT2011-04-192002-07-0130003312GoodFirst Data CorpFirst Data Corp
US6427140B10.519Systems and methods for secure transaction management and electronic rights protectionGRANT2002-07-301995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7730322B20.518System and method of foiling buffer-overflow and alien-code attacksGRANT2010-06-012002-02-1427626645GoodCloakware CorpIrdeto Canada Corp
US6519703B10.518Methods and apparatus for heuristic firewallGRANT2003-02-112000-04-1424192954GoodBandura Cyber IncBandura Cyber Inc
US6948070B10.518Systems and methods for secure transaction management and electronic rights protectionGRANT2005-09-201995-02-1332686239GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5848246A0.517Object-oriented system  method and article of manufacture for a client-server session manager in an interprise computing framework systemGRANT1998-12-081996-07-0124709597GoodSun Microsystems IncOracle America Inc
US7185332B10.517Multi-tiered incremental software updatingGRANT2007-02-271998-03-2537769802GoodSymantec CorpCA Inc
US7181486B10.517Method and apparatus for remote installation of network drivers and softwareGRANT2007-02-201998-12-0726808782GoodNetwork Ice CorpInternational Business Machines Corp
US20040146006A10.516System and method for internal network data traffic controlAPPLICATION2004-07-292003-01-2432735797GoodDeep Nines IncDeep Nines Inc
US20060178918A10.516Technology sharing during demand and supply planning in a network-based supply chain environmentAPPLICATION2006-08-101999-11-2236781012GoodAccenture LLPAccenture Global Services Ltd
US8204945B20.515Hash-based systems and methods for detecting and preventing transmission of unwanted e-mailGRANT2012-06-192000-06-1946204947GoodStragent LLCStragent LLC
US20020082886A10.513Method and system for detecting unusual events and application thereof in computer intrusion detectionAPPLICATION2002-06-272000-09-0626924282GoodInternational Business Machines CorpTrend Micro Inc
US6477550B10.513Method and system for processing events related to a first type of browser from a second type of browserGRANT2002-11-051999-03-1623029933GoodMcAfee com CorpMcAfee LLC
US6381742B20.512Software package managementGRANT2002-04-301998-06-1922275644GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6851062B20.512System and method for managing denial of service attacksGRANT2005-02-012001-09-2725509398GoodInternational Business Machines CorpInternational Business Machines Corp
US7428585B10.512Local device access controlsGRANT2008-09-232002-07-3139764227GoodAOL IncOath Inc, Meta Platforms Inc
US20020040439A10.512Processes systems and networks for secure exchange of information and quality of service maintenance using computer hardwareAPPLICATION2002-04-041998-11-2427393872Good
US7543333B20.510Enhanced computer intrusion detection methods and systemsGRANT2009-06-022002-04-0828674505GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030217289A10.509Method and system for wireless intrusion detectionAPPLICATION2003-11-202002-05-1729418991GoodNetwork Security Technologies IncOzmo Licensing LLC
US6983325B10.509System and method for negotiating multi-path connections through boundary controllers in a networked computing environmentGRANT2006-01-032000-12-2835509153GoodMcAfee LLCMcAfee LLC
US7380270B20.509Enhanced system  method and medium for certifying and accrediting requirements complianceGRANT2008-05-272000-08-0925484039GoodTelos CorpTelos Corp
US20020199120A10.509Monitored network security bridge system and methodAPPLICATION2002-12-262001-05-0426837605GoodSECURE INTERIORS IncTELSOURCE Corp A NEW JERSEY CORPORATION
US6330715B10.508Method and apparatus for managing software in a network systemGRANT2001-12-111998-05-1922162310GoodNortel Networks LtdRPX Clearinghouse LLC
US7464404B20.508Method of responding to a truncated secure session attackGRANT2008-12-092003-05-2046323195GoodInternational Business Machines CorpTrend Micro Inc
US10033700B20.508Dynamic evaluation of access rightsGRANT2018-07-242001-12-1227372842GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US20040187032A10.507Method  data carrier  computer system and computer progamme for the identification and defence of attacks in server of network service providers and operatorsAPPLICATION2004-09-232001-08-0732968438GoodRECHTSANWALT KARL-HEINRICH LORENZIP-ONLINE GmbH, RECHTSANWALT KARL-HEINRICH LORENZ, IP-ONLINE GmbH
US7337219B10.507Classifying devices using a local proxy serverGRANT2008-02-262003-05-3039103732GoodAOL IncCallahan Cellular LLC
US7457951B10.506Data integrity monitoring in trusted computing entityGRANT2008-11-251999-05-288241420GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6185678B10.505Secure and reliable bootstrap architectureGRANT2001-02-061997-10-0226740463GoodUniversity of Pennsylvania PennREMBRANDT PATENT INNOVATIONS LLC, University of Pennsylvania Penn
US7426543B20.504Accessing data stored in multiple locationsGRANT2008-09-162003-04-2533298971GoodSAP SE SAP SE
US6678731B10.504Controlling access to a network server using an authentication ticketGRANT2004-01-131999-07-0829780487GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7093297B20.502Method and apparatus for monitoring a network data processing systemGRANT2006-08-152002-06-2729779704GoodInternational Business Machines CorpInternational Business Machines Corp
US7013394B10.502Data flow pattern recognition and manipulationGRANT2006-03-142000-04-1835998925GoodInternational Business Machines CorpTrend Micro Inc
US6321258B10.502Administration of networked peripherals using particular file systemGRANT2001-11-201997-12-1125534543GoodHewlett Packard CoHewlett Packard Development Co LP
US6681331B10.502Dynamic software system intrusion detectionGRANT2004-01-201999-05-1123199550GoodCylant IncStrataCloud Inc
US7310818B10.502System and method for tracking computer virusesGRANT2007-12-182001-10-2538826029GoodMcAfee LLCMcAfee LLC
US6922831B10.501Method and system for providing software utilizing a restore medium and a networkGRANT2005-07-261998-06-0434753587GoodGateway IncGateway Inc
US9361243B20.501Method and system for providing restricted access to a storage mediumGRANT2016-06-071998-07-3148871343GoodKOM Networks IncKom Software Inc
US7469419B20.501Detection of malicious computer codeGRANT2008-12-232002-10-0732042651GoodSymantec CorpNortonLifeLock Inc
US7617526B20.501Blocking of spam e-mail at a firewallGRANT2009-11-102003-05-2046322846GoodInternational Business Machines CorpTrend Micro Inc
US7062782B10.500Overlay network for tracking denial-of-service floods in unreliable datagram delivery networksGRANT2006-06-131999-12-2223864045GoodUunet Technologies IncPalo Alto Networks Inc
US6532491B10.499Processes and apparatuses for managing network devicesGRANT2003-03-111997-03-2425241944GoodMicro Focus Software IncRPX Corp
US7506069B20.499Accessing data in a computer networkGRANT2009-03-172003-04-2533298970GoodSAP SE SAP SE
US7346929B10.498Method and apparatus for auditing network securityGRANT2008-03-181999-07-2939182371GoodInternational Business Machines CorpFinjan Blue Inc
US7464410B10.498Protection against flooding of a serverGRANT2008-12-092001-08-3040090695GoodAT&T CorpAT&T Intellectual Property II LP
US20040015718A10.498Framework for collaborative suppression of undesirable computer activityAPPLICATION2004-01-222002-07-2230442193GoodHostSentinel IncHostSentinel Inc
US7152104B20.497Method and apparatus for notifying administrators of selected events in a distributed computer systemGRANT2006-12-192001-10-1725528581GoodSun Microsystems IncOracle America Inc
US7380277B20.497Preventing e-mail propagation of malicious computer codeGRANT2008-05-272002-07-2230002761GoodSymantec CorpCA Inc
US7171493B20.497Camouflage of network traffic to resist attackGRANT2007-01-302001-12-1921823594GoodCharles Stark Draper Laboratory IncCharles Stark Draper Laboratory Inc
US6557054B20.497Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user stationGRANT2003-04-291994-05-3122953138GoodTmi Solutions LLCTmi Solutions LLC
US20030172155A10.496Cracker tracing system and method  and authentification system and method of using the sameAPPLICATION2003-09-112001-05-0919709684GoodTRIOPS CORPTRIOPS CORP
US7421738B20.495Skeptical systemGRANT2008-09-022002-11-2532324956GoodHoneywell International IncHoneywell International Inc
US6327617B10.495Method and system for identifying and obtaining computer software from a remote computerGRANT2001-12-041995-11-2724248391GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6930978B20.494System and method for traffic management control in a data transmission networkGRANT2005-08-162000-05-1725365584GoodDeep Nines IncTrend Micro Inc
US6148339A0.493Health check system in network control system utilizing CORBA's event serviceGRANT2000-11-141997-04-0913997656GoodNEC CorpNEC Corp
US7367063B10.492Methods and apparatus for providing security to a computerized deviceGRANT2008-04-292002-09-1739321787GoodCisco Technology IncCisco Technology Inc
US20040024864A10.491User  process  and application tracking in an intrusion detection systemAPPLICATION2004-02-052002-07-3131187089GoodSRI International IncSRI International Inc
US6895425B10.491Using an expert proxy server as an agent for wireless devicesGRANT2005-05-172000-10-0624746511GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7401141B20.491Method and system for monitoring performance of distributed applicationsGRANT2008-07-152003-01-0734072696GoodInternational Business Machines CorpMeta Platforms Inc
US6973075B10.490Computer program and method for modifying data tables in a telecommunications switchGRANT2005-12-062000-10-0335430522GoodSprint Spectrum LPSprint Spectrum LP
US7383339B10.490Local proxy server for establishing device controlsGRANT2008-06-032002-07-3139466611GoodAOL IncGoogle LLC
US5781703A0.489Intelligent remote agent for computer performance monitoringGRANT1998-07-141996-09-0624844940GoodCandle Distributed Solutions IncCisco Technology Inc
US7203963B10.489Method and apparatus for adaptively classifying network trafficGRANT2007-04-102002-06-1337904357GoodMcAfee LLCMcAfee LLC
US20050289651A10.488Access method and device for securing access to information systemAPPLICATION2005-12-292002-12-0232309909Good
US7690039B20.488Method and apparatus for content protection in a secure content delivery systemGRANT2010-03-301998-11-1632684475GoodSoftricity IncMicrosoft Technology Licensing LLC
US5796942A0.488Method and apparatus for automated network-wide surveillance and security breach interventionGRANT1998-08-181996-11-2125013375GoodComputer Associates International IncCA Inc
US6360366B10.487Systems and methods for automatic application version upgrading and maintenanceGRANT2002-03-191996-09-0524842436GoodManageSoft CorpFlexera Software LLC
US20030020948A10.485Dynamically loaded applications in a printerAPPLICATION2003-01-302001-07-2725438869GoodHewlett Packard CoHewlett Packard Development Co LP
US7640361B10.484Systems and methods for converting infected electronic files to a safe formatGRANT2009-12-292001-08-2441433110GoodMcAfee LLCMcAfee LLC
US6301699B10.483Method for detecting buffer overflow for computer securityGRANT2001-10-091999-03-1826680349GoodCorekt Security Systems IncENTERCEPT SECURITY TECHNOLOGIES Inc, McAfee LLC
US5798706A0.482Detecting unauthorized network communicationGRANT1998-08-251996-06-1824669525GoodRaptor Systems IncNortonLifeLock Inc
US8219496B20.482Method of and apparatus for ascertaining the status of a data processing environmentGRANT2012-07-102001-02-239909494GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6266773B10.482Computer security systemGRANT2001-07-241998-12-3122838053GoodIntel CorpIntel Corp
US6748540B10.481Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing systemGRANT2004-06-081999-06-1732326050GoodInternational Business Machines CorpInternational Business Machines Corp
US6314451B10.481Ad controller for use in implementing user-transparent network-distributed advertising and for interstitially displaying an advertisement so distributedGRANT2001-11-061998-05-1526763158GoodUnicast Communications CorpAndreas Acquisition LLC
EP1280040A20.481Centrally managed virus scanning systemGRANT2003-01-292001-07-2625431845GoodNetworks Associates Technology IncNetworks Associates Technology Inc
US7380272B20.481System and method for detecting and eliminating IP spoofing in a data transmission networkGRANT2008-05-272000-05-1727765212GoodDeep Nines IncTrend Micro Inc
US7631353B20.481Blocking replication of e-mail wormsGRANT2009-12-082002-12-1732507261GoodSymantec CorpCA Inc
US6769009B10.479Method and system for selecting a personalized set of information channelsGRANT2004-07-271994-05-3141059773GoodTELESHUTTLE TECHNOLOGIES LLCTmi Solutions LLC
US7707641B20.479Method and apparatus for secure content delivery over broadband access networksGRANT2010-04-271998-11-1636045753GoodSoftricity IncMicrosoft Technology Licensing LLC
US7877807B20.476Method of and system for  processing emailGRANT2011-01-252000-07-079895305GoodSymantec CorpCA Inc
US20010020272A10.476Method and system for caching virus-free file certificatesAPPLICATION2001-09-062000-01-068174204GoodAkara Corp, International Business Machines CorpAkara Corp, Trend Micro Inc
US6449642B20.475Method and system for integrating a client computer into a computer networkGRANT2002-09-101998-09-1522547069GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7349929B20.475Accessing data based on user identityGRANT2008-03-252003-04-2533298979GoodSAP SE SAP SE
US7870203B20.474Methods and systems for exposing messaging reputation to an end userGRANT2011-01-112002-03-0838832669GoodMcAfee LLCMcAfee LLC
US6006264A0.474Method and system for directing a flow between a client and a serverGRANT1999-12-211997-08-0126728367GoodArrowpoint Communications IncCisco Technology Inc
US7117355B20.473System and method for providing computer upgrade informationGRANT2006-10-032002-10-1531977995GoodUpgradedetect IncRPX Corp
US7848948B20.473Internet-based product brand marketing communication network configured to allow members of a product brand management team to communicate directly with consumers browsing HTML-encoded pages at an electronic commerce (EC) enabled web-site along the fabric of the world wide web (WWW)  using programable multi-mode virtual kiosks (MMVKS) driven by server-side components and managed by product brand management team membersGRANT2010-12-071996-10-2533556455GoodIPF IncIPF Inc
US6324693B10.472Method of synchronizing independently distributed software and database schemaGRANT2001-11-271997-03-1221911513GoodSiebel Systems IncOracle America Inc
US7441710B20.470System and method for finding and serving consumer product related information to consumers using internet-based information servers and clientsGRANT2008-10-281996-10-2527560263GoodIPF IncIPF Inc
US20030061513A10.469Method and apparatus for detecting denial-of-service attacks using kernel execution profilesAPPLICATION2003-03-272001-09-2725510655GoodNetworks Associates Technology IncMcAfee LLC
US7921284B10.468Method and system for protecting electronic data in enterprise environmentGRANT2011-04-052001-12-1243805940GoodGuardian Data Storage LLCIntellectual Ventures I LLC, PERVASIVE SECURITY SYSTEM Inc
US5774668A0.468System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancingGRANT1998-06-301995-06-0723877023GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6625581B10.467METHOD OF AND SYSTEM FOR ENABLING THE ACCESS OF CONSUMER PRODUCT RELATED INFORMATION AND THE PURCHASE OF CONSUMER PRODUCTS AT POINTS OF CONSUMER PRESENCE ON THE WORLD WIDE WEB (WWW) AT WHICH CONSUMER PRODUCT INFORMATION REQUEST (CPIR) ENABLING SERVLET TAGS ARE EMBEDDED WITHIN HTML-ENCODED DOCUMENTSGRANT2003-09-231996-10-2532777422GoodIPF IncIPF Inc
US5696701A0.467Method and system for monitoring the performance of computers in computer networks using modular extensionsGRANT1997-12-091996-07-1224724331GoodElectronic Data Systems LLCHewlett Packard Enterprise Development LP
US6742141B10.467System for automated problem detection  diagnosis  and resolution in a software driven systemGRANT2004-05-251999-05-1032314284GoodHandsFree Networks IncHfn LLC
US7353280B20.466Home-networkingGRANT2008-04-012000-03-1722699551GoodAOL IncOath Inc, Meta Platforms Inc
US6338141B10.466Method and apparatus for computer virus detection  analysis  and removal in real timeGRANT2002-01-081998-09-3022589140GoodCybersoft IncCYBERSOFT IP LLC, JATCO Corp
US7181768B10.466Computer intrusion detection system and method based on application monitoringGRANT2007-02-201999-10-2837745155GoodCigital IncSynopsys Inc
US7263561B10.465Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipientGRANT2007-08-282001-08-2438433231GoodMcAfee LLCMcAfee LLC
US20030051195A10.463Systems and methods for isolating faults in computer networksAPPLICATION2003-03-132000-05-0527394406GoodConcord Communications LLCCA Inc
US6052531A0.461Multi-tiered incremental software updatingGRANT2000-04-181998-03-2521951915GoodSymantec CorpCA Inc
US6961712B10.460Consumer product information request (CPIR) enabling servlets and web-based consumer product information catalogs employing the sameGRANT2005-11-011996-10-2528795468GoodIPF IncIPF Inc
US7788718B10.460Method and apparatus for detecting a distributed denial of service attackGRANT2010-08-312002-06-1342646801GoodMcAfee LLCMcAfee LLC
US8549611B20.459Systems and methods for classification of messaging entitiesGRANT2013-10-012002-03-0835600962GoodMcAfee LLCMcAfee LLC
US6161218A0.458Software patch architectureGRANT2000-12-121996-01-1624349174GoodSun Microsystems IncSun Microsystems Inc
US7237008B10.458Detecting malware carried by an e-mail messageGRANT2007-06-262002-05-1038178870GoodMcAfee LLCMcAfee LLC
US7904333B10.458Web-based electronic commerce (EC) enabled shopping network configured to allow members of a consumer product management team and authorized parties to communicate directly with consumers shopping at EC-enabled websites along the world wide web (WWW)  using multi-mode virtual kiosks (MMVKS) driven by server-side components and managed by product team membersGRANT2011-03-081996-10-2527569772GoodIPF IncIPF Inc
US8176334B20.458Document security system that permits external users to gain access to secured filesGRANT2012-05-082002-09-3032030168GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US7516094B20.458Internet-based system for managing and delivering consumer product information to consumers at web-based retailer store sites on the world wide web (WWW)  using consumer product information (CPI) requesting and graphical user interface (GUI) display subsystems  driven by server-side components embodying universal product numbers (UPNs) and driven by UPN/URL links managed by product manufacturer team members and/or their agentsGRANT2009-04-071996-10-2527501370GoodIPF IncIPF Inc
US5812763A0.457Expert system having a plurality of security inspectors for detecting security flaws in a computer systemGRANT1998-09-221988-02-1722563831GoodDigital Equipment CorpHewlett Packard Development Co LP
US6901346B20.457System  method and medium for certifying and accrediting requirements complianceGRANT2005-05-312000-08-0946204042GoodTelos CorpTelos Corp
US6347398B10.456Automatic software downloading from a computer networkGRANT2002-02-121996-12-1225069524GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7711598B20.456Web-based consumer product marketing communication network for managing and delivering consumer product marketing communications to consumers along e-commerce (EC) enabled web sites on the world wide web (WWW)  using multi-mode virtual kiosks (MMVKS) driven by server=side components embodying consumer product identifiers and driven by consumer product information (CPI) links managed by product manufacturer team members and/or their agentsGRANT2010-05-041996-10-2546280287GoodIPF IncIPF Inc
US7032026B10.456Method and apparatus to facilitate individual and global lockouts to network applicationsGRANT2006-04-182001-08-3136147561GoodOracle International CorpOracle International Corp
US6883019B10.455Providing information to a communications deviceGRANT2005-04-192000-05-0824263657GoodIntel CorpIntel Corp
US6499109B10.455Method and apparatus for securing software distributed over a networkGRANT2002-12-241998-12-0846276324GoodNetworks Associates Technology IncMcAfee LLC
USRE43906E10.455Method and apparatus for securing digital assetsGRANT2013-01-012001-12-1227372550GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US6931552B20.454Apparatus and method for protecting a computer system against computer viruses and unauthorized accessGRANT2005-08-162001-05-0225301419GoodJSM TECHNOLOGIES LLCJSM TECHNOLOGIES LLC
EP1335564A20.454Communication system and communication methodGRANT2003-08-132002-02-0827606528GoodToshiba CorpToshiba Corp
US6851061B10.454System and method for intrusion detection data collection using a network protocol stack multiplexorGRANT2005-02-012000-02-1634082648GoodNetworks Associates IncNetworks Associates Technology Inc, McAfee LLC
US6119236A0.454Intelligent network security device and methodGRANT2000-09-121996-10-0726904760GoodSHIPLEY/LAWFINANCE GROUP PATENT JUSTICE LLCENHANCED SECURITY RESEARCH LLC
US9848031B20.453Application server for delivering applets to client computing devices in a distributed environmentGRANT2017-12-191998-03-1821914010GoodIMPLICIT LLCIMPLICIT LLC
US6971019B10.451Histogram-based virus detectionGRANT2005-11-292000-03-1424090930GoodSymantec CorpCA Inc
US8132250B20.450Message profiling systems and methodsGRANT2012-03-062002-03-0836337023GoodMcAfee LLCMcAfee LLC
US6496977B10.450Method and system for implementing network filesystem-based aid for computer operating system upgradesGRANT2002-12-171999-10-2123674554GoodInternational Business Machines CorpInternational Business Machines Corp
US6353926B10.449Software update notificationGRANT2002-03-051998-07-1522362618GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7797251B20.449System and method providing secure credit or debit transactions across unsecure networksGRANT2010-09-142001-02-1439686702Good5th Fleet LLC5th Fleet LLC
US8443441B20.448System and methods for detecting malicious email transmissionGRANT2013-05-142001-08-1642286554GoodColumbia University of New YorkColumbia University of New York
US7197639B10.448Cryptographic countermeasures against connection depletion attacksGRANT2007-03-271999-02-0537886211GoodRSA Security LLCEMC Corp
US7949722B10.448Enhanced video programming system and method utilizing user-profile informationGRANT2011-05-241999-09-2923619910GoodACTV IncOpenTV Inc
US7475293B10.448Product check matrixGRANT2009-01-062000-08-0446205000GoodSun Microsystems IncOracle America Inc
US20030220817A10.447System and method of formulating appropriate subsets of information from a patient's computer-based medical record for release to various requesting entitiesAPPLICATION2003-11-272002-05-1529553508GoodEpic Systems CorpEpic Systems Corp
US7685287B20.447Method and system for layering an infinite request/reply data stream on finite  unidirectional  time-limited transportsGRANT2010-03-232002-05-3029582622GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7146535B20.446Product knowledge managementGRANT2006-12-052000-08-0446204670GoodSun Microsystems IncOracle America Inc
US6892237B10.446Method and apparatus for high-speed parsing of network messagesGRANT2005-05-102000-03-2834549624GoodCisco Technology IncCisco Technology Inc
US7900044B20.445Enterprise computer investigation systemGRANT2011-03-012002-06-2029734133GoodGuidance Software IncOpen Text Holdings Inc
US7925888B10.445Data driven detection of virusesGRANT2011-04-121999-11-3034078985GoodSymantec CorpCA Inc
US6664988B10.443Graphical representation of system information on a remote computerGRANT2003-12-161999-02-1029711640GoodMicron Technology IncRound Rock Research LLC, Mei California Inc
US5978842A0.442Distributed-client change-detection tool with change-detection augmented by multiple clientsGRANT1999-11-021997-01-1446253550GoodNetMind Technologies IncNetMind Technologies Inc
US20020171546A10.441Universal  customizable security system for computers and other devicesAPPLICATION2002-11-212001-04-1823090570GoodCaveo Tech LLCCaveo Tech LLC
US6802061B10.440Automatic software downloading from a computer networkGRANT2004-10-051996-12-1233032661GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5961644A0.440Method and apparatus for testing the integrity of computer security alarm systemsGRANT1999-10-051997-09-1925464314GoodInternational Business Machines CorpInternational Business Machines Corp
US7017187B10.439Method and system for file blocking in an electronic messaging systemGRANT2006-03-212000-06-2036045752GoodCitigroup Global Markets IncCitigroup Global Markets Inc
US6687735B10.438Method and apparatus for balancing distributed applicationsGRANT2004-02-032000-05-3024331543GoodTranceive Tech IncTranceive Tech Inc
US6553507B10.438Just-in-time software updatesGRANT2003-04-221998-09-3022590824GoodIntel CorpIntel Corp
US7478136B20.438Terminal and repeaterGRANT2009-01-132000-12-1118845464GoodNTT Docomo IncNTT Docomo Inc
US7930756B10.438Multi-level cryptographic transformations for securing digital assetsGRANT2011-04-192001-12-1243858766GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US5696822A0.437Polymorphic virus detection moduleGRANT1997-12-091995-09-2824133756GoodSymantec CorpNortonLifeLock Inc
US7904955B10.437Method and apparatus for detecting shellcodeGRANT2011-03-082002-06-1343639431GoodMcAfee LLCMcAfee LLC
US6370648B10.435Computer network intrusion detectionGRANT2002-04-091998-12-0822775286GoodVisa International Service AssociationVisa International Service Association
US7043758B20.435Scanning computer files for specified contentGRANT2006-05-092001-06-1525377691GoodMcAfee LLCMcAfee LLC
WO2000010093A10.435SYSTEM AND METHOD FOR ANALYZING WEB-SERVER LOG FILESAPPLICATION2000-02-241998-08-1122453317Good
US20020178264A10.434Secure creation and distribution of instructions to uniquely support network applicationsAPPLICATION2002-11-282001-03-2725222482GoodiSource Concepts InciSource Concepts Inc
US7308716B20.434Applying blocking measures progressively to malicious network trafficGRANT2007-12-112003-05-2033450122GoodInternational Business Machines CorpTrend Micro Inc
US7100083B20.432Checks for product knowledge managementGRANT2006-08-292000-08-0446204668GoodSun Microsystems IncOracle America Inc
US7778660B20.432Mobile communications terminal  information transmitting system and information receiving methodGRANT2010-08-172002-01-1719191477GoodNTT Docomo IncNTT Docomo Inc
US20030061073A10.431Method and system for displaying patient informationAPPLICATION2003-03-272001-08-0126904233GoodEpic Systems CorpEpic Systems Corp
US9239924B20.431Identifying and characterizing electronic files using a two-stage calculationGRANT2016-01-191999-04-3034753857GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US7100082B20.431Check creation and maintenance for product knowledge managementGRANT2006-08-292000-08-0446204669GoodSun Microsystems IncOracle America Inc
US7146536B20.431Fact collection for product knowledge managementGRANT2006-12-052000-08-0446204667GoodSun Microsystems IncOracle America Inc
US6983380B20.429Automatically generating valid behavior specifications for intrusion detectionGRANT2006-01-032001-02-0625113940GoodNetworks Associates Technology IncMcAfee LLC, Network Associates Inc
US8316003B20.428Updating content of presentation vehicle in a computer networkGRANT2012-11-202002-11-0533313366GoodCarhamm Ltd LLCGula Consulting LLC
US6289510B10.428Online program-updating system and computer-readable recording medium storing a program-updating programGRANT2001-09-111998-03-1213161371GoodFujitsu LtdFujitsu Ltd
US5491791A0.428System and method for remote workstation monitoring within a distributed computing environmentGRANT1996-02-131995-01-1323469634GoodInternational Business Machines CorpRaritan Computer Inc
US6735766B10.426Method and computer-readable medium for installing an upgrade to an application programGRANT2004-05-111999-03-0332228724GoodMicrosoft CorpZhigu Holdings Ltd
WO2000077967A20.426INTELLIGENTLY AUGMENTABLE WEB PROXY SERVER WITH PER-USER CUSTOMIZATION CAPABILITYAPPLICATION2000-12-211999-06-1523304353Good
US7076499B20.425Method and apparatus for multiple agent commitment tracking and notificationGRANT2006-07-111998-04-3022101517GoodGenesys Telecommunications Laboratories IncGenesys Telecommunications Laboratories Inc
US8225397B10.425Detection of observers and countermeasures against observersGRANT2012-07-172000-01-2743708246GoodTrapware CorpTrapware Corp
US5754830A0.424Server and web browser terminal emulator for persistent connection to a legacy host system and method of operationGRANT1998-05-191996-04-0124504628GoodOpenconnect Systems IncOpenconnect Systems Inc
US7844492B20.424Internet-based E-commerce network for enabling commission-based E-commerce transactions along the fabric of the world wide web (WWW) using server-side driven multi-mode virtual kiosks (MMVKS) and transaction and commission tracking serversGRANT2010-11-301999-11-1738846318GoodIPF IncBKS Networks Inc
US7418729B20.423Heuristic detection of malicious computer code by page trackingGRANT2008-08-262002-07-1930448086GoodSymantec CorpCA Inc
US7415504B20.422System and method for controlling distribution of network communicationsGRANT2008-08-192001-02-2623035939GoodSymantec CorpTRUNTIDE Inc, CA Inc
US6163844A0.421Method for granting accesses to information in a distributed computer systemGRANT2000-12-191997-03-068226560GoodSoftware and Systems Engr LtdInfineon Technologies AG
US6823460B10.421Method and system for intercepting an application program interfaceGRANT2004-11-231999-11-1433428271GoodNetworks Associates Technology IncMcAfee LLC
US7093239B10.420Computer immune system and method for detecting unwanted code in a computer systemGRANT2006-08-152000-07-1426912956GoodInternet Security Systems IncPalo Alto Networks Inc
US20020032754A10.420Method and apparatus for profiling in a distributed application environmentAPPLICATION2002-03-142000-04-0526890559GoodTRANCEIVE TECHNOLOGIES IncTRANCEIVE TECHNOLOGIES Inc
US7386238B20.419Method and system for infrared data communicationsGRANT2008-06-102000-08-1527539890GoodLockheed Martin CorpLockheed Martin Corp
WO1993025024A10.418COMPUTER VIRUS MONITORING SYSTEMAPPLICATION1993-12-091992-05-2625394151Good
US8218765B20.418Information systemGRANT2012-07-102001-02-239909412GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20050010475A10.418Internet-based brand management and marketing communication instrumentation network for deploying  installing and remotely programming brand-building server-side driven multi-mode virtual Kiosks on the World Wide Web (WWW)  and methods of brand marketing communication between brand marketers and consumers using the sameAPPLICATION2005-01-131996-10-2546301672GoodIPF IncIPF Inc
US20040210479A10.416Internet-based brand marketing communication instrumentation network for deploying  installing and remotely programming brand-building server-side driven multi-mode virtual kiosks on the World Wide Web (WWW)  and methods of brand marketing communication between brand marketers and consumers using the sameAPPLICATION2004-10-211996-10-2533569092GoodIPF IncIPF Inc
US7577998B10.416Method of detecting critical file changesGRANT2009-08-182001-11-1640942784GoodHewlett Packard Development Co LPValtrus Innovations Ltd, Hewlett Packard Enterprise Development LP
US7114185B20.416Identifying malware containing computer files using embedded textGRANT2006-09-262001-12-2621826676GoodMcAfee LLCMcAfee LLC
US8176551B10.415Detection of observer programs and countermeasures against observer programsGRANT2012-05-082000-01-2746002228GoodTrapware CorpTrapware Corp
US6892219B10.415System and method for ascertaining an displaying connection-related performance data in networksGRANT2005-05-101998-03-307862755GoodInternational Business Machines CorpInternational Business Machines Corp
WO2001037095A10.415METHOD AND SYSTEM FOR INTERCEPTING AN APPLICATION PROGRAM INTERFACEAPPLICATION2001-05-251999-11-1472714002Good
US6904457B20.414Automatic firmware update of processor nodesGRANT2005-06-072001-01-0525040825GoodInternational Business Machines CorpInternational Business Machines Corp
US20020147780A10.413Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gatewayAPPLICATION2002-10-102001-04-0925261121GoodGALLANTRY TECHNOLOGIES Inc A Corp OF CALIFORNIAGALLANTRY TECHNOLOGIES Inc A Corp OF CALIFORNIA
US6952776B10.412Method and apparatus for increasing virus detection speed using a databaseGRANT2005-10-041999-09-2235005228GoodInternational Business Machines CorpTrend Micro Inc
US20030048468A10.411Method of virus filtering for use in peripherals having embedded controller devicesAPPLICATION2003-03-132001-09-0725488283GoodHewlett Packard CoHewlett Packard Development Co LP
US20030126049A10.410Programmed assessment of technological  legal and management risksAPPLICATION2003-07-032001-12-3121885392Good
US7215887B20.409Method and apparatus for infrared data communicationGRANT2007-05-082000-08-1522844520GoodLockheed Martin CorpLockheed Martin Corp
US5522070A0.409Computer resource distributing method and system for distributing a multiplicity of processes to a plurality of computers connected in a networkGRANT1996-05-281992-03-1926404900GoodFujitsu LtdFujitsu Ltd
US9374405B20.408Digital video system using networked camerasGRANT2016-06-212000-03-1422696189GoodJDS TECHNOLOGIES IncJDS TECHNOLOGIES Inc
US5473769A0.407Method and apparatus for increasing the speed of the detecting of computer virusesGRANT1995-12-051992-03-3027127553GoodMcAfee LLCLegerity Inc
US6237144B10.407Use of relational databases for software installationGRANT2001-05-221998-09-2122566781GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6769066B10.407Method and apparatus for training a neural network model for use in computer network intrusion detectionGRANT2004-07-271999-10-2523693679GoodVisa International Service AssociationVisa International Service Association
US8689238B20.405Techniques for displaying impressions in documents delivered over a computer networkGRANT2014-04-012000-05-1827498586GoodCarhamm Ltd LLCGula Consulting LLC
US20040210773A10.403System and method for network securityAPPLICATION2004-10-212003-04-1633162308Good
US6968461B10.402Providing break points in a malware scanning operationGRANT2005-11-222000-10-0335345092GoodNetworks Associates Technology IncNETWORK ASSOCIATES TECNNOLOGY Inc, McAfee LLC
US20020194081A10.402Internet-based consumer service brand marketing communication system which enables service-providers  retailers  and their respective agents and consumers to carry out service-related functions along the demand side of the retail chain in an integrated mannerAPPLICATION2002-12-191999-04-2146278745Good
US7146643B20.400Intrusion detection acceleratorGRANT2006-12-052002-10-2932111027GoodLockheed Martin CorpLockheed Martin Corp
US6460175B10.400Program product for modular  parallel  remote software installation with repeatable  externally-invocable stepsGRANT2002-10-011997-07-1825407066GoodInternational Business Machines CorpLinkedIn Corp
US20030212902A10.400Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machineAPPLICATION2003-11-132002-05-1329400457GoodvCIS IncPalo Alto Networks Inc
US5495521A0.399Method and means for preventing fraudulent use of telephone networkGRANT1996-02-271993-11-1222545338GoodAT&T CorpAT&T Corp
US5638509A0.398Data storage and protection systemGRANT1997-06-101994-06-1026946612GoodExabyte CorpExabyte Corp
US6725452B10.397Method for resolving dependency conflicts among multiple operative entities within a computing environmentGRANT2004-04-202000-06-0124342561GoodAduva IncOracle America Inc
US5347632A0.397Reception system for an interactive computer network and method of operationGRANT1994-09-131988-07-1526914408GoodProdigy Services CoPRIODGY SERVICES COMPANY A NY PARTNERSHIP, International Business Machines Corp
US8266296B20.396Application-layer evaluation of communications received by a mobile deviceGRANT2012-09-111998-10-0722608443GoodEast Texas Tech Partners LPCommunication Interface Technologies LLC
US5845070A0.396Security system for internet provider transactionGRANT1998-12-011996-12-1825085906GoodAuric Web Systems IncGUYZAR LLC
US7373519B10.395Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysisGRANT2008-05-132003-04-0939361730GoodSymantec CorpCA Inc
US7966374B20.395Adaptive media messaging  such as for rich media messages incorporating digital contentGRANT2011-06-212002-07-0130772951GoodProfiliq Software IncProfiliq Software Inc, Prolifiq Software Inc
US6920631B20.395Software installation and validation using custom actionsGRANT2005-07-191998-09-2122565236GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6802012B10.395Scanning computer files for unwanted propertiesGRANT2004-10-052000-10-0333030250GoodNetworks Associates Technology IncMcAfee LLC
US7146640B20.395Personal computer internet security systemGRANT2006-12-052002-09-0534312662GoodEXOBOX TECHNOLOGIES CORPBURNT HICKORY COMPANY LLC
US20030041250A10.394Privacy of data on a computer platformAPPLICATION2003-02-272001-07-279919388GoodHewlett Packard CoHewlett Packard Development Co LP
US6324691B10.394Manufacture of software distribution media packages from components resident on a remote server sourceGRANT2001-11-271998-11-1222704781GoodHewlett Packard CoHTC Corp
US8769680B20.394Alert passwords for detecting password attacks on systemsGRANT2014-07-012003-06-1233511016GoodInternational Business Machines CorpInternational Business Machines Corp
US20030097378A10.392Method and system for removing text-based virusesAPPLICATION2003-05-222001-11-2025534301GoodNetworks Associates Technology IncNetworks Associates Technology Inc
US6685090B20.391Apparatus and method for multi-profile managing and recording medium storing multi-profile managing programGRANT2004-02-032000-05-2418657798GoodFujitsu LtdFujitsu Ltd
US20030079136A10.390Security frameworkAPPLICATION2003-04-242001-08-2126871705GoodNasdaq Stock Market IncNasdaq Inc
US9306966B20.390Methods of unsupervised anomaly detection using a geometric frameworkGRANT2016-04-052001-12-1452481651GoodColumbia University of New YorkColumbia University of New York
US6012066A0.389Computerized work flow systemGRANT2000-01-041997-10-0125478022GoodVallon IncVallon Inc
US20030212996A10.387System for interconnection of audio program data transmitted by radio to remote vehicle or individual with GPS locationAPPLICATION2003-11-131996-02-0827393726GoodMedia Online Services IncMedia Online Services Inc
US5319776A0.387In transit detection of computer virus with safeguardGRANT1994-06-071990-04-1924033959GoodHilgraeve CorpNortonLifeLock Inc
US6996815B20.386Method and software tools for intelligent service pack installationGRANT2006-02-072000-11-2924916807GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080021778A10.386Web-based brand marketing communication network for enabling e-commerce transactions using Multi-Mode Virtual Kiosks (MMVKS)APPLICATION2008-01-241999-04-2138972559GoodIPF IncIPF Inc
US8560644B20.385Method and apparatus for configuring a mobile node to retain a “home” IP subnet addressGRANT2013-10-152002-10-0239189978GoodCisco Technology IncCisco Technology Inc
US7657419B20.385Analytical virtual machineGRANT2010-02-022001-06-1938054598GoodInternational Business Machines CorpKyndryl Inc
US8544087B10.383Methods of unsupervised anomaly detection using a geometric frameworkGRANT2013-09-242001-12-1449181617GoodColumbia University of New YorkColumbia University of New York
US20080281719A10.383Methods and apparatus for connecting shippers and carriers in the third party logistics environment via the internetAPPLICATION2008-11-131999-11-0126859074GoodLeanLogistics IncLeanLogistics Inc
US7107339B10.383Predictive monitoring and problem identification in an information technology (IT) infrastructureGRANT2006-09-122001-04-0736951937GoodWebmethods IncSoftware AG USA Inc
US5278901A0.381Pattern-oriented intrusion-detection system and methodGRANT1994-01-111992-04-3025366641GoodInternational Business Machines CorpInternational Business Machines Corp
US20040193609A10.380Master content directory service server for providing a consolidated network-wide content directoryAPPLICATION2004-09-302003-03-2632989670GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US20030149677A10.379Knowledge automation engine for product knowledge managementAPPLICATION2003-08-072000-08-0429782219GoodSun Microsystems IncSun Microsystems Inc
US5159685A0.379Expert system for communications networkGRANT1992-10-271989-12-0623776568GoodRacal Data Communications IncNEXTIRAONE LLC
US20030200145A10.373Internet-based system and method for creating and distributing customized rich media marketing and sales materials via e-mailAPPLICATION2003-10-232002-04-1829218937GoodRich Media Club LLCRich Media Worldwide LLC, Rich Media Club LLC
US6804663B10.372Methods for optimizing the installation of a software product onto a target computer systemGRANT2004-10-121998-09-2122565550GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110238506A10.372INTERNET-BASED BRAND MARKETING COMMUNICATION NETWORK FOR ENABLING COMMISSION-BASED E-COMMERCE TRANSACTIONS ALONG THE FABRIC OF THE WORLD WIDE WEB (WWW) USING SERVER-SIDE DRIVEN MULTI-MODE VIRTUAL KIOSKS (MMVKS)APPLICATION2011-09-292000-01-1444657438Good
US6941453B20.370System and method for determining if a device needs to be updated and locating and invoking an update agent to update the firmware or software in the deviceGRANT2005-09-062003-02-1132869520GoodBitfone CorpQualcomm Inc
US4956769A0.368Occurence and value based security system for computer databasesGRANT1990-09-111988-05-1622717763GoodSysmith IncSysmith Inc
US6279028B10.368Operating system having a mechanism for handling a group of related processes residing on separate machinesGRANT2001-08-211995-12-0824275554GoodSilicon Graphics IncRPX Corp, Morgan Stanley and Co LLC
US5978843A0.368Scalable architecture for media-on-demand serversGRANT1999-11-021995-12-0627074784GoodIndustrial Technology Research Institute ITRIIndustrial Technology Research Institute ITRI
US20070067637A10.367Method and a system for preventing impersonation of a database userAPPLICATION2007-03-222000-11-2924912744GoodProtegrity a Swedish CorpProtegrity Corp, Protegrity a Swedish Corp
US6134566A0.367Method for controlling an electronic mail preview pane to avoid system disruptionGRANT2000-10-171997-06-3025385655GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6865671B10.367Electronic mail system with authentication methodology for supporting relaying in a message transfer agentGRANT2005-03-082000-04-0734221005GoodSendmail IncProofpoint Inc
US6757830B10.365Detecting unwanted properties in received email messagesGRANT2004-06-292000-10-0332508400GoodNetworks Associates Technology IncMcAfee LLC
US20030220816A10.365System and method for managing interactions between machine-generated and user-defined patient listsAPPLICATION2003-11-272002-04-3029554243GoodEpic Systems CorpEpic Systems Corp
US7979294B20.365System and method for providing decision support to appointment schedulers in a healthcare settingGRANT2011-07-122002-07-3131997606GoodEpic Systems CorpEpic Systems Corp
WO2003077129A10.364APPARATUS FOR PROTECTING COMPUTER USING FUNCTIONAL CHARACTERAPPLICATION2003-09-182002-03-1327800619Good
US20040162781A10.364Monitoring and alert systems and methodsAPPLICATION2004-08-192003-02-1432849821GoodKennsco IncKennsco Inc
US20040116102A10.363Heuristics for behavior based life support servicesAPPLICATION2004-06-172002-12-1732507201GoodInternational Business Machines CorpInternational Business Machines Corp
US6493594B10.362System and method for improved software configuration and control management in multi-module systemsGRANT2002-12-101999-06-0423270799GoodNokia of America CorpAlcatel Lucent SAS, Sound View Innovations LLC
US20030033396A10.362Method and system for providing management informationAPPLICATION2003-02-132001-08-0625448292GoodEcolab IncEcolab USA Inc
US6654714B10.362Method and system for selecting compatible processors to add to a multiprocessor computerGRANT2003-11-251998-05-2229581943GoodMicron Technology IncMicron Technology Inc, Mei California Inc
US7707317B20.358Adaptive electronic messagingGRANT2010-04-272002-07-0146303146GoodProlifiq Software IncProlifiq Software Inc
US20130247198A10.357Emulator updating system and methodAPPLICATION2013-09-192000-06-0134633045GoodMcAfee LLC, Network Associates IncMcAfee LLC
US6178509B10.356Tamper resistant methods and apparatusGRANT2001-01-231996-06-1325449804GoodIntel CorpIntel Corp
US7210041B10.355System and method for identifying a macro virus family using a macro virus definitions databaseGRANT2007-04-242001-04-3037950895GoodMcAfee LLCMcAfee LLC
US7327690B20.355Wireless local or metropolitan area network with intrusion detection features and related methodsGRANT2008-02-052002-08-1231495177GoodHarris CorpStingray Ip Solutions LLC
US20070294259A10.355System and method for finding product and service related information on the internetAPPLICATION2007-12-201996-10-2524961344Good
US6347396B10.355Disturbance free update of dataGRANT2002-02-121998-03-127860683GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US5831950A0.355Writing system for a recordable compact disc storing information of a writing operationGRANT1998-11-031995-09-2617529238GoodRicoh Co LtdRicoh Co Ltd
US20020138636A10.354Method for automatically mass generating personalized data report outputsAPPLICATION2002-09-262001-03-2326793530GoodEpic Systems CorpEpic Systems Corp
US20070061884A10.354Intrusion detection acceleratorAPPLICATION2007-03-152002-10-2937856889Good
US5867716A0.352Distributed computer system and method of generating automatic operation schedule for the sameGRANT1999-02-021994-06-1415070866GoodHitachi LtdHitachi Ltd
US7426530B10.351System and method for providing customers with seamless entry to a remote serverGRANT2008-09-162000-06-1224367476GoodJPMorgan Chase Bank NAJPMorgan Chase Bank NA, Chase Bank USA NA
US5365581A0.350Telephonic switching system with automatic port assignment capability and methodGRANT1994-11-151992-06-2525419107GoodRockwell International CorpRockwell Firstpoint Contact Corp, Wilmington Trust NA
US7089591B10.349Generic detection and elimination of marco virusesGRANT2006-08-081999-07-3036942172GoodSymantec CorpNortonLifeLock Inc
WO2002037279A20.348METHOD AND SYSTEM FOR REPAIR SERVICING OF COMPUTERSAPPLICATION2002-05-102000-11-0634391049Good
US6594759B10.346Authorization firmware for conducting transactions with an electronic transaction system and methods thereforGRANT2003-07-151996-12-0425056097GoodEsignx CorpCallahan Cellular LLC, Esignx Corp
US7058709B20.344Enabling surveillance of network connected deviceGRANT2006-06-062000-11-148174270GoodInternational Business Machines CorpInternational Business Machines Corp
US6014715A0.343Method and apparatus for assigning port addressesGRANT2000-01-111994-11-0823315901GoodMcData CorpBrocade Communications Systems LLC
US5475625A0.342Method and arrangement for monitoring computer manipulationsGRANT1995-12-121991-01-1625900272GoodWincor Nixdorf International GmbHWincor Nixdorf International GmbH
US7398555B20.342Electronic apparatus and mediumGRANT2008-07-082000-08-2818746180GoodFujitsu LtdFujitsu Ltd
US6981252B10.342Method and apparatus for automatically uninstalling software on a networkGRANT2005-12-272000-07-1426912779GoodSymantec CorpNortonLifeLock Inc
US6986037B10.341Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agentGRANT2006-01-102000-04-0735517944GoodSendmail IncProofpoint Inc
US6564369B10.341Conflict checking using configuration imagesGRANT2003-05-131998-08-2022477284GoodPearson Technical Software IncPEARSON TECHNICAL SOFTWARE Inc D/B/A LANOVATION
US7464264B20.336Training filters for detecting spasm based on IP addresses and text-related featuresGRANT2008-12-092003-06-0433159539GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5784566A0.334System and method for negotiating security services and algorithms for communication across a computer networkGRANT1998-07-211996-01-1124335020GoodOracle CorpOracle International Corp
US7478431B10.331Heuristic detection of computer virusesGRANT2009-01-132002-08-0240224000GoodSymantec CorpNortonLifeLock Inc
US7424619B10.331System and methods for anomaly detection and adaptive learningGRANT2008-09-092001-10-1139734423GoodColumbia University of New YorkColumbia University of New York
US6996819B10.331Method for efficiently downloading SCSI and SERVO firmware to SCSI target controllersGRANT2006-02-071999-09-1035734390GoodUnisys CorpUnisys Corp
US20020138746A10.331Method of generating a secure output fileAPPLICATION2002-09-262001-03-2326793571GoodEpic Systems CorpEpic Systems Corp
US6353928B10.330First run installerGRANT2002-03-051999-01-0422843220GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6167428A0.328Personal computer microprocessor firewalls for internet distributed processingGRANT2000-12-261996-11-2936318275Good
US20040006715A10.328System and method for providing security to a remote computer over a network browser interfaceAPPLICATION2004-01-082002-07-0530003351Good
US20020056076A10.328Analytical virtual machineAPPLICATION2002-05-092000-10-2426935461GoodvCIS IncKyndryl Inc
US5898836A0.324Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signaturesGRANT1999-04-271997-01-1425129900GoodNetmind Services IncNetMind Technologies Inc
US5371852A0.323Method and apparatus for making a cluster of computers appear as a single host on a networkGRANT1994-12-061992-10-1425503557GoodInternational Business Machines CorpInternational Business Machines Corp
US7330894B20.321System and method for preventing timeout of a clientGRANT2008-02-122002-04-1929215038GoodInternational Business Machines CorpInternational Business Machines Corp
US20030145046A10.320Generating a list of addresses on a proxy serverAPPLICATION2003-07-312002-01-3127610277GoodHewlett Packard CoHewlett Packard Development Co LP
US6029245A0.319Dynamic assignment of security parameters to web pagesGRANT2000-02-221997-03-2525238005GoodInternational Business Machines CorpInternational Business Machines Corp
US6148407A0.317Method and apparatus for producing computer platform fingerprintsGRANT2000-11-141997-09-3025476000GoodIntel CorpIntel Corp
US6658489B10.317Method for replacing a device driver during system operationGRANT2003-12-022000-03-2924143899GoodInternational Business Machines CorpGoogle LLC
US6378128B10.316System and method for dynamically modifying an install-setGRANT2002-04-231998-10-0822613519GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6854060B20.316Method and system in a telephone switching systemGRANT2005-02-081999-06-088554829GoodNokia OyjNokia Technologies Oy
US7367056B10.315Countering malicious code infections to computer files that have been infected more than onceGRANT2008-04-292002-06-0439321786GoodSymantec CorpCA Inc
US7155742B10.312Countering infections to communications modulesGRANT2006-12-262002-05-1637569631GoodSymantec CorpCA Inc
US20040078422A10.312Detecting and blocking spoofed Web login pagesAPPLICATION2004-04-222002-10-1732092754GoodAmerica Online IncOath Inc
US5544308A0.307Method for automating the development and execution of diagnostic reasoning software in products and processesGRANT1996-08-061994-08-0223090002GoodGiordano Automation CorpVSE CORP
US20040010465A10.306Method and apparatus for exception based payment postingAPPLICATION2004-01-152002-05-2030118245GoodEpic Systems CorpEpic Systems Corp
US7950066B10.305Method and system for restricting use of a clipboard applicationGRANT2011-05-242001-12-2144022355GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US5485575A0.305Automatic analysis of a computer virus structure and means of attachment to its hostsGRANT1996-01-161994-11-2123343995GoodInternational Business Machines CorpInternational Business Machines Corp
US6760720B10.303Search-on-the-fly/sort-on-the-fly search engine for searching databasesGRANT2004-07-062000-02-2524042844GoodPedestrian Concepts IncVILOX TECHNOLOGIES LLC, Pedestrian Concepts Inc
US20020114522A10.293System and method for compiling images from a database and comparing the compiled images with known imagesAPPLICATION2002-08-222000-12-2125000908GoodCobion AGKyndryl Inc
US10522144B20.282Method of and system for providing adaptive respondent training in a speech recognition applicationGRANT2019-12-312000-10-1622912057GoodEliza CorpEliza Corp
US20030220815A10.282System and method of automatically determining and displaying tasks to healthcare providers in a care-giving settingAPPLICATION2003-11-272002-03-2529553356GoodEpic Systems CorpEpic Systems Corp
US6073240A0.281Method and apparatus for realizing computer securityGRANT2000-06-061997-10-2825501612GoodInternational Business Machines CorpGoogle LLC
US6836792B10.273Techniques for providing add-on services for an email systemGRANT2004-12-281999-12-0333516908GoodTrend Micro IncTrend Micro Inc
WO2000058958A10.269LOCATING INFORMATION ON AN OPTICAL MEDIA DISC TO MAXIMIZE THE RATE OF TRANSFERAPPLICATION2000-10-051999-03-3123082148Good
US5592640A0.268Data processing apparatus capable of reading data from different-format CD-ROMS according to different processing methods of the dataGRANT1997-01-071991-01-1811967175GoodFujitsu LtdFujitsu Ltd
US6725242B20.264Multiple-computer data processing system and method with time-versioned data storageGRANT2004-04-202000-02-119885286GoodFujitsu Services LtdOBSERVATORY HOUSE WINDSOR ROAD
US20010032091A10.263Method and apparatus for providing intranet/web based programsAPPLICATION2001-10-181999-12-1626866672Good
US6092218A0.262System and method for self-referential accesses in a multiprocessor computerGRANT2000-07-181992-07-1710718868GoodSun Microsystems IncSun Microsystems Inc
US20040172234A10.260Hardware accelerator personality compilerAPPLICATION2004-09-022003-02-2832962492GoodLockheed Martin CorpLockheed Martin Corp
US7921204B20.258Message testing based on a determinate message classification and minimized resource consumptionGRANT2011-04-052002-07-1640652179GoodSonicWall LLCQuest Software Inc, PSM Merger Sub Delaware Inc
US20030216945A10.256Method for analyzing orders and automatically reacting to them with appropriate responsesAPPLICATION2003-11-202002-03-2529423479GoodEpic Systems CorpEpic Systems Corp
US6999952B10.253Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-aroundGRANT2006-02-142001-04-1835768046GoodCisco Technology IncCisco Technology Inc
US10027780B20.251Method and system for data demultiplexingGRANT2018-07-171999-12-2923884486GoodIMPLICIT LLCIMPLICIT LLC
US20040010422A10.241Method and apparatus for batch-processed invoicingAPPLICATION2004-01-152002-05-2030118244GoodEpic Systems CorpEpic Systems Corp
US6240394B10.241Method and apparatus for automatically generating advisory information for pharmacy patientsGRANT2001-05-291996-12-1225069796GoodCatalina Marketing International IncInventiv Health Inc
US7080094B20.227Hardware accelerated validating parserGRANT2006-07-182002-10-2932109875GoodLockheed Martin CorpLockheed Martin Corp
US20040083466A10.225Hardware parser acceleratorAPPLICATION2004-04-292002-10-2932109874GoodLockheed Martin CorpLockheed Martin Corp
US6938167B20.223Using trusted communication channel to combat user name/password theftGRANT2005-08-302002-12-1832593148GoodAmerica Online IncMeta Platforms Inc
US20020120863A10.208Method of and apparatus for investigating transactions in a data processing environmentAPPLICATION2002-08-292001-02-239909408GoodHewlett Packard CoHewlett Packard Development Co LP
US5771234A0.206Method and system for ATM cell multiplexing under constant bit rate  variable bit rate and best-effort trafficGRANT1998-06-231995-12-0624271190GoodIndustrial Technology Research Institute ITRIIndustrial Technology Research Institute ITRI
US20020099956A10.202Information processing apparatus and storage mediumAPPLICATION2002-07-251999-11-2214237367GoodFujitsu LtdFujitsu Ltd
US20030079140A10.145Multiple protecting system to protect personal computer data from burglary utilized flash memory driveAPPLICATION2003-04-242001-10-2421701080Good
FR2825489A1NRMethod for secure individual authentication of connection to Internet/intranet server  comprises choice between CD and resident operating program and use of mouse/screen password procedureGRANT2002-12-062001-06-0526213036Good
US7522908B20.656Systems and methods for wireless network site surveyGRANT2009-04-212003-04-2133162444FairAirDefense IncExtreme Networks Inc
US7711728B20.509System and method for searching for static data in a computer investigation systemGRANT2010-05-042002-06-2036317554FairGuidance Software IncOpen Text Holdings Inc
US7051243B20.504Rules-based configuration problem detectionGRANT2006-05-232002-04-3029249467FairSun Microsystems IncOracle America Inc
US6721306B10.490Public wireless/cordless internet gatewayGRANT2004-04-131997-03-1125217374FairVerizon Services CorpVerizon Patent and Licensing Inc
WO2000042528A10.487METHOD AND SYSTEM FOR DATABASE-DRIVEN  SCALABLE WEB PAGE DEVELOPMENT  DEPLOYMENT-DOWNLOAD  AND EXECUTIONAPPLICATION2000-07-201999-01-1522867823Fair
US7725842B20.443Self-attainable analytic tool and method for adaptive behavior modificationGRANT2010-05-252003-04-2433418193Fair
US6012087A0.430Unique-change detection of dynamic web pages using history tables of signaturesGRANT2000-01-041997-01-1446254916FairNetMind Technologies IncNetMind Technologies Inc
US20030154110A10.418Method and apparatus for wireless access to a health care information systemAPPLICATION2003-08-142001-11-2027668642FairEpic Systems CorpEpic Systems Corp
US6442599B10.392Video storage unit architectureGRANT2002-08-271995-08-1124045461FairLSI Logic CorpAvago Technologies International Sales Pte Ltd
US6240451B10.390Method and apparatus for automatically disseminating information over a networkGRANT2001-05-291995-05-2525515230FairPunch Networks CorpDEEP9 Corp
US8050944B20.376Intelligent patient visit information management and navigation systemGRANT2011-11-012000-09-2026927401FairEpic Systems CorpEpic Systems Corp
US20020120472A10.369System and method for integration of health care recordsAPPLICATION2002-08-292000-12-2226676445FairEpic Systems CorpEpic Systems Corp
US5825750A0.366Method and apparatus for maintaining security in a packetized data communications networkGRANT1998-10-201996-03-2924506425FairMotorola Solutions IncMotorola Solutions Inc
US20040172520A10.351Methods and apparatus for visually creating complex expressions that inform a rules-based system of clinical decision supportAPPLICATION2004-09-022002-09-1932911995FairEpic Systems CorpEpic Systems Corp
US7930716B20.348Techniques for reinsertion of local market advertising in digital video from a bypass sourceGRANT2011-04-192002-12-3132594779FairACTV IncOpenTV Inc
US20030220821A10.346System and method for managing and reconciling asynchronous patient dataAPPLICATION2003-11-272002-04-3029553462FairEpic Systems CorpEpic Systems Corp
US7757265B20.340System and method for local meta data insertionGRANT2010-07-132000-03-3122713769FairIntellocity USA IncOpenTV Inc
US6882795B10.335Image mastering APIGRANT2005-04-191999-11-0134437151FairSonic Solutions LLCCorel Corp, Steel Excel Inc, Sonic Solutions LLC
US8042121B20.325Methods and systems for burning compact discsGRANT2011-10-182002-03-2128044427FairMicrosoft CorpMicrosoft Technology Licensing LLC
US7251610B20.323Clinical documentation system for use by multiple caregiversGRANT2007-07-312000-09-2026927403FairEpic Systems CorpEpic Systems Corp
EP0730274A20.315Compact disc recording system and methodGRANT1996-09-041995-02-2823572118FairRoxio IncRoxio Inc, Incat Systems Software Usa Inc
US6058434A0.309Apparent network interface for and between embedded and host processorsGRANT2000-05-021997-11-2626700686FairAcuity Imaging LLCOmron Microscan Systems Inc
US20020055918A10.308Operating room resource management system incorporating an interactive  visual method for coordinating multiple  interdependentAPPLICATION2002-05-092000-11-0826938253FairEpic Systems CorpEpic Systems Corp
US5611066A0.307System for creating related sets via once caching common file with each unique control file associated within the set to create a unique record imageGRANT1997-03-111994-02-2822756183FairData Ware Development IncBankBoston NA
US20030130872A10.304Methods and apparatus for managing and using inpatient healthcare informationAPPLICATION2003-07-102001-11-2726974253FairEpic Systems CorpEpic Systems Corp
US5134691A0.265Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting in serial format to controlled productGRANT1992-07-281986-04-0127012910FairWestinghouse Electric CorpCBS Corp
US6728808B10.256Mechanism for optimizing transaction retries within a system utilizing a PCI bus architectureGRANT2004-04-272000-02-0732108309Fair3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6226700B10.254Computer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devicesGRANT2001-05-011998-03-1321920440FairCompaq Computer CorpHewlett Packard Development Co LP
US5631888A0.246Master disc recording apparatus and method for recording data on different types of master discsGRANT1997-05-201995-04-0413674328FairPioneer Electronic CorpPioneer Corp, Pioneer Display Products Corp
US6968336B10.240Method for generating  organizing table codes either code is highest code level or code is linked to parent code in hierarchical structureGRANT2005-11-222000-05-1835345051FairInternational Business Machines CorpInternational Business Machines Corp
US6600713B10.231Recording media having separate read only and read/write areasGRANT2003-07-291996-06-2624698860FairSun Microsystems IncOracle America Inc
US5200943A0.219METHOD AND APPARATUS FOR CONTROLLING ENCODING AND RECORDING OF MAIN INFORMATION DATA IN ACCORDANCE WITH DIFFERENT DETECTED DATA FORMATS OF THE MAIN INFORMATION DATAGRANT1993-04-061989-10-0217308023FairSony CorpSony Corp
US20040225282A10.215Method and articles for assuring appropriate surgeryAPPLICATION2004-11-112003-05-0933423808Fair
US20010014894A10.209File managing method for a digital data streamAPPLICATION2001-08-162000-02-1127483420FairLG Electronics IncLG Electronics Inc
US6947936B10.197Method for a topic hierarchy classification systemGRANT2005-09-202001-04-3034992086FairHewlett Packard Development Co LPHewlett Packard Development Co LP
US20030069676A10.104Electric power steering apparatusAPPLICATION2003-04-102001-10-0519129484FairKoyo Seiko Co LtdKoyo Seiko Co Ltd
US20030009965A10.103Residential heat insulation construction  and heat insulator to be usedAPPLICATION2003-01-162000-09-0718757641FairMatumotokenkou KKFP Corp KK
US6745766B20.070Heat and moisture exchangerGRANT2004-06-082000-03-2911444671FairMallinckrodt Holdings BVMallinckrodt Holdings BV
US20030060624A10.054Process for the preparation of 1 3-substituted indenes and aryl-fused azapolycyclic componundsAPPLICATION2003-03-272001-04-2023092860FairPfizer Products Inc, Pfizer IncPfizer Products Inc, Pfizer Inc
US5769942A0.051Method for epitaxial growthGRANT1998-06-231994-09-2916988729FairSemiconductor Process Laboratory Co LtdSemiconductor Process Laboratory Co Ltd
GB2340293ANRAudio dubbing system  digital audio recorder and recording mediumGRANT2000-02-161998-08-0516777615FairSanyo Electric Co LtdSanyo Electric Co Ltd

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
624
Recommended Classes
156
Government Assigned Classes
5
CPC
Title
Score
H04L63/1433Vulnerability analysis2.567
G06F21/577Assessing vulnerabilities and evaluating computer system security2.360
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)2.347
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)2.301
G06F12/14Protection against unauthorised use of memory | or access to memory1.247
G06F21/55Detecting local intrusion or implementing counter-measures1.246
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.242
G06F8/60Software deployment1.212
H04L63/14for detecting or protecting against malicious traffic1.149
H04L63/0254Stateful filtering1.145
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)1.142
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.142
H04L63/1416Event detection  e.g. attack signature detection1.136
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.134
H04L63/0281Proxies1.129
H04L63/105Multiple levels of security1.119
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.107
H04L41/22using GUI [Graphical User Interface]1.106
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.106
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities1.106
H04L63/02for separating internal from external traffic  e.g. firewalls1.105
H04L63/102Entity profiles1.098
G06F8/62Uninstallation1.097
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general1.097
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.097
H04L63/168above the transport layer1.094
H04L63/1425Traffic logging  e.g. anomaly detection1.094
G06F11/1433during software upgrading1.086
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.084
H04L63/0218Distributed architectures  e.g. distributed firewalls1.081
H04L63/0272Virtual private networks1.080
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)1.079
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.079
H04W12/10Integrity1.079
H04W12/08Access security1.079
H04W48/04based on user or terminal location or mobility data  e.g. moving direction  speed1.074
G06F21/629to features or functions of an application1.069
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.059
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.057
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.055
H04L67/327whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status  payload or application type1.054
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.051
H04L63/0263Rule management1.051
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.051
H04L63/166at the transport layer1.051
H04L43/04Processing of captured monitoring data1.050
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow1.048
H04L41/0806for initial configuration or provisioning1.043
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)1.042
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.040
G06F21/567using dedicated hardware1.040
H04L63/0245Filtering by information in the payload1.040
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)1.037
H04L29/06characterised by a protocol1.037
G06Q10/101Collaborative creation of products or services1.034
H04L63/101Access control lists [ACL]1.033
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.033
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors1.032
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.029
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.024
G06F21/575Secure boot1.021
G06F21/552involving long-term monitoring or reporting1.020
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.019
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)1.018
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment1.018
H04L63/0815providing single-sign-on or federations1.018
G06F21/41where a single sign-on provides access to a plurality of computers1.018
H04L63/104Grouping of entities1.018
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.018
G06F21/554involving event detection and direct action1.016
G06F21/604Tools and structures for managing or administering access control systems1.015
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication1.015
H04L63/1458Denial of Service1.013
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.013
G06F21/602Providing cryptographic facilities or services1.011
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.011
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.009
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.007
H04L29/08846Arrangements to globally emulate or virtualize the functionalities of an end device | (ref: H04L29/08837)|  takes precedence1.006
H04L61/1541for service discovery | network applications for service discovery | (ref: H04L67/16)| | discovery of network devices in wireless communication networks | (ref: H04W8/005)1.006
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)1.006
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.005
G06F11/008Reliability or availability analysis1.005
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)1.004
H04L45/586Virtual routers1.004
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.004
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.004
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.003
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route1.001
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.001
G06F8/00Arrangements for software engineering | testing or debugging | (ref: G06F11/36)| | administrative  planning or organisation aspects of software project management | (ref: G06Q10/06)1.001
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.001
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.000
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.996
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.994
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.994
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)0.993
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.993
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.993
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.993
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance0.993
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.992
G06F17/30091File storage and access structures | management of files in storage systems | (ref: G06F3/0643)0.991
G06F11/00Error detection| Error correction| Monitoring | error detection  correction or monitoring in information storage based on relative movement between record carrier and transducer | (ref: G11B20/18)| | monitoring  i.e. supervising the progress of recording or reproducing | (ref: G11B27/36)| | in static stores | (ref: G11C29/00)0.990
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.989
G06F9/4555Para-virtualisation  i.e. guest operating system has to be modified0.988
G06F11/0727in a storage system  e.g. in a DASD or network based storage system | circuits for error detection or correction within digital recording or reproducing units | (ref: G11B20/18)| | drivers for digital recording or reproducing units | (ref: G06F3/06)| | storage area networks | (ref: H04L29/08549)0.987
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code0.986
G06F21/564by virus signature recognition0.984
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)0.984
G06F21/563by source code analysis0.983
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.983
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.983
G06F21/561Virus type analysis0.982
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.982
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems0.980
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.979
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.977
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)0.977
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)0.976
H04L67/322whereby quality of service [QoS] or priority requirements are taken into account | monitoring of QoS metrics | (ref: H04L43/08)| | QoS aspects in real-time communications | (ref: H04L65/80)0.975
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.975
H04L43/00Arrangements for monitoring or testing packet switching networks | networking arrangements or communications protocols for supporting networked applications for tracking the activity of the application user | (ref: H04L67/22)| | monitoring of computing systems | (ref: G06F11/30)| | monitoring of computer activity | (ref: G06F11/34)0.975
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.973
H04W8/245from a network towards a terminal0.973
G06F9/45512Command shells0.973
G06F21/562Static detection0.972
G06F11/3688for test execution  e.g. scheduling of test suites0.971
G06F21/606by securing the transmission between two devices or processes0.971
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.971
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.970
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|0.970
H04L41/5074Handling of trouble tickets0.970
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.969
H04L41/0856by archiving or backing up configuration information0.969
H04L63/123received data contents  e.g. message integrity0.967
H04L67/1034Reaction to server failures by a load balancer | network fault restoration | (ref: H04L41/0654)| | departure or maintenance mechanisms in Peer-to-Peer networks | (ref: H04L67/1048)| | intermediate processing providing operational support to end devices by emulation or by off-loading in the network | (ref: H04L67/2861)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | error detection or correction of the data by redundancy in hardware | (ref: G06F11/16)| | failing over workload from one server to another one | (ref: G06F11/202)0.967
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.966
G06F11/3428Benchmarking0.966
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.966
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)0.966
H04L63/16Implementing security features at a particular protocol layer0.965
H04L69/14Multichannel or multilink protocols0.964
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)0.964
H04L43/026using flow generation0.963
G06F21/60Protecting data0.963
H04L63/126the source of the received data0.963
H04L43/12using dedicated network monitoring probes0.962
H04L61/1511using domain name system [DNS]0.962
H04W28/14using intermediate storage0.962
H04L67/2833for grouping or aggregating service requests  e.g. for unified processing of service requests | networking arrangements or communication protocols for scheduling or organising the servicing of application requests | (ref: H04L67/32)0.962
H04L65/103in the network0.962
G06F8/30Creation or generation of source code0.961
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.960
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.959
G06F9/45558Hypervisor-specific management and integration aspects0.958
H04L67/303Terminal profiles0.958
G06F8/54Link editing before load time0.958
H04L43/0894Packet rate0.957
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)0.956
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)0.956
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.956
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)0.956
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)0.955
G06F21/46by designing passwords or checking the strength of passwords0.955
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.954
G06Q10/00Administration| Management0.954
H04L41/046Aspects of network management agents0.953
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)0.953
H04L47/2441Flow classification0.953
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes0.953
G06F21/33using certificates0.952
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding0.951
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.951
H04L45/74Address processing for routing0.950
H04L47/25Rate modification upon detection by the source of changing network conditions0.950
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)0.950
H04L41/065involving logical or physical relationship  e.g. grouping and hierarchies0.950
G06F21/12Protecting executable software0.950
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.948
G06F17/30424Query processing0.916
G06F17/30864by querying  e.g. search engines or meta-search engines  crawling techniques  push systems0.868
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.468
H04L41/0859by keeping history of different configuration generations or versions0.431
H04L41/0853by actively collecting or retrieving configuration information0.431
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.429
H04L63/108when the policy decisions are valid for a limited amount of time0.425
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.423
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.423
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.417
H04L9/3247involving digital signatures0.417
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.417
H04L45/22Alternate routing0.415
H04L47/10Flow control or congestion control0.415
H04L47/20Policing0.415
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.415
H04L61/1523using lightweight directory access protocol [LDAP]0.415
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper0.415
H04L41/0233using object oriented techniques  e.g. common object request broker architecture [CORBA] for representation of network management data0.415
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.415
G06F21/54by adding security routines or objects to programs0.415
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.414
H04L51/12with filtering and selective blocking capabilities0.413
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)0.412
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.412
H04L63/164at the network layer0.412
H04L47/41Actions on aggregated flows or links0.412
G06F21/568eliminating virus  restoring damaged files0.411
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)0.410
G06F9/46Multiprogramming arrangements0.410
G06F7/24Sorting  i.e. extracting data from one or more carriers  rearranging the data in numerical or other ordered sequence  and rerecording the sorted data on the original carrier or on a different carrier or set of carriers | sorting methods in general| (ref: G06F7/36)|  takes precedence0.405
G06F9/451Execution arrangements for user interfaces0.405
H04L67/30involving profiles0.405
H04L67/1021based on client or server locations0.405
H04W88/02Terminal devices0.405
H04M1/67by electronic means0.403
H04L67/2819Enhancement of application control based on intercepted application data0.403
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.401
H04L61/2015using the dynamic host configuration protocol [DHCP] or variants0.398
G06F11/3495for systems0.398
G06F9/5072Grid computing0.398
G06F8/51Source to source0.398
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)0.398
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.398
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java0.398
H04L41/5032Generating service level reports0.398
G06F21/31User authentication0.397
G06F21/335for accessing specific resources  e.g. using Kerberos tickets0.395
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.395
H04L29/06027Protocols for multimedia communication0.395
H04M7/0078Security| Fraud detection| Fraud prevention0.395
H04L65/1079of unsolicited session attempts  e.g. SPIT | message switching systems  e.g. electronic mail systems  with filtering and selective blocking capabilities | (ref: H04L51/12)0.395
H04L1/0025Transmission of mode-switching indication0.395
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r0.395
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.395
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.395
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.395
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)0.395
H04L67/2838for integrating service provisioning from a plurality of service providers | web site content organization and management | (ref: G06F17/3089)0.395
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.395
H04L41/0816due to adaptation  e.g. in response to network events0.394
G06F11/324Display of status information0.393
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.393
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)0.392
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.392
H04L67/1014based on the content of a request0.391
H04L51/046interacting with other applications or services0.391
H04L47/825Involving tunnels  e.g. MPLS0.391
H04W4/50Service provisioning or reconfiguring0.391
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.391
H04L12/40Bus networks0.391
H04L43/06Report generation0.391
G06F9/542Event management| Broadcasting| Multicasting| Notifications0.390
G06F9/45533Hypervisors| Virtual machine monitors0.390
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)0.389
H04L41/5006Defining or negotiating SLA contracts  guarantees or penalties | SLA negotiation in wireless networks | (ref: H04W28/24)0.389
G06Q10/063Operations research or analysis0.388
H04L41/085Keeping track of network configuration0.388
G06T11/206Drawing of charts or graphs0.388
H04L43/50Testing arrangements0.385
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.384
H04W76/12Setup of transport tunnels0.384
H04L41/06involving management of faults or events or alarms0.384
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.384
H04L41/0809Plug-and-play configuration0.384
H04W88/16Gateway arrangements0.384
H04W76/32Release of transport tunnels0.384
H04L61/2061involving aspects of pools of addresses  e.g. assignment of different pools of addresses to different dynamic host configuration protocol [DHCP] servers0.384
H04W88/12Access point controller devices0.384
H04L43/0876Network utilization0.384
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.384
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.384
H04L43/067for time frame related reporting0.384
G06F21/45Structures or tools for the administration of authentication0.383
G06Q50/01Social networking0.383
G06Q30/0208Trade or exchange of a good or service for an incentive0.383
G06Q10/06398Performance of employee with respect to a job function0.383
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.382
H04L67/2804for adding application control or application functional data  e.g. adding metadata0.382
H04L41/0866Checking configuration0.382
H04L65/1003Signalling or session protocols0.382
H04L65/1033Signalling gateways0.382
H04W4/38for collecting sensor information0.381
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence0.379
G06F17/30386Retrieval requests0.379
G06F17/30528using context0.379
H04W12/06Authentication0.379
G06F21/88Detecting or preventing theft or loss0.379
H04W28/0215based on user or device properties  e.g. MTC-capable devices | services for machine-to-machine communication [M2M] or machine type communication [MTC] | (ref: H04W4/70)| | wireless resource selection or allocation plan definition based on terminal or device properties | (ref: H04W72/048)0.379
H04W28/02Traffic management  e.g. flow control or congestion control0.379
G06F21/565by checking file integrity0.378
G06F21/725operating on a secure reference time value0.378
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.378
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)0.377
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.377
H04W12/12Fraud detection0.377
H04L49/354Support for virtual LAN  VLAN tagging or multiple registration  e.g. according to IEEE 802.1q0.377
H04L45/54Organization of routing tables0.377
G06Q30/0603Catalogue ordering0.377
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.377
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.377
H04L61/2503Internet protocol [IP] address translation0.375
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)0.375
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders0.375
H04L29/12066using Domain Name System [DNS]0.375
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses0.375
H04L49/20Support for services or operations0.375
H04L29/06149Special adaptations of TCP  UDP or IP to match specific link layer protocols  e.g. ATM  SONET or PPP | IP over ATM | (ref: H04Q11/0478)| | special adaptation of TCP protocol for wireless media | (ref: H04W80/06)0.375
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.375
H04L29/06115Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L29/08045)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.375
H04L63/162at the data link layer0.375
H04L69/168Special adaptations of TCP  UDP or IP to match specific link layer protocols  e.g. ATM  SONET or PPP | IP over ATM | (ref: H04L2012/5667)| | special adaptation of TCP protocol for wireless media | (ref: H04W80/06)0.375
H04L29/08009Open systems interconnection [OSI] architecture  e.g. layering  entities  standards| Interface between layers| Software aspects0.375
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)0.375
G06F21/44Program or device authentication0.375
H04L29/08045Transport layer  i.e. layer four0.375
H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks0.375
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.375
H04L29/06102Implementation details of TCP/IP or UDP/IP stack architecture| specification of modified or new header fields | protocols engines in general | (ref: H04L29/06081)| | OSI stack based layering aspects | (ref: H04L29/08009)| | protocol header analysis in general | (ref: H04L29/0653)0.375
H04L9/3236using cryptographic hash functions0.375
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)0.375
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.375
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities0.375
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.375
H04L9/0869involving random numbers or seeds0.375
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.375
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.375
G06F8/77Software metrics0.375
G06F11/3672Test management0.375
G06N5/04Inference methods or devices0.375
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.375
H04L65/105Proxies  e.g. SIP proxies0.374
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)0.373
G06F8/658Incremental updates| Differential updates0.373
G06F11/3668Software testing | software testing in telephone exchanges | (ref: H04M3/242)|   testing of hardware | (ref: G06F11/22)0.373
G06N3/08Learning methods0.373
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.372
H04L41/0843based on generic templates0.372
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special0.372
H04L41/0253involving a browser or web-pages for accessing management information | graphical user interface for network management | (ref: H04L41/22)0.372
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.372
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.372
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.372
H04L43/16using threshold monitoring0.372
H04L43/062for traffic related reporting0.372
G06F21/40by quorum  i.e. whereby two or more security principals are required0.372
H04L63/0838using one-time-passwords0.372
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols0.372
G06F17/30165Support for shared access to files  file-sharing support0.372
G06F9/468Specific access rights for resources  e.g. using capability register0.372
G06F17/30082Use of management policies | file migration policies for HSM systems | (ref: G06F17/30221)| | backup systems | (ref: G06F11/1446)0.372
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.372
G06F21/43wireless channels0.371
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.371
H04L41/0631Alarm or event or notifications correlation| Root cause analysis0.371
H04L41/142using statistical or mathematical methods0.371
G06F17/30289Database design  administration or maintenance0.371
G06F17/30345Update requests0.371
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy0.371
H04L41/069involving storage or log of alarms or notifications or post-processing thereof0.370
G06F11/2257using expert systems0.370
G06Q10/0635Risk analysis0.370
G06F17/30011Document retrieval systems0.370
G06F3/0601Dedicated interfaces to storage systems0.370
H04L51/34with provisions for tracking the progress of a message0.370
G06F17/3089Web site content organization and management  e.g. publishing  automatic linking or maintaining pages0.370
H04L41/044Arrangements involving a hierarchical management structure0.369
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.369
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.369
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.369
G06F11/3409for performance assessment0.369
G06F11/3644by instrumenting at runtime0.369
G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data | error or fault reporting or logging | (ref: G06F11/0766)0.369
G06N5/048Fuzzy inferencing0.369
H04L41/024using relational databases for representation of network management data  e.g. managing via structured query language [SQL] | information retrieval in structured data stores | (ref: G06F17/30286)0.369
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages0.368
H04L9/321involving a third party or a trusted authority0.368
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.368
G06F8/61Installation0.368
H04L9/3271using challenge-response0.368
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.368
H04L41/5022by giving priorities  e.g. assigning classes of service0.368
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)0.368
G06F9/547Remote procedure calls [RPC]| Web services0.368
G06F8/20Software design0.368
G06F9/546Message passing systems or structures  e.g. queues0.368
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.368
G06F11/30Monitoring0.367
H04L67/36involving the display of network or application conditions affecting the network application to the application user | graphical user interfaces for network management | (ref: H04L41/22)0.367
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)0.367
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints0.367
H04L29/08Transmission control procedure  e.g. data link level control procedure0.367
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.367
H04L67/2876Pairs of interprocessing entities at each side of the network  e.g. split proxies0.366
H04L43/045for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32)0.366
H04L41/0681involving configuration of triggering conditions0.366
H04L47/2475Application aware0.366
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)0.365
G06F9/45537Provision of facilities of other operating environments  e.g. WINE | I/O emulation | (ref: G06F13/105)0.365
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.365
G06N5/025Extracting rules from data | learning in general | (ref: G06F15/18)0.365
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.365
G06N5/043Distributed expert systems  blackboards0.365
G06F21/645using a third party0.365
H04L63/302gathering intelligence information for situation awareness or reconnaissance0.365
G06F11/28by checking the correct order of processing | (ref: G06F11/08)|  - | (ref: G06F11/26)|  take precedence| monitoring patterns of pulse trains | (ref: H03K5/19)0.365
G06Q10/20Product repair or maintenance administration0.365
H04L47/22Traffic shaping0.365
H04L43/08Monitoring based on specific metrics0.364
G06F11/3684for test design  e.g. generating new test cases0.364
G06F12/0813with a network or matrix configuration0.364
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.364
H04L67/1036Load balancing of requests to servers for services different from user content provisioning  e.g. load balancing to DNS servers or firewalls | internet service provider selection | (ref: H04L12/5691)0.364
H04L41/0226Mapping or translation of multiple network management protocols0.364
G06F21/6272by registering files or documents with a third party0.363
H04L41/145involving simulating  designing  planning or modelling of a network0.363
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.363
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.363
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)0.363
H04L63/30for supporting lawful interception  monitoring or retaining of communications or communication related information | circuit switched telephony call monitoring | (ref: H04M3/2281)0.363
H04L63/308retaining data  e.g. retaining successful  unsuccessful communication attempts  internet access  or e-mail  internet telephony  intercept related information or call content0.363
H04W24/08Testing  | supervising or monitoring|  using real traffic0.363
H04L61/6013Proxying of addresses0.363
H04L67/1029using data related to the state of servers by a load balancer | server selection based on server parameters | (ref: H04L67/1008)| | performance measurement for load balancing | (ref: G06F11/3433)| | information retrieval in structured data stores | (ref: G06F17/30286)0.363
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.363
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost0.363
H04W4/02Services making use of location information0.363
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.363
H04L29/12783involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address  functional addressing  i.e. assigning an address to a function0.363
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)0.363
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.363
H04L41/147for prediction of network behaviour0.362
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)0.362
G06F11/323Visualisation of programs or trace data0.362
H04L41/0886Fully automatic configuration0.362
H04L41/0863by rolling back to previous configuration versions0.362
H04W12/02Protecting privacy or anonymity0.362
G06Q40/025Credit processing or loan processing  e.g. risk analysis for mortgages0.362
G06Q10/06311Scheduling  planning or task assignment for a person or group0.362
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.362
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.361
H04L12/2876Handling of subscriber policies | group policies management | (ref: H04L41/0893)0.361
H04L12/2859Point-to-point connection between the data network and the subscribers | encapsulation | (ref: H04L12/4633)| | virtual LANs | (ref: H04L12/4641)| | routing of packets | (ref: H04L45/00)0.361
G06Q20/401Transaction verification0.361
G06Q20/4016involving fraud or risk level assessment in transaction processing0.361
G06Q20/405Establishing or using transaction specific rules0.361
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.361
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.361
H04L67/1027Persistence of sessions during load balancing0.361
H04L67/1031Controlling of the operation of servers by a load balancer  e.g. adding or removing servers that serve requests0.361
H04L67/1012based on compliance of requirements or conditions with available server resources0.361
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.360
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading0.360
H04L41/20Network management software packages0.360
H04L41/048mobile agents0.360
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials0.360
G06Q10/06315Needs-based resource requirements planning or analysis0.360
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.359
H04L43/106by adding timestamps to packets0.359
H04W4/08User group management0.359
H04L61/6063Transport layer addresses  e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports | TCP/IP or UDP protocol aspects or techniques | (ref: H04L69/16)0.359
H04L41/0266involving management internet meta-data  objects or commands  e.g. by using mark-up language0.359
G06F11/0766Error or fault reporting or storing | reporting or storing of non-error data | (ref: G06F11/30)|   | (ref: G06F11/34)0.359
H04L47/2483Flow identification0.359
H04L41/5067Customer-centric quality of service [QoS] measurement0.359
H04L47/11Congestion identification0.359
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.359
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.359
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.358
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)0.358
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.358
G06Q10/109Time management  e.g. calendars  reminders  meetings  time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.358
H04L61/00Network arrangements or network protocols for addressing or naming0.358
H04L29/12009Arrangements for addressing and naming in data networks0.358
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.358
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)0.357
H04L61/2007internet protocol [IP] addresses0.357
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.357
H04L61/6009Caching of addresses | caching data temporarily at an intermediate stage in general | (ref: H04L67/2842)0.357
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)0.357
H04L51/08Messages including annexed information  e.g. attachments0.357
H04L9/0822using key encryption key0.357
H04L41/16Network management using artificial intelligence0.357
G06N7/023Learning or tuning the parameters of a fuzzy system0.357
H04L65/608Streaming protocols  e.g. RTP or RTCP0.357
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 0.357
H04L67/101based on network conditions0.357
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)0.357
H04L41/0873by checking configuration conflicts with other network elements0.357
H04L69/24Negotiation of communication capabilities0.357
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)0.356
H04L43/0823Errors | management of events  faults or alarms in networks or network elements | (ref: H04L41/06)0.356
H04L41/0686involving notification enrichment0.356
H05B41/26in which the lamp is fed by power derived from dc by means of a converter  e.g. by high-voltage dc0.356
H04L67/24Presence management | use and manipulation of presence information in instant messaging | (ref: H04L51/043)0.356
G06F8/40Transformation of program code0.356
G06F17/30902of access to content  e.g. by caching | accessing  addressing or allocating within memory systems and caches | (ref: G06F12/08)0.356
G06F3/0482interaction with lists of selectable items  e.g. menus0.356
G06K9/6218Clustering techniques0.356
G06F15/76Architectures of general purpose stored program computers | with program plugboard | (ref: G06F15/08)| | multicomputers | (ref: G06F15/16)0.356
G06F17/30598Clustering or classification | for textual data | (ref: G06F17/30705)0.356
H04L61/2585through application level gateway [ALG]0.356
G06Q10/0633Workflow analysis0.356
G06F2221/033Test or assess software0.072
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.071
H04L2209/38Chaining  e.g. hash chain or certificate chain0.070
G06F2221/034Test or assess a computer or a system0.068
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.068
Y10S707/957Multidimensional0.068
Y10S707/959Network0.068
H04W84/12WLAN [Wireless Local Area Networks]0.067
H04W8/205Transfer to or from user equipment or user record carrier0.067
G06F2221/2115Third party0.066
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.066
G06F2221/2101Auditing as a secondary aspect0.066
G06F2221/2149Restricted operating environment0.066
G06F2221/2151Time stamp0.066
G06F2221/03Indexing scheme relating to | (ref: G06F21/50)|   monitoring users  programs or devices to maintain the integrity of platforms0.066
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.065
H04L51/38in combination with wireless systems | mobile application service signalling using messaging  e.g. SMS  | (ref: H04W4/12)0.065
G06F9/5088involving task migration0.065
G06F9/06using stored programs  i.e. using an internal store of processing equipment to receive or retain programs0.065
H04L2209/84Vehicles0.065
H04L2012/40215Controller Area Network CAN0.065
H04L41/0813Changing of configuration0.065
G06F2221/2113Multi-level security  e.g. mandatory access control0.065
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.065
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.065
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.065
H04L2463/141Denial of service attacks against endpoints in a network0.065
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.064
H04L41/022Multivendor or multistandard integration0.064
H04L41/0869by validating configuration within one network element0.064
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)0.064
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)0.064
G06F2221/2105Dual mode as a secondary aspect0.064
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)0.064
G06F2221/2117User registration0.064
G06F2221/2107File encryption0.064
H04L2463/146Tracing the source of attacks0.064
H04W76/10Connection setup0.064
H04L2463/144Detection or countermeasures against botnets0.064
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.063
Y10S707/99939Privileged access0.063
G06F2221/2139Recurrent verification0.063
G06F2221/2135Metering0.063
G06F2221/2137Time limited access  e.g. to a computer or data0.063
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.063
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.063
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.063
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.063
H04L12/00Data switching networks | interconnection of  or transfer of information or other signals between  memories  input/output devices or central processing units | (ref: G06F13/00)0.063
H04L61/2514between local and global IP addresses0.063
H04L12/6418Hybrid transport0.062
G06F9/44Arrangements for executing specific programs0.062
G06F2209/5016Session0.062
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.062
H04L41/0273involving the use of web services for network management  e.g. SOAP0.062
H04L41/5048Automatic or semi-automatic definitions  e.g. definition templates0.062
H04L41/5093wherein the managed service relates to messaging or chat services | conducting a computer conference | (ref: H04L12/1822)| | messaging  such as e-mail in packet-switching networks | (ref: H04L51/00)| | instant messaging | (ref: H04L51/04)0.062
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.062
Y04S40/20Information technology specific aspects0.062
Y10S707/922Communications0.062
G06F2221/032Protect output to user by software means0.062
G06F2216/03Data mining0.062
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.061
G06F2201/865Monitoring of software0.061
G06F11/1458Management of the backup or restore process0.061
H04L41/5029Service quality level based billing  e.g. dependent on measured service level customer is charged more or less | general charging or billing for transport of data packets | (ref: H04L12/14)0.061
H04L51/28Details regarding addressing issues | arrangements and protocols for addressing and naming | (ref: H04L61/00)0.061
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.061
H04M3/38Graded-service arrangements  i.e. some subscribers prevented from establishing certain connections | queueing arrangements | (ref: H04M3/523)|   | (ref: H04Q3/64)0.061
G06F11/0712in a virtual computing platform  e.g. logically partitioned systems0.061
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.061
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.061
H04L43/0852Delays0.061
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.061
H04L43/0888Throughput0.061
H04L2012/5603Access techniques0.061
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.061
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.061
H04L41/5064Customer relationship management | arrangements involving customer network management  i.e. giving the customer access to network management functions | (ref: H04L41/18)0.061
G06F2212/62Details of cache specific to multiprocessor cache arrangements0.061
G06F2212/60Details of cache memory0.061
G06F2212/1052Security improvement0.061
Y10S379/901Virtual networks or virtual private networks0.061
H04L67/2871Implementation details of a single intermediate entity0.060
H04L43/0811Connectivity0.060
G06F2221/2103Challenge-response0.060
G06F2201/875Monitoring of systems including the internet0.060
G06F2221/00Indexing scheme relating to security arrangements for protecting computers  components thereof  programs or data against unauthorised activity | not used0.060
H04L61/305containing special prefixes0.060
H04W52/02Power saving arrangements | in wired systems | (ref: H04L12/12)| | signaling of mobile application services  e.g. low battery notifications | (ref: H04W4/20)0.060
H04L47/2408Different services  e.g. type of service [ToS]0.060
H04L47/14in wireless networks0.060
H04W24/02Arrangements for optimising operational condition0.060
H04L47/35Embedded flow control information in regular packets  e.g. Piggybacking0.060
G06F2221/2129Authenticate client device independently of the user0.060
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.060
G06F2009/45562Creating  deleting  cloning virtual machine instances0.060
G06Q30/018Business or product certification or verification0.060
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.060
Y10S707/99954Version management0.060
Y10S707/99953Recoverability0.060
G06F11/004Error avoidance | (ref: G06F11/07)|  and subgroups take precedence0.060
H04L47/2433Allocation of priorities to traffic types0.060
H04L2209/60Digital content management  e.g. content distribution0.060
H04L41/5016based on statistics of service availability  e.g. in percentage or over a given time0.060
H04L41/509wherein the managed service relates to media content delivery  e.g. audio / video / TV | protocols for real-time multimedia communications | (ref: H04L65/00)| | interactive television or VoD | (ref: H04N21/00)0.060
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.060
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.060
H04W48/18Selecting a network or a communication service0.060
Y10S707/99945Object-oriented database structure processing0.060
H04L2463/142Denial of service attacks against network infrastructure0.060
H04L43/0829Packet loss0.060
H04L43/0864Round trip delays0.060
Y10S706/90Fuzzy logic0.059
H04L29/12339Internet Protocol [IP] address translation0.059
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.059
Y10S707/99952Coherency  e.g. same view to multiple users0.059
Y02B20/40Control techniques providing energy savings0.059
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.059
H04L29/06551Arrangements for network security | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)| | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements specially adapted for wireless communication networks | (ref: H04W12/00)0.059
G06F21/6281at program execution time  where the protection is within the operating system0.059
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.