Validity Report
Basic Report
US10873595B1 — Real-time vulnerability monitoring
Priority Date: 2003-07-01, Publication Date: 2020-12-22, Current Assignee: SecurityProfiling IncReport Generated: 2021-12-08

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1512075A1●●●●●ADAPTIVE INTRUSION DETECTION SYSTEMGRANT2005-03-092002-05-22GreatLucid Security CorpLucid Security Corp
US7926113B1●●●●●System and method for managing network vulnerability analysis systemsGRANT2011-04-122003-06-09GreatTenable Network Security IncTenable Inc
EP1461707A1●●●●●AUTOMATED COMPUTER VULNERABILITY RESOLUTION SYSTEMGRANT2004-09-292001-12-31GreatCitadel Security Software IncCitadel Security Software Inc
EP1559008A1●●●●●SYSTEM AND METHOD FOR RISK DETECTION AND ANALYSIS IN A COMPUTER NETWORKGRANT2005-08-032002-10-01GreatSkybox Security LtdSkybox Security Ltd
US7359962B2●●●●●Network security system integrationGRANT2008-04-152002-04-30Great3Com CorpTrend Micro Inc, HP Inc
US7181769B1●●●●●Network security system having a device profiler communicatively coupled to a traffic monitorGRANT2007-02-202000-08-25GreatNcircle Network Security IncTripwire Inc
US6546493B1●●●●●System  method and computer program product for risk assessment scanning based on detected anomalous eventsGRANT2003-04-082001-11-30GreatNetworks Associates Technology IncMcAfee LLC
US7451488B2●●●●●Policy-based vulnerability assessmentGRANT2008-11-112003-04-29GreatSecurify IncMcAfee LLC
US8266703B1●●●●●System  method and computer program product for improving computer network intrusion detection by risk prioritizationGRANT2012-09-112001-11-30GreatMcAfee LLCMcAfee LLC
US20040064726A1●●●●●Vulnerability management and tracking system (VMTS)APPLICATION2004-04-012002-09-30GreatElectronic Data Systems LLCHewlett Packard Development Co LP
US7574740B1●●●●●Method and system for intrusion detection in a computer networkGRANT2009-08-112000-04-28GreatInternational Business Machines CorpInternational Business Machines Corp
US7278161B2●●●●●Protecting a data processing system from attack by a vandal who uses a vulnerability scannerGRANT2007-10-022001-10-01GreatInternational Business Machines CorpTrend Micro Inc
US20030135749A1●●●●●System and method of defining the security vulnerabilities of a computer systemAPPLICATION2003-07-172001-10-31GreatHewlett Packard CoHewlett Packard Development Co LP
EP1470691B1●●●●●INTEGRATED NETWORK INTRUSION DETECTIONGRANT2012-06-132002-02-01GreatIntel CorpIntel Corp
EP1574013B1●●●●●CONTENT MANAGEMENT SYSTEMGRANT2009-06-172002-12-13GreatComputer Associates Think IncCA Inc
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
624
Recommended Classes
156
Government Assigned Classes
5
CPC
Title
Score
H04L63/1433Vulnerability analysis●●●●●
G06F21/577Assessing vulnerabilities and evaluating computer system security●●●●●
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)●●●●●
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)●●●●●
G06F12/14Protection against unauthorised use of memory | or access to memory●●●●●
G06F21/55Detecting local intrusion or implementing counter-measures●●●●●
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements●●●●●
G06F8/60Software deployment●●●●●
H04L63/14for detecting or protecting against malicious traffic●●●●●
H04L63/0254Stateful filtering●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.