Validity Report
Full Report
US8850517B2 — Runtime risk detection based on user, application, and system action sequence correlation
Priority Date: 2013-01-15, Publication Date: 2014-09-30, Current Assignee: TAASERA IncReport Generated: 2022-12-21

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP2645244B10.786Method and registry for enabling the enforcement of design-time policies during runtime in a service-oriented architectureGRANT2019-09-112012-03-2745936927GreatSoftware AGSoftware AG
EP2769325A10.780USER BEHAVIORAL RISK ASSESSMENTGRANT2014-08-272011-10-1848086922GreatMcAfee LLCMcAfee LLC
US8613040B20.768Adaptive data loss prevention policiesGRANT2013-12-172008-12-2241666976GreatSymantec CorpCA Inc
US8793151B20.743System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontologyGRANT2014-07-292009-08-2843626199GreatSRC IncFortinet Inc
US8776168B10.737Applying security policy based on behaviorally-derived user risk profilesGRANT2014-07-082009-10-2951031993GreatSymantec CorpCA Inc
WO2008082780A20.718PERFORMANCE ASSESSMENT OF POLICIES IN POLICY BASED NETWORKSAPPLICATION2008-07-102006-12-2939585410Great
US8478708B10.712System and method for determining risk posed by a web userGRANT2013-07-022009-07-3048671313GreatZscaler IncZscaler Inc
EP2335168A20.710DATA-TIER APPLICATION COMPONENT FABRIC MANAGEMENTGRANT2011-06-222008-09-3042058551GreatMicrosoft CorpMicrosoft Technology Licensing LLC
WO2013067006A10.701SYSTEM AND METHOD FOR APPLICATION SECURITY AND PERFORMANCE ASSESSMENTAPPLICATION2013-05-102011-10-3147557451Great
EP2939174A10.690WEB APPLICATION CONTAINER FOR CLIENT-LEVEL RUNTIME CONTROLGRANT2015-11-042012-12-2851018947GreatIntel CorpIntel Corp
EP2676417B10.683AIRPORT SECURITY SYSTEMGRANT2021-03-102011-02-1645592795GreatBoeing CoBoeing Co
US8739290B10.676Generating alerts in event management systemsGRANT2014-05-272011-09-2950736688GreatEMC CorpRSA Security LLC
US10068193B20.676System and method for risk detection reporting and infrastructureGRANT2018-09-042003-06-0933551624GreatA-T SOLUTIONS IncSmartsafety Software Inc
EP2329415A20.666DATA-TIER APPLICATION COMPONENTGRANT2011-06-082008-09-2642059118GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US10057285B20.658System and method for auditing governance  risk  and compliance using a pluggable correlation architectureGRANT2018-08-212009-01-3042398453GreatOracle International CorpOracle International Corp
EP2769327A10.651SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENTGRANT2014-08-272011-10-1748086901GreatMcAfee LLCMcAfee LLC
US8776180B20.650Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platformsGRANT2014-07-082012-05-0149513663GreatTAASERA IncTAASERA Inc
EP2766845A10.647MANAGING POLICIESGRANT2014-08-202011-10-1347645028GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP2769326A10.639USER-DEFINED COUNTERMEASURESGRANT2014-08-272011-10-1848086600GreatMcAfee LLCMcAfee LLC
US20100125911A10.629Risk Scoring Based On Endpoint User ActivitiesAPPLICATION2010-05-202008-11-1742173033GreatCisco Technology IncCisco Technology Inc
EP1842312A20.628METHOD AND APPARATUS OF ADAPTIVE NETWORK POLICY MANAGEMENT FOR WIRELESS MOBILE COMPUTERSGRANT2007-10-102005-01-0436642220GreatSymbol Technologies LLCSymbol Technologies LLC
US8607340B20.626Host intrusion prevention system using software and user behavior analysisGRANT2013-12-102009-07-2143498433GreatSophos LtdSophos Ltd
EP2769324A10.620SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENTGRANT2014-08-272011-10-1748086900GreatMcAfee LLCMcAfee LLC
EP1465063A20.616Enhanced runtime hostingGRANT2004-10-062003-04-0232850618GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP2035949B10.615DECLARATIVE MANAGEMENT FRAMEWORKGRANT2021-03-242006-06-1356290857GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20120046989A10.614SYSTEMS AND METHODS FOR DETERMINING RISK OUTLIERS AND PERFORMING ASSOCIATED RISK REVIEWSAPPLICATION2012-02-232010-08-1745594793GreatBank of America CorpBank of America Corp
EP1696315B10.612Automated data organizationGRANT2013-10-302005-02-2836693570GreatMicrosoft CorpMicrosoft Corp
US8239953B10.609Applying differing security policies for users who contribute differently to machine hygieneGRANT2012-08-072009-03-2646583394GreatSymantec CorpCA Inc
US20110131658A10.608DYNAMIC RISK MANAGEMENTAPPLICATION2011-06-022007-02-0639677311GreatMicrosoft CorpMicrosoft Technology Licensing LLC
WO2004021637A10.599THREAT ASSESSMENT ORCHESTRATOR SYSTEM AND METHODAPPLICATION2004-03-112002-08-2831976587Great
US9754256B20.593Variable risk engineGRANT2017-09-052010-10-1945935301Great41st Parameter Inc41st Parameter Inc
US10003547B20.585Monitoring computer process resource usageGRANT2018-06-192010-05-0753718925GreatZiften Technologies IncZiften Technologies Inc
EP2724235A10.584N-WAY RUNTIME INTEROPERATIVE DEBUGGINGGRANT2014-04-302011-06-2447363015GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US7490356B20.581End user risk managementGRANT2009-02-102004-07-2035414786GreatReflectent Software IncCitrix Systems Inc
US8418229B20.580Systems and methods for performing access entitlement reviewsGRANT2013-04-092010-08-1745595125GreatBank of America CorpBank of America Corp
US8990886B20.579Techniques of transforming policies to enforce control in an information management systemGRANT2015-03-242005-12-2939171305GreatNextlabs IncNextlabs Inc
US10749887B20.573Assessing security risks of users in a computing networkGRANT2020-08-182011-04-0859631211GreatProofpoint IncProofpoint Inc
US8516597B10.572Method to calculate a risk score of a folder that has been scanned for confidential informationGRANT2013-08-202010-12-0248952319GreatSymantec CorpCA Inc
US10248915B20.572Risk profiling for enterprise risk managementGRANT2019-04-022008-03-0741054582GreatInternational Business Machines CorpInternational Business Machines Corp
US8751623B20.564Reduction of alerts in information technology systemsGRANT2014-06-102011-04-0846966966GreatInternational Business Machines CorpGlobalFoundries US Inc
US9137263B20.557Generating role-based access control policies based on discovered risk-averse rolesGRANT2015-09-152013-01-0451062069GreatInternational Business Machines CorpInternational Business Machines Corp
US8091065B20.555Threat analysis and modeling during a software development lifecycle of a software applicationGRANT2012-01-032007-09-2540473069GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9280911B20.554Context-aware training systems  apparatuses  and methodsGRANT2016-03-082011-04-0846000373GreatWombat Security Technologies IncProofpoint Inc
US8353021B10.550Determining firewall rules for an application on a client based on firewall rules and reputations of other clientsGRANT2013-01-082008-09-3047428039GreatSymantec CorpCA Inc
US20130055342A10.550Risk-based model for security policy managementAPPLICATION2013-02-282011-08-2447745659GreatInternational Business Machines CorpInternational Business Machines Corp
US20080288330A10.550SYSTEM AND METHOD FOR USER ACCESS RISK SCORINGAPPLICATION2008-11-202007-05-1440002654GreatSailpoint Technologies IncSailpoint Technologies Inc
US8677448B10.549Graphical user interface including usage trending for sensitive filesGRANT2014-03-182010-12-1450240531GreatSymantec CorpCA Inc
EP2002634A10.549SYSTEM FOR ENFORCING SECURITY POLICIES ON MOBILE COMMUNICATIONS DEVICESGRANT2008-12-172006-03-2737527128GreatTelecom Italia SpATelecom Italia SpA
US20020198750A10.548Risk management application and methodAPPLICATION2002-12-262001-06-2125388914GreatGeneral Electric CoGeneral Electric Co
US9742778B20.547Differential security policies in email systemsGRANT2017-08-222009-09-0943648670GreatInternational Business Machines CorpInternational Business Machines Corp
US8256004B10.542Control transparency frameworkGRANT2012-08-282008-10-2946689953GreatBank of America CorpBank of America Corp
US8918881B20.541Off-device anti-malware protection for mobile devicesGRANT2014-12-232012-02-2449004782GreatAppthority LLCCA Inc
US8812342B20.538Managing and monitoring continuous improvement in detection of compliance violationsGRANT2014-08-192010-06-1545097373GreatInternational Business Machines CorpInternational Business Machines Corp
US9619652B20.537System  method and computer program product for determining a risk score for an entityGRANT2017-04-112010-03-3144711186GreatSalesforce com IncSalesforce com Inc
US8819772B20.536In-line filtering of insecure or unwanted mobile device software components or communicationsGRANT2014-08-262012-06-2549775630GreatAppthority LLCCA Inc
US8639618B20.533System and method of detecting and assessing multiple types of risks related to mortgage lendingGRANT2014-01-282010-01-1344259274GreatCoreLogic Solutions LLCCoreLogic Solutions LLC
US8713684B20.529Quantifying the risks of applications for mobile devicesGRANT2014-04-292012-02-2449004805GreatAppthority LLCCA Inc
EP2584488A10.527System and method for detecting computer security threats based on verdicts of computer usersGRANT2013-04-242011-09-2047891230GreatKaspersky Lab AOKaspersky Lab AO
US9373267B20.526Method and system for controlling context-aware cybersecurity trainingGRANT2016-06-212011-04-0851165414GreatWombat Security Technologies IncProofpoint Inc
US9558677B20.525Mock attack cybersecurity training system and methodsGRANT2017-01-312011-04-0851165415GreatWombat Security Technologies IncProofpoint Inc
US20160232465A10.523SUBSCRIBER-BASED SYSTEM FOR CUSTOM EVALUATIONS OF BUSINESS RELATIONSHIP RISKAPPLICATION2016-08-112011-06-0347259921GreatSECURIMATE IncSECURIMATE Inc
EP2648145A10.523System and method for filtering spam messages based on user reputationGRANT2013-10-092012-04-0646799066GreatKaspersky Lab AOKaspersky Lab AO
US20120210434A10.521Security countermeasure management platformAPPLICATION2012-08-162011-02-1146637961GreatAchilles Guard IncAlert Logic Inc
US9824609B20.514Mock attack cybersecurity training system and methodsGRANT2017-11-212011-04-0858499789GreatWombat Security Technologies IncProofpoint Inc
US9323935B20.512User device security profileGRANT2016-04-262012-12-1850932634GreatMcAfee LLCMcAfee LLC
US20100251369A10.510METHOD AND SYSTEM FOR PREVENTING DATA LEAKAGE FROM A COMPUTER FACILTYAPPLICATION2010-09-302009-03-2542786010GreatSophos LtdSophos Ltd
US8832848B10.508Systems and methods for content-aware access controlGRANT2014-09-092012-07-2651455427GreatSymantec CorpCA Inc
US9639678B20.506Identity risk score generation and implementationGRANT2017-05-022012-06-2948747784GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20110321175A10.506MONITORING AND REPORTING OF DATA ACCESS BEHAVIOR OF AUTHORIZED DATABASE USERSAPPLICATION2011-12-292010-06-2345353921GreatSalesforce com IncSalesforce com Inc
US8612541B20.504Method and apparatus for multi-tenant policy management in a network deviceGRANT2013-12-172011-04-2947068811GreatBlue Coat Systems LLCCA Inc
US8145241B20.502Methods  systems  and computer program products for role- and locale-based mobile user device feature controlGRANT2012-03-272005-06-3037590257GreatArmstrong Quinton Co LLCChemtron Research LLC
US7530106B10.500System and method for security rating of computer processesGRANT2009-05-052008-07-0240585038GreatKaspersky Lab AOKaspersky Lab AO
US9930061B20.498System and method for cyber attacks analysis and decision supportGRANT2018-03-272012-02-2949004812GreatCytegic LtdSaul Acquisition Sub LLC
US8494974B20.497Targeted security implementation through security loss forecastingGRANT2013-07-232010-01-1844278261GreatIsight Partners IncMandiant Inc
US8438644B20.496Information system security based on threat vectorsGRANT2013-05-072011-03-0745833165GreatIsight Partners IncMandiant Inc
US9495538B20.495Graduated enforcement of restrictions according to an application's reputationGRANT2016-11-152008-09-2541508158GreatSymantec CorpCA Inc
US6535227B10.494System and method for assessing the security posture of a network and having a graphical user interfaceGRANT2003-03-182000-02-0823988031GreatHarris CorpStingray IP Solutions LLC
US9741032B20.555Security brokerGRANT2017-08-222012-12-1850932112GoodMcAfee LLCMcAfee LLC
US8312549B20.509Practical threat analysisGRANT2012-11-132004-09-2436090401Good
US8181253B10.492System and method for reducing security risk in computer networkGRANT2012-05-152011-04-1946000918GoodKaspersky Lab AOKaspersky Lab AO
US9031892B20.492Real time safety management system and methodGRANT2015-05-122012-04-1949381065GoodInvensys Systems IncSchneider Electric Systems USA Inc
US8413211B20.492Access control policy compliance check processGRANT2013-04-022008-05-3040740152GoodFujitsu LtdFujitsu Ltd
US20120005115A10.487PROCESS RISK PRIORITIZATION APPLICATIONAPPLICATION2012-01-052010-06-3045400448GoodBank of America CorpBank of America Corp
US8566932B10.486Enforcing good network hygiene using reputation-based automatic remediationGRANT2013-10-222009-07-3149355419GoodSymantec CorpCA Inc
WO2012068334A10.480METADATA DATABASE SYSTEM AND METHODAPPLICATION2012-05-242010-11-1746048732Good
US20110185436A10.477URL FILTERING BASED ON USER BROWSER HISTORYAPPLICATION2011-07-282010-01-2844310014GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9537892B20.477Facilitating separation-of-duties when provisioning access rights in a computing systemGRANT2017-01-032012-12-2051622207GoodBank of America CorpBank of America Corp
US8327441B20.477System and method for application attestationGRANT2012-12-042011-02-1746653839GoodTAASERA IncTAASERA Inc
US6405318B10.475Intrusion detection systemGRANT2002-06-111999-03-1223021397GoodPsionic Software IncCisco Technology Inc
US9015795B20.474Reputation-based auditing of enterprise application authorization modelsGRANT2015-04-212012-09-1050234786GoodOracle International CorpOracle International Corp
US20060282660A10.474System and method for fraud monitoring  detection  and tiered user authenticationAPPLICATION2006-12-142005-04-2937308508GoodBharosa IncOracle International Corp
US8775206B20.471Healthcare privacy violation detection and investigation system and methodGRANT2014-07-082012-06-2649513301GoodIndividualIndividual
US8473318B20.470Risk score determinationGRANT2013-06-252011-07-1947556419GoodBank of America CorpBank of America Corp
US20150066772A10.469INTEGRATED RISK ASSESSMENT AND MANAGEMENT SYSTEMAPPLICATION2015-03-052009-12-0144069564GoodBank of America CorpBank of America Corp
US20090138939A10.467SYSTEM AND METHOD FOR INFERRING ACCESS POLICIES FROM ACCESS EVENT RECORDSAPPLICATION2009-05-282007-11-0940670880GoodApplied Identity IncCitrix Systems Inc
US7571483B10.466System and method for reducing the vulnerability of a computer network to virus threatsGRANT2009-08-042005-08-2540910279GoodLockheed Martin CorpLockheed Martin Corp
US20100154026A10.466AUTOMATED SOFTWARE RESTRICTION POLICY RULE GENERATIONAPPLICATION2010-06-172008-12-1642242198GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9542433B20.465Quality assurance checks of access rights in a computing systemGRANT2017-01-102012-12-2051569915GoodBank of America CorpBank of America Corp
US9489497B20.463Systems and methods for network risk reductionGRANT2016-11-082012-12-2851018557GoodEquifax IncEquifax Inc
US8201255B10.463Hygiene-based discovery of exploited portalsGRANT2012-06-122009-06-3046177953GoodSymantec CorpCA Inc
US20160182545A10.462METHODS  SYSTEMS  AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIORAPPLICATION2016-06-232008-12-0242982013GoodColumbia University of New YorkColumbia University of New York
US9055053B20.462Method and apparatus for token-based combining of risk ratingsGRANT2015-06-092011-08-1547713650GoodBank of America CorpBank of America Corp
US20110289588A10.461Unification of security monitoring and IT-GRCAPPLICATION2011-11-242010-05-2044973581GoodEGESTALT TECHNOLOGIES IncEGESTALT TECHNOLOGIES Inc
US20090276204A10.460METHOD AND SYSTEM FOR POLICY SIMULATIONAPPLICATION2009-11-052008-04-3041257667GoodApplied Identity IncCitrix Systems Inc
US20090293121A10.458DEVIATION DETECTION OF USAGE PATTERNS OF COMPUTER RESOURCESAPPLICATION2009-11-262008-05-2141343082GoodInternational Business Machines CorpInternational Business Machines Corp
US9529629B20.457Computing resource inventory systemGRANT2016-12-272012-12-2051569993GoodBank of America CorpBank of America Corp
US20150178647A10.456METHOD AND SYSTEM FOR PROJECT RISK IDENTIFICATION AND ASSESSMENTAPPLICATION2015-06-252012-07-0953400412GoodSysenex IncSysenex Inc
US9477838B20.455Reconciliation of access rights in a computing systemGRANT2016-10-252012-12-2051570157GoodBank of America CorpBank of America Corp
US8832840B20.452Mobile application security and management serviceGRANT2014-09-092011-10-2648173896GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US20090030756A10.450Managing Risk Associated with Various TransactionsAPPLICATION2009-01-292007-07-2740296194GoodBank of America CorpBank of America Corp
US8099760B20.449System and method for risk detection and analysis in a computer networkGRANT2012-01-172002-10-0132068260GoodSkybox Security IncSkybox Security Inc
US8407757B20.449Specifying and enforcing run-time policies for application processes being executed on a computerGRANT2013-03-262008-01-0440845653GoodInternational Business Machines CorpInternational Business Machines Corp
US8726361B20.449Method and apparatus for token-based attribute abstractionGRANT2014-05-132011-08-1547713642GoodBank of America CorpBank of America Corp
US20060212931A10.449Trust evaluation systems and methodsAPPLICATION2006-09-212005-03-0236941880GoodMarkMonitor IncMarkMonitor Inc
US8959624B20.448Executable download tracking systemGRANT2015-02-172007-10-3140149682GoodBank of America CorpBank of America Corp
US8682708B20.446Reputation risk frameworkGRANT2014-03-252009-10-2943926373GoodBank of America CorpBank of America Corp
US8914382B20.446System and method for generation of a dynamic social pageGRANT2014-12-162011-10-0347993622GoodYahoo IncYahoo Inc, R2 Solutions LLC
US8505069B10.444System and method for updating authorized softwareGRANT2013-08-062012-08-1047563027GoodKaspersky Lab AOKaspersky Lab AO
US9253197B20.442Method and apparatus for token-based real-time risk updatingGRANT2016-02-022011-08-1547713659GoodBank of America CorpBank of America Corp
US9275345B10.440System level user behavior biometrics using feature extraction and modelingGRANT2016-03-012011-02-1155360002GoodAllure Security Technology IncAllure Security Technology Inc
US20090292743A10.440MODELING USER ACCESS TO COMPUTER RESOURCESAPPLICATION2009-11-262008-05-2141342854GoodInternational Business Machines CorpDaedalus Blue LLC
US20040015375A10.439System and method for reducing riskAPPLICATION2004-01-222001-04-0230447892Good
US9069599B20.438System and method for a cloud computing abstraction layer with security zone facilitiesGRANT2015-06-302008-06-1946491761GoodServiceMesh IncCSC Agility Platform Inc
US20140007214A10.436GATEWAY FOR CONTROLLING MOBILE DEVICE ACCESS TO ENTERPRISE RESOURCESAPPLICATION2014-01-022011-10-1149779221GoodCitrix Systems Inc, Zenprise IncCitrix Systems Inc, Zenprise Inc
US20040193912A10.436Methods and systems for managing security policiesAPPLICATION2004-09-302003-03-3132990231GoodIntel CorpIntel Corp
US20140109197A10.434METHOD AND A SYSTEM TO GENERATE AND MANAGE NATIVE APPLICATIONSAPPLICATION2014-04-172011-04-1546320890GoodTelefonica SATelefonica SA
US7272719B20.433Method to control access between network endpoints based on trust scores calculated from information system component analysisGRANT2007-09-182004-11-2936568516GoodSignaCert IncKIP SIGN P1 LP, Silicon Valley Bank Inc
US20110093955A10.430DESIGNING SECURITY INTO SOFTWARE DURING THE DEVELOPMENT LIFECYCLEAPPLICATION2011-04-212009-10-1943880300GoodBank of America CorpBank of America Corp
US8019678B20.429Method and apparatus for evaluating fraud risk in an electronic commerce transactionGRANT2011-09-132001-05-3026839930GoodCyberSource CorpCyberSource Corp
US7487358B20.427Method to control access between network endpoints based on trust scores calculated from information system component analysisGRANT2009-02-032004-11-2938713284GoodSignaCert IncKIP SIGN P1 LP
US20040044912A10.425Determining threat level associated with network activityAPPLICATION2004-03-042002-08-2631946943GoodGuardedNet IncInternational Business Machines Corp, GuardedNet Inc
US8392237B20.424Compliance methodologyGRANT2013-03-052010-02-0244342413GoodBank of America CorpBank of America Corp
US8972325B20.421Role based identity trackerGRANT2015-03-032009-07-0143413172GoodOracle International CorpOracle International Corp
US8800034B20.420Insider threat correlation toolGRANT2014-08-052010-01-2645807971GoodBank of America CorpBank of America Corp
US9774612B20.419Managing virtual computing testingGRANT2017-09-262010-12-2950781451GoodAmazon Technologies IncAmazon Technologies Inc
US7631362B20.418Method and system for adaptive identity analysis  behavioral comparison  compliance  and application protection using usage informationGRANT2009-12-082005-09-2037885748GoodInternational Business Machines CorpInternational Business Machines Corp
US20070039049A10.418Real-time activity monitoring and reportingAPPLICATION2007-02-152005-08-1137744044GoodNetManage IncMicro Focus US Inc
US20060191007A10.416Security force automationAPPLICATION2006-08-242005-02-2436914408Good
US20070220604A10.415System and Method of Fraud and Misuse DetectionAPPLICATION2007-09-202005-05-3139767170GoodFAIRWARNING IP LLCFAIRWARNING IP LLC
US8813050B20.412Electronic crime detection and trackingGRANT2014-08-192008-06-0341381446GoodIsight Partners IncMandiant Inc
US7987495B20.410System and method for multi-context policy managementGRANT2011-07-262006-12-2639544886GoodComputer Associates Think IncCA Inc
US20050203881A10.410Database user behavior monitor system and methodAPPLICATION2005-09-152004-03-0934919953GoodIPLocks IncFortinet Inc
US20050097320A10.410System and method for risk based authenticationAPPLICATION2005-05-052003-09-1234312372GoodCyota IncEMC Corp, Cyota Inc, Individual
US11522896B20.408Managing virtual computing testingGRANT2022-12-062010-12-2952101962GoodAmazon Technologies IncAmazon Technologies Inc
US8918834B10.405Creating custom policies in a remote-computing environmentGRANT2014-12-232010-12-1752101965GoodAmazon Technologies IncAmazon Technologies Inc
US8782209B20.404Insider threat correlation toolGRANT2014-07-152010-01-2644309807GoodBank of America CorpBank of America Corp
WO2013025455A10.401METHOD AND APPARATUS FOR HANDLING RISK TOKENSAPPLICATION2013-02-212011-08-1547715378Good
US20070239495A10.399Application Risk and Control Assessment ToolAPPLICATION2007-10-112006-04-1138529472GoodBank of America CorpBank of America Corp
US7818797B10.399Methods for cost-sensitive modeling for intrusion detection and responseGRANT2010-10-192001-10-1142941353GoodColumbia University of New YorkColumbia University of New York
US20070094711A10.398Method and system for dynamic adjustment of computer security based on network activity of usersAPPLICATION2007-04-262005-10-2037667681GoodInternational Business Machines CorpInternational Business Machines Corp
US20080052102A10.398System and method for collecting and normalizing entitlement data within an enterpriseAPPLICATION2008-02-282006-08-0239197783GoodAveksa IncEMC Corp
US9990481B20.397Behavior-based identity systemGRANT2018-06-052012-07-2353267934GoodAmazon Technologies IncAmazon Technologies Inc
US20080027924A10.397PERSONA-BASED APPLICATION PERSONALIZATIONAPPLICATION2008-01-312006-07-2538987598GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7287280B20.396Automated security managementGRANT2007-10-232002-02-1227659910GoodGoldman Sachs and Co LLCGoldman Sachs and Co LLC
US9038187B20.396Insider threat correlation toolGRANT2015-05-192010-01-2644309713GoodBank of America CorpBank of America Corp
US7818788B20.391Web application security frameGRANT2010-10-192006-02-1438429898GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20050183143A10.390Methods and systems for monitoring user  application or device activityAPPLICATION2005-08-182004-02-1334838407GoodSERGEANT LABORATORIES IncSERGEANT LABORATORIES Inc
US7213146B20.389System and method for establishing security profiles of computersGRANT2007-05-012001-02-2025146881GoodHewlett Packard Development Co LPMicro Focus LLC
US8793789B20.389Insider threat correlation toolGRANT2014-07-292010-07-2245494649GoodBank of America CorpBank of America Corp
US20050033991A10.388Apparatus for and method of evaluating security within a data processing or transactional environmentAPPLICATION2005-02-102003-06-2727637439GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US10333916B20.387Disposable browsers and authentication techniques for a secure online user environmentGRANT2019-06-252010-03-3044711171GoodAuthentic8 IncAuthentic8 Inc
US20080052054A10.384METHOD AND APPARATUS FOR RISK MANAGEMENTAPPLICATION2008-02-281999-12-0323800833GoodDigital Sandbox IncDigital Sandbox Inc
US9779260B10.384Aggregation and classification of secure dataGRANT2017-10-032012-06-1155700039GoodDell Software IncQuest Software Inc
US20130018921A10.383NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISKAPPLICATION2013-01-172011-07-1347505565GoodInternational Business Machines CorpInternational Business Machines Corp
US9661004B10.383Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactionsGRANT2017-05-232010-09-1349841057GoodSymantec CorpCA Inc
US9189619B20.382Runtime based application security and regulatory compliance in cloud environmentGRANT2015-11-172012-11-1350683039GoodInternational Business Machines CorpInternational Business Machines Corp
US20150213369A10.381SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS AND NETWORK INTRUSION PROTECTION IN AN INDUSTRIAL ENVIRONMENTAPPLICATION2015-07-302002-10-2147598089GoodRockwell Automation Technologies IncRockwell Automation Technologies Inc
WO2013082190A10.379TRANSACTION SECURITY GRADUATED SEASONING AND RISK SHIFTING APPARATUSES  METHODS AND SYSTEMSAPPLICATION2013-06-062011-11-2848536025Good
US20060101517A10.379Inventory management-based computer vulnerability resolution systemAPPLICATION2006-05-112004-10-2836317897GoodCitadel Security Software IncMcAfee LLC, Individual
US20140373160A10.379VULNERABILITY COUNTERMEASURE DEVICE AND VULNERABILITY COUNTERMEASURE METHODAPPLICATION2014-12-182011-09-0847831667GoodHitachi LtdHitachi Ltd
US9129257B20.378Method and system for monitoring high risk usersGRANT2015-09-082010-12-2046235561GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US20070113281A10.378Method used in the control of a physical system affected by threatsAPPLICATION2007-05-172003-10-3129725764Good
US9348985B20.376Behavioral fingerprint controlled automatic task determinationGRANT2016-05-242011-11-2348428265GoodElwha LLCRPX Corp
US20060156408A10.375Method of assuring enterprise security standards complianceAPPLICATION2006-07-132005-01-1136654886GoodInternational Business Machines CorpTwitter Inc
US8806593B10.374Guest account management using cloud based security servicesGRANT2014-08-122011-05-1951267537GoodZscaler IncZscaler Inc
US20020116631A10.373Method of and system for managing information  and computer productAPPLICATION2002-08-222000-12-2018854719GoodFujitsu LtdFujitsu Ltd
US20070157311A10.373Security modeling and the application life cycleAPPLICATION2007-07-052005-12-2938226257GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6347374B10.372Event detectionGRANT2002-02-121998-06-0522234411GoodIntrusion com IncODS NETWORKS Inc, INTRUSION Inc
US8856315B20.372Device classification systemGRANT2014-10-072009-05-2943221248GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US8086730B20.371Method and system for monitoring a workstationGRANT2011-12-272009-05-1343069397GoodInternational Business Machines CorpInternational Business Machines Corp
US9456054B20.371Controlling the spread of interests and content in a content centric networkGRANT2016-09-272008-05-1640716991GoodPalo Alto Research Center IncCisco Technology Inc
US9712551B20.369Methods and systems for architecture-centric threat modeling  analysis and visualizationGRANT2017-07-182012-11-3049641541GoodBoeing CoBoeing Co
US8813232B20.368Systems and methods for risk rating and pro-actively detecting malicious online adsGRANT2014-08-192010-03-0444532431GoodMcAfee LLCMcAfee LLC
US9106687B10.368Mechanism for profiling user and group accesses to content repositoryGRANT2015-08-112011-11-0153763396GoodSymantec CorpCA Inc
US7451403B10.365System and method for developing user interfaces purely by modeling as meta data in software applicationGRANT2008-11-112002-12-2039940924GoodRage Frameworks IncGenpact Luxembourg SARL, Rage Frameworks Inc
US9082128B20.365System and method for tracking and scoring user activitiesGRANT2015-07-142009-10-1943430976GoodUniloc Luxembourg SAUniloc 2017 LLC
US20070143474A10.364Web Service Information Management in Service-Oriented Architecture ApplicationsAPPLICATION2007-06-212005-12-1538189172GoodInternational Business Machines CorpInternational Business Machines Corp
US20060212932A10.363System and method for coordinating network incident response activitiesAPPLICATION2006-09-212005-01-1037011879GoodArcSight LLC, Arcsight Enira Sub LLCHewlett Packard Enterprise Development LP
US6981040B10.358Automatic  personalized online information and product servicesGRANT2005-12-271999-12-2835482767GoodUtopy IncPersonalized User Model PUM
US8032448B20.358Detecting and measuring risk with predictive models using content miningGRANT2011-10-042000-06-3026910134GoodFair Isaac CorpFair Isaac Corp
US9443085B20.358Intrusion detection using taint accumulationGRANT2016-09-132011-07-1947556782GoodElwha LLCRPX Corp
US20130036123A10.357ANTI-TAMPER PROCESS TOOLSETAPPLICATION2013-02-072008-01-1640851754GoodRaytheon CoRaytheon Co
US20070067846A10.355Systems and methods of associating security vulnerabilities and assetsAPPLICATION2007-03-222005-09-2237622207GoodAlcatel SAAlcatel Lucent SAS
US20130006678A10.355SYSTEM AND METHOD FOR DETECTING HUMAN-SPECIFIED ACTIVITIESAPPLICATION2013-01-032011-06-2847391497GoodPalo Alto Research Center IncPalo Alto Research Center Inc
US20110179477A10.355SYSTEM INCLUDING PROPERTY-BASED WEIGHTED TRUST SCORE APPLICATION TOKENS FOR ACCESS CONTROL AND RELATED METHODSAPPLICATION2011-07-212005-12-0945063222GoodHarris CorpKIP SIGN P1 LP
US9824199B20.353Multi-factor profile and security fingerprint analysisGRANT2017-11-212011-08-2547745676GoodT Mobile USA IncT Mobile USA Inc
US7774824B20.351Multifactor device authenticationGRANT2010-08-102004-06-0935462063GoodIntel CorpIntel Corp
US7243374B20.349Rapid application security threat analysisGRANT2007-07-102001-08-0825454705GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9026476B20.349System and method for personalized media rating and related emotional profile analyticsGRANT2015-05-052011-05-0947139750Good
US20030097581A10.349Technique to support co-location and certification of executable content from a pre-boot space into an operating system runtime environmentAPPLICATION2003-05-222001-09-2825512790GoodIntel CorpIntel Corp
US9143509B20.348Granular assessment of device stateGRANT2015-09-222011-05-2047175994GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9747581B20.346Context-dependent transactional management for separation of dutiesGRANT2017-08-292012-07-0249779052GoodInternational Business Machines CorpInternational Business Machines Corp
US6334121B10.346Usage pattern based user authenticatorGRANT2001-12-251998-05-0426770633GoodVirginia Commonwealth UniversityVirginia Commonwealth University
US5557742A0.345Method and system for detecting intrusion into and misuse of a data processing systemGRANT1996-09-171994-03-0722772890GoodHaystack Labs IncMcAfee LLC
US8955111B20.344Instruction set adapted for security risk monitoringGRANT2015-02-102011-09-2447912765GoodElwha LLCRPX Corp
US8448244B10.343Methods and systems for fused files comprising logic and content dataGRANT2013-05-212010-01-0848365481GoodAdobe Systems IncAdobe Inc
US8321363B20.342Technology evaluation and selection applicationGRANT2012-11-272010-07-2845527758GoodBank of America CorpBank of America Corp
US20050132122A10.341Method  apparatus and system for monitoring system integrity in a trusted computing environmentAPPLICATION2005-06-162003-12-1634654229GoodIntel CorpIntel Corp
US20070067845A10.338Application of cut-sets to network interdependency security risk assessmentAPPLICATION2007-03-222005-09-2237496688GoodAlcatel SAAlcatel Lucent SAS
US7424742B10.337Dynamic security events and event channels in a network security systemGRANT2008-09-092004-10-2739734439GoodArcSight LLCMicro Focus LLC
US20100198660A10.337SUBCONTRACTOR COMPLIANCE MEASUREMENTAPPLICATION2010-08-052009-01-3042396013GoodBank of America CorpBank of America Corp
US20140244559A10.337Data structure and method for performing mishap risk of a systemAPPLICATION2014-08-282012-01-3151389230GoodUS Department of NavyUnited States, REPRESETED BY SEC OF NAVY, US Department of Navy
US7509677B20.336Pattern discovery in a network security systemGRANT2009-03-242004-05-0435240831GoodArcSight LLCMicro Focus LLC
US7058822B20.335Malicious mobile code runtime monitoring system and methodsGRANT2006-06-062000-03-3027394815GoodFinjan Software LtdFinjan LLC
US20080289028A10.334FIREWALL FOR CONTROLLING CONNECTIONS BETWEEN A CLIENT MACHINE AND A NETWORKAPPLICATION2008-11-202007-05-1540028861GoodInternational Business Machines CorpGlobalFoundries US Inc
US9117076B20.333System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activityGRANT2015-08-252012-03-1449213608GoodWINTERMUTE LLCWINTERMUTE LLC
US20090112649A10.332METHOD AND SYSTEM FOR ASSESSING FINANCIAL RISK ASSOCIATED WITH A BUSINESS ENTITYAPPLICATION2009-04-302007-10-3040584046GoodIntuit IncIntuit Inc
US9235586B20.330Reputation checking obtained filesGRANT2016-01-122010-09-1345380116GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20030177394A10.330System and method of enforcing executable code identity verification over the networkAPPLICATION2003-09-182001-12-2628044887GoodCA IncINTERNET SECURITY ALLIANCE Inc
US5812763A0.329Expert system having a plurality of security inspectors for detecting security flaws in a computer systemGRANT1998-09-221988-02-1722563831GoodDigital Equipment CorpHewlett Packard Development Co LP
US10742591B20.328System for domain reputation scoringGRANT2020-08-112011-07-0655403911GoodAkamai Technologies IncAkamai Technologies Inc
US8589557B10.328Automatic provisioning of resources to software offeringsGRANT2013-11-192011-02-2249555895GoodIntuit IncIntuit Inc
US9015082B10.328Data quality assessment for vector machine learningGRANT2015-04-212010-12-1452822660GoodSymantec CorpCA Inc
US20080092235A10.326Trustable communities for a computer systemAPPLICATION2008-04-172006-10-1739304563GoodAppguard LLCAppguard LLC
US8914808B20.325Apparatus and method for dynamically reconfiguring state of application program in a many-core systemGRANT2014-12-162010-12-1445442847GoodSamsung Electronics Co Ltd, University of Southern California USCSamsung Electronics Co Ltd, University of Southern California USC
US8682814B20.321User interface and workflow for performing machine learningGRANT2014-03-252010-12-1446200362GoodSymantec CorpCA Inc
US10474806B20.318Applications login using a mechanism relating sub-tokens to the quality of a master tokenGRANT2019-11-122011-12-2948696083GoodPayPal IncPayPal Inc
US20090240624A10.318RISK DETECTION AND ASSESSMENT OF CASH PAYMENT FOR ELECTRONIC PURCHASE TRANSACTIONSAPPLICATION2009-09-242008-03-2041089843GoodModaSolutions CorpWestern Union Financial Services Inc
US9177129B20.318Devices  systems  and methods for monitoring and asserting trust level using persistent trust logGRANT2015-11-032012-06-2749779494GoodIntel CorpIntel Corp
US10469622B20.317Platform-enabled proximity serviceGRANT2019-11-052011-09-1247697784GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20090241170A10.315ACCESS  PRIORITY AND BANDWIDTH MANAGEMENT BASED ON APPLICATION IDENTITYAPPLICATION2009-09-242008-03-1941090186GoodApplied Identity IncCitrix Systems Inc
US20120130853A10.312In-Application Commerce System and Method with Fraud DetectionAPPLICATION2012-05-242010-11-2446065238GoodDigital River IncDigital River Inc
US9460290B20.311Conditional security response using taint vector monitoringGRANT2016-10-042011-07-1947556783GoodElwha LLCRPX Corp
US10356204B20.311Application based hardware identifiersGRANT2019-07-162012-12-1350932290GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10275267B10.310Trust-based resource allocationGRANT2019-04-302012-10-2266248171GoodAmazon Technologies IncAmazon Technologies Inc
US8839397B20.310End point context and trust level determinationGRANT2014-09-162010-08-2445698962GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US9607142B20.309Context aware recertificationGRANT2017-03-282011-09-0947831081GoodInternational Business Machines CorpInternational Business Machines Corp
US20090133110A10.306SYSTEM AND METHOD USING GLOBALLY UNIQUE IDENTITIESAPPLICATION2009-05-212007-11-1340643393GoodApplied Identity IncCitrix Systems Inc
US20140074547A10.305PERSONAL AND WORKFORCE REPUTATION PROVENANCE IN APPLICATIONSAPPLICATION2014-03-132012-09-1050234247GoodOracle International CorpOracle International Corp
US9639594B20.305Common data model for identity access management dataGRANT2017-05-022012-12-2050975842GoodBank of America CorpBank of America Corp
US8504671B10.304Systems and methods for rating a current instance of data based on preceding and succeeding instances of dataGRANT2013-08-062010-09-0248876498GoodSymantec CorpNortonLifeLock Inc
US20130054433A10.303Multi-Factor Identity Fingerprinting with User BehaviorAPPLICATION2013-02-282011-08-2547745023GoodT Mobile USA IncT Mobile USA Inc
US8656465B10.301Userspace permissions serviceGRANT2014-02-182011-05-0950072319GoodGoogle LLCGoogle LLC
US10701078B20.300Method for automatically applying access control policies based on device types of networked computing devicesGRANT2020-06-302012-08-3150189030GoodCisco Technology IncCisco Technology Inc
US20140172808A10.298Multi-Layered Metadata Management SystemAPPLICATION2014-06-192012-12-1950932155GoodPandexio IncPandexio Inc
US20130086678A10.298INTEGRATING SECURITY PROTECTION TOOLS WITH COMPUTER DEVICE INTEGRITY AND PRIVACY POLICYAPPLICATION2013-04-042006-06-2038972743GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7433960B10.296Systems  methods and computer products for profile based identity verification over the internetGRANT2008-10-072008-01-0439797377GoodInternational Business Machines CorpSAP SE
US9298918B20.295Taint injection and trackingGRANT2016-03-292011-11-3048468080GoodElwha LLCRPX Corp
US20140074560A10.295ADVANCED SKILL MATCH AND REPUTATION MANAGEMENT FOR WORKFORCESAPPLICATION2014-03-132012-09-1050234259GoodOracle International CorpOracle International Corp
US9729549B20.294Behavioral fingerprinting with adaptive developmentGRANT2017-08-082011-09-2448611659GoodElwha LLCRPX Corp
US9298900B20.294Behavioral fingerprinting via inferred personal relationGRANT2016-03-292011-09-2450548776GoodElwha LLCRPX Corp
US20090328186A10.293COMPUTER SECURITY SYSTEMAPPLICATION2009-12-312002-04-2541449333GoodApplied Identity IncCitrix Systems Inc, Individual, SYNCTOMI Inc
US9819729B20.292Application monitoring for cloud-based architecturesGRANT2017-11-142012-12-2154770510GoodBMC Software IncBMC Software Inc
US8224796B10.292Systems and methods for preventing data loss on external devicesGRANT2012-07-172009-09-1146465577GoodSymantec CorpCA Inc
US20060101514A10.290Method and apparatus for look-ahead security scanningAPPLICATION2006-05-112004-11-0846323066GoodBROWSTER IncCufer Asset Ltd LLC
US20060005254A10.290Integration of policy compliance enforcement and device authenticationAPPLICATION2006-01-052004-06-0935515565GoodIntel CorpIntel Corp
US9330376B20.290System and method for assigning a business value rating to documents in an enterpriseGRANT2016-05-032010-06-1445097024GoodCA IncCA Inc
US9621404B20.289Behavioral fingerprinting with social networkingGRANT2017-04-112011-09-2448611316GoodElwha LLCRPX Corp
US11416325B20.289Machine-learning and deep-learning techniques for predictive ticketing in information technology systemsGRANT2022-08-162012-03-1382781390GoodServiceNow IncServiceNow Inc
US8521874B10.288Computer-based comparison of human individualsGRANT2013-08-272012-02-2046614230GoodUniloc Luxembourg SAUniloc 2017 LLC
US11064257B20.288System and method for segment relevance detection for digital contentGRANT2021-07-132011-11-0772335773GoodMonet Networks IncMonet Networks Inc
US8838976B20.287Web content access using a client device identifierGRANT2014-09-162009-02-1042072852GoodUniloc Luxembourg SAUniloc 2017 LLC
US11055387B20.287System and method for identity and reputation score based on transaction historyGRANT2021-07-062011-07-1453183851GoodDocusign IncDocusign Inc
US20070244750A10.287Method and apparatus for selecting advertisingAPPLICATION2007-10-182006-04-1838605955GoodSBC Knowledge Ventures LPAT&T Intellectual Property I LP
US8600981B10.286Using activity status to adjust activity rankingsGRANT2013-12-032010-12-2149640880GoodGoogle LLCGoogle LLC
US6298445B10.285Computer securityGRANT2001-10-021998-04-3022096866GoodNetect LtdNetect Ltd, NortonLifeLock Inc
US9223961B10.282Systems and methods for performing security analyses of applications configured for cloud-based platformsGRANT2015-12-292012-04-0454932421GoodSymantec CorpNortonLifeLock Inc
US9686194B20.279Adaptive multi-interface use for content networkingGRANT2017-06-202009-10-2152126470GoodCisco Technology IncCisco Technology Inc
US20050149726A10.279Systems and methods for secure client applicationsAPPLICATION2005-07-072003-10-2134549221GoodGreen Border Technologies IncGoogle LLC
US5919257A0.278Networked workstation intrusion detection systemGRANT1999-07-061997-08-0825424254GoodMicro Focus Software IncRPX Corp
US9363241B20.277Cryptographic enforcement based on mutual attestation for cloud servicesGRANT2016-06-072012-10-3150548586GoodIntel CorpIntel Corp
US7721336B10.276Systems and methods for dynamic detection and prevention of electronic fraudGRANT2010-05-182001-03-1525203565GoodBrighterion IncBrighterion Inc
US20070143629A10.276METHOD TO VERIFY THE INTEGRITY OF COMPONENTS ON A TRUSTED PLATFORM USING INTEGRITY DATABASE SERVICESAPPLICATION2007-06-212004-11-2938175188GoodSignaCert IncKIP SIGN P1 LP, Silicon Valley Bank Inc
US20140130170A10.274INFORMATION SECURITY AUDIT METHOD  SYSTEM AND COMPUTER READABLE STORAGE MEDIUM FOR STORING THEREOFAPPLICATION2014-05-082012-11-0650473826GoodInstitute for Information IndustryInstitute for Information Industry
US7984304B10.274Dynamic verification of validity of executable codeGRANT2011-07-192004-03-0244262035GoodVMware IncVMware Inc
US6978366B10.273Secure document management systemGRANT2005-12-201999-11-014164528GoodInternational Business Machines CorpInternational Business Machines Corp
US20140074717A10.272System and Method for Verification  Authentication  and Notification of TransactionsAPPLICATION2014-03-132002-02-0432095752GoodST ISIDORE RESEARCH LLCST ISIDORE RESEARCH LLC
US9015860B20.272Behavioral fingerprinting via derived personal relationGRANT2015-04-212011-09-2448224411GoodElwha LLCRPX Corp
US9111079B20.272Trustworthy device claims as a serviceGRANT2015-08-182010-09-3045890974GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9202251B20.270System and method for granular tagging and searching multimedia content based on user reactionGRANT2015-12-012011-11-0748224482Good
US9235562B10.270Systems and methods for transparent data loss prevention classificationsGRANT2016-01-122012-10-0255026469GoodSymantec CorpCA Inc
US9916461B20.269Identity context-based access controlGRANT2018-03-132012-09-1050234779GoodInternational Business Machines CorpInternational Business Machines Corp
US20140122343A10.268MALWARE DETECTION DRIVEN USER AUTHENTICATION AND TRANSACTION AUTHORIZATIONAPPLICATION2014-05-012012-11-0150548296GoodSymantec CorpCA Inc
US20060136986A10.268Enterprise security monitoring system and methodAPPLICATION2006-06-222004-12-1736597754GoodErgomd LLCPARAGENTEC Inc, Ergomd LLC, PARAGENTEC Inc
US7159210B20.268Performing secure and insecure computing operations in a compartmented operating systemGRANT2007-01-022001-06-199916859GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US5704012A0.267Adaptive resource allocation using neural networksGRANT1997-12-301993-10-0822465773GoodInternational Business Machines CorpInternational Business Machines Corp
US5892903A0.267Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication systemGRANT1999-04-061996-09-1224852875GoodInternet Security Systems IncInternational Business Machines Corp
US9083687B20.267Multi-device behavioral fingerprintingGRANT2015-07-142011-09-2450026886GoodElwha LLCRPX Corp
US8312543B10.267Using URL reputation data to selectively block cookiesGRANT2012-11-132009-06-3047114672GoodSymantec CorpCA Inc
US8881273B20.266Device reputation managementGRANT2014-11-042011-12-0248655911GoodUniloc Luxembourg SAUniloc 2017 LLC
US7546276B20.265Common authentication service for network connected applications  devices  users  and web servicesGRANT2009-06-092006-01-2338335370Good
US10638197B20.265System and method for segment relevance detection for digital content using multimodal correlationsGRANT2020-04-282011-11-0767985912GoodMonet Networks IncMonet Networks Inc
US20090178138A10.262Stateless attestation systemAPPLICATION2009-07-092008-01-0740845676GoodNeocleus Israel LtdIntel Corp
US9047145B20.262Event source management using a metadata-driven frameworkGRANT2015-06-022006-11-1039370497GoodNovell Intellectual Property Holdings IncRPX Corp
US20060075503A10.260Method and system for applying security vulnerability management process to an organizationAPPLICATION2006-04-062004-09-1336127232GoodAchilles Guard IncAchilles Guard Inc
US7644438B10.260Security event aggregation at software agentGRANT2010-01-052004-10-2741460466GoodArcSight LLCMicro Focus LLC
US7209037B20.260System and method for monitoring a security of an assetGRANT2007-04-242003-06-1733544154GoodInfrAegis IncHuman Sciences Hc Ltd
US8793277B20.259Forensic system  forensic method  and forensic programGRANT2014-07-292010-03-2944712141GoodUbic IncFronteo Inc
US20090094584A10.259NON-INTRUSIVE ASSET MONITORING FRAMEWORK FOR RUNTIME CONFIGURATION OF DEPLOYABLE SOFTWARE ASSETSAPPLICATION2009-04-092007-10-0440524403GoodInternational Business Machines CorpInternational Business Machines Corp
US20130268313A10.258System and Method for Security ManagementAPPLICATION2013-10-102012-04-0449293039GoodIris Consolidated IncIris Consolidated Inc
US9135424B20.257Secure identity binding (SIB)GRANT2015-09-152009-05-2943220236GoodPayPal IncPayPal Inc
US9787655B20.256Controlling access to resources on a networkGRANT2017-10-102011-12-0949158952GoodAirwatch LLCAirwatch LLC
US6662357B10.256Managing information in an integrated development architecture frameworkGRANT2003-12-091999-08-3123527502GoodAccenture LLPAccenture Global Services Ltd
US7284274B10.255System and method for identifying and eliminating vulnerabilities in computer software applicationsGRANT2007-10-162001-01-1838577919GoodCigital IncSynopsys Inc
US9659175B20.254Methods and apparatus for identifying and removing malicious applicationsGRANT2017-05-232012-05-0949549696GoodSunstone Information Defense IncSunstone Information Defense Inc
US20070174429A10.254METHODS AND SERVERS FOR ESTABLISHING A CONNECTION BETWEEN A CLIENT SYSTEM AND A VIRTUAL MACHINE HOSTING A REQUESTED COMPUTING ENVIRONMENTAPPLICATION2007-07-262006-01-2440572801GoodCitrix Systems IncCitrix Systems Inc
US20100325412A10.254APPARATUS FOR RECONFIGURATION OF A TECHNICAL SYSTEM BASED ON SECURITY ANALYSIS AND A CORRESPONDING TECHNICAL DECISION SUPPORT SYSTEM AND COMPUTER PROGRAM PRODUCTAPPLICATION2010-12-232007-10-1040229772GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8606913B20.253Method for adaptively building a baseline behavior modelGRANT2013-12-102008-11-1242166178GoodDATIPHY IncDATIPHY Inc
US20050289072A10.253System for automatic  secure and large scale software license management over any computer networkAPPLICATION2005-12-292004-06-2935507273Good
US20100325040A10.252Device Authority for Authenticating a User of an Online ServiceAPPLICATION2010-12-232009-06-2342734830GoodUniloc Luxembourg SAUniloc Luxembourg SA
US8316453B20.252Dynamic community generatorGRANT2012-11-202008-06-2742752568GoodBank of America CorpBank of America Corp
US9825967B20.252Behavioral fingerprinting via social networking interactionGRANT2017-11-212011-09-2448572977GoodElwha LLCRPX Corp
US20110320816A10.251SYSTEMS AND METHOD FOR MALWARE DETECTIONAPPLICATION2011-12-292009-03-1342728842GoodRutgers State University of New JerseyRutgers State University of New Jersey
US7949992B20.251Development of information technology systemGRANT2011-05-242006-06-2738874892GoodInternational Business Machines CorpRakuten Group Inc
US6289460B10.249Document management systemGRANT2001-09-111999-09-1326850677GoodAstus CorpDocusign Inc
US8984604B20.249Locally stored phishing countermeasureGRANT2015-03-172010-05-0744064203GoodBlackBerry LtdBlackBerry Ltd
US9483488B20.248Verifying separation-of-duties at IAM system implementing IAM data modelGRANT2016-11-012012-12-2050976352GoodBank of America CorpBank of America Corp
US8918387B10.247Systems and methods for classifying applications configured for cloud-based platformsGRANT2014-12-232012-04-0452101916GoodSymantec CorpNortonLifeLock Inc
US7024548B10.247Methods and apparatus for auditing and tracking changes to an existing configuration of a computerized deviceGRANT2006-04-042003-03-1036102147GoodCisco Technology IncCisco Technology Inc
US7502939B20.246Software virus detection methods and apparatusGRANT2009-03-102001-04-1925278556GoodCybersoft IncCybersoft Inc
US7333998B20.246Apparatus and accompanying methods for visualizing clusters of data and hierarchical cluster classificationsGRANT2008-02-191998-06-2525294531GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9489390B20.246Reconciling access rights at IAM system implementing IAM data modelGRANT2016-11-082012-12-2050976353GoodBank of America CorpBank of America Corp
US9495380B20.246Access reviews at IAM system implementing IAM data modelGRANT2016-11-152012-12-2050976351GoodBank of America CorpBank of America Corp
US7581103B20.241Software self-checking systems and methodsGRANT2009-08-252001-06-1326868343GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8108536B10.241Systems and methods for determining the trustworthiness of a server in a streaming environmentGRANT2012-01-312008-06-3045508249GoodSymantec CorpCA Inc
US7882221B20.241Method and system for measuring status and state of remotely executing programsGRANT2011-02-012003-12-1234653391GoodInternational Business Machines CorpInternational Business Machines Corp
US5684957A0.241Network management system for detecting and displaying a security holeGRANT1997-11-041993-03-2913411818GoodHitachi Software Engineering Co LtdHitachi Software Engineering Co Ltd
US8782794B20.238Detecting secure or encrypted tunneling in a computer networkGRANT2014-07-152010-04-1645771624GoodBank of America CorpBank of America Corp
US9253643B20.238Method and apparatus for H(e)NB integrity verification and validationGRANT2016-02-022009-03-0542236918GoodInterDigital Patent Holdings IncInterDigital Patent Holdings Inc
US8799317B20.238Forensic system  forensic method  and forensic programGRANT2014-08-052010-03-2944712140GoodUbic IncUbic Inc
US9529989B20.237Access requests at IAM system implementing IAM data modelGRANT2016-12-272012-12-2050976379GoodBank of America CorpBank of America Corp
US10587646B20.236Analyzing DNS requests for anomaly detectionGRANT2020-03-102011-07-0655403917GoodNominum IncAkamai Technologies Inc
US9075996B20.235Evaluating a security stack in response to a request to access a serviceGRANT2015-07-072012-07-3049996331GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8225416B20.235Dynamic entitlement managerGRANT2012-07-172008-06-2742752580GoodBank of America CorpBank of America Corp
US8745718B10.235Delivery of authentication information to a RESTful service using token validation schemeGRANT2014-06-032012-08-2050781449GoodJericho Systems CorpCrowdstrike Inc
US20100281273A10.234System and Method for Processor-Based SecurityAPPLICATION2010-11-042009-01-1643031285GoodTELEPUTERS LLCCoresecure Technologies Inc
US8898759B20.234Application registration  authorization  and verificationGRANT2014-11-252010-08-2445698957GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US20070130566A10.232Migrating Virtual Machines among Computer Systems to Balance Load Caused by Virtual MachinesAPPLICATION2007-06-072003-07-0937904354GoodSymantec Corp, Symantec Operating CorpVeritas Technologies LLC, Individual
US7640587B20.232Source code repair method for malicious code detectionGRANT2009-12-292005-03-2937030413GoodInternational Business Machines CorpActivision Publishing Inc
US20060048216A10.231Method and system for enabling federated user lifecycle managementAPPLICATION2006-03-022004-07-2135945049GoodInternational Business Machines CorpInternational Business Machines Corp
US8909928B20.230Securing customer virtual machines in a multi-tenant cloudGRANT2014-12-092010-06-0243919920GoodVMware IncVMware Inc
US20020095589A10.229Secure file transfer method and systemAPPLICATION2002-07-182000-11-289903989GoodSWIVEL TECHNOLOGIES LtdSwivel Secure Ltd
US8839209B20.228Software performance profiling in a multi-tenant environmentGRANT2014-09-162010-05-1244912861GoodSalesforce com IncSalesforce com Inc
US20080015808A10.228METHODS AND SYSTEM FOR PROGRAM EXECUTION INTEGRITY MEASUREMENTAPPLICATION2008-01-172006-05-0238950316GoodJohns Hopkins UniversityUnited States Government As Represented By National Security Agency, National Security Agency
US9489131B20.226Method of presenting a web page for accessibility browsingGRANT2016-11-082009-02-0542398740GoodApple IncApple Inc
US7457951B10.226Data integrity monitoring in trusted computing entityGRANT2008-11-251999-05-288241420GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9369457B20.224Mobile multifactor single-sign-on authenticationGRANT2016-06-142012-09-1950275917GoodSecureAuth CorpSecureAuth Corp
US20030140249A10.224Security level information offering method and systemAPPLICATION2003-07-242002-01-1819191625GoodTEAMGIA KKTEAMGIA KK
US6091835A0.223Method and system for transcribing electronic affirmationsGRANT2000-07-181994-08-3146254760GoodPenOp LtdPenOp Ltd
US8549037B20.222Forensic system  forensic method  and forensic programGRANT2013-10-012010-07-2845530122GoodUbic IncFronteo Inc
US7461249B10.222Computer platforms and their methods of operationGRANT2008-12-021999-08-138241575GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US8813085B20.220Scheduling threads based on priority utilizing entitlement vectors  weight and usage levelGRANT2014-08-192011-07-1948173843GoodElwha LLCRPX Corp
US20100318655A10.220Concurrent Processing With Untrusted BeingsAPPLICATION2010-12-162009-06-1543307331GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7765410B20.219System and method of aggregating the knowledge base of antivirus software applicationsGRANT2010-07-272004-11-0836317730GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070180495A10.219METHOD AND APPARATUS TO ESTABLISH ROUTES BASED ON THE TRUST SCORES OF ROUTERS WITHIN AN IP ROUTING DOMAINAPPLICATION2007-08-022004-11-2946327072GoodSignaCert IncKIP SIGN P1 LP, Silicon Valley Bank Inc
US20030028585A10.218Distributed trust mechanism for decentralized networksAPPLICATION2003-02-062001-07-3126860654GoodSun Microsystems IncOracle America Inc
US9558034B20.218Entitlement vector for managing resource allocationGRANT2017-01-312011-07-1952278209GoodElwha LLCRPX Corp
US20090204964A10.216Distributed trusted virtualization platformAPPLICATION2009-08-132007-10-1240939995GoodMOTEGRITY LLCMOTEGRITY LLC, Zitovault Inc
US6092201A0.215Method and apparatus for extending secure communication operations via a shared listGRANT2000-07-181997-10-2446254729GoodEntrust LtdEntrust Ltd
US20090106549A10.214METHOD AND SYSTEM FOR EXTENDING ENCRYPTING FILE SYSTEMAPPLICATION2009-04-232007-10-2040564678GoodBlackout IncBlackout Inc
US6157721A0.212Systems and methods using cryptography to protect secure computing environmentsGRANT2000-12-051996-08-1224769786GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7155741B20.212Alteration of module load locationsGRANT2006-12-262002-05-0629249784GoodSymantec CorpCA Inc
US20080215667A10.210METHOD AND SYSTEM FOR SHARING STORAGE SPACE ON A COMPUTERAPPLICATION2008-09-042003-10-0939733908GoodPB&J Software LLCPB&J Software LLC
US8442850B20.209Providing accounting software application as enterprise servicesGRANT2013-05-142006-03-3038222391GoodSAP SE SAP SE
US10324946B20.208Methods and systems for caching data shared between organizations in a multi-tenant database systemGRANT2019-06-182011-06-2347362846GoodSalesforce com IncSalesforce com Inc
US9471373B20.208Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priorityGRANT2016-10-182011-09-2447912719GoodElwha LLCRPX Corp
US8763069B20.208Dynamic entitlement managerGRANT2014-06-242008-06-2740940966GoodBank of America CorpBank of America Corp
US6393420B10.207Securing Web server source documents and executablesGRANT2002-05-211999-06-0323267246GoodInternational Business Machines CorpAlibaba Group Holding Ltd
US6826690B10.207Using device certificates for automated authentication of communicating devicesGRANT2004-11-301999-11-0823728307GoodInternational Business Machines CorpInternational Business Machines Corp
US9600816B20.207Method and system for executing a NFC transaction supporting multiple applications and multiples instances of a same applicationGRANT2017-03-212011-10-0447071349GoodInside Secure SAVerimatrix France SAS
US11201848B20.207DNS-based ranking of domain namesGRANT2021-12-142011-07-0655403883GoodAkamai Technologies IncAkamai Technologies Inc
US7788638B20.206Method and system for data file processingGRANT2010-08-312003-11-2133553062GoodCitigroup Global Markets IncCitigroup Global Markets Inc
US20020091753A10.205System and method for remotely monitoring and managing applications across multiple domainsAPPLICATION2002-07-112000-08-1525040497GoodI2 Technologies IncBlue Yonder Group Inc
US20040153171A10.203System and methodology providing automation security architecture in an industrial controller environmentAPPLICATION2004-08-052002-10-2132775790GoodRockwell Automation Technologies IncRockwell Automation Technologies Inc
US20190026756A10.202Transaction Evaluation for Providing RewardsAPPLICATION2019-01-242006-08-3139136905GoodVisa USA IncVisa USA Inc
US8850406B10.202Detecting anomalous application access to contact informationGRANT2014-09-302012-04-0551588346GoodGoogle LLCGoogle LLC
US20130139163A10.201INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD FOR RECOMMENDING APPLICATION PROGRAMSAPPLICATION2013-05-302008-12-0542232481GoodSony CorpSony Corp
US6549208B20.200Information security analysis systemGRANT2003-04-151998-07-2122239613GoodSilentRunner IncCA Inc
US9619496B20.199Method  computer readable medium and system for using large data sets in virtual applicationsGRANT2017-04-112011-12-1648611621GoodSiemens AGSiemens Healthcare GmbH
US20110173359A10.199COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR SECURITY EVENT TRANSPORT USING A MESSAGE BUSAPPLICATION2011-07-142005-07-1543837261GoodMicro Focus Software IncApple Inc
US9098608B20.197Processor configured to allocate resources using an entitlement vectorGRANT2015-08-042011-10-2848173845GoodElwha LLCRPX Corp
US20050033987A10.197System and method to establish and maintain conditional trust by stating signal of distrustAPPLICATION2005-02-102003-08-0834116661GoodNokia OyjNokia Oyj
US20110154500A10.197Executing Trusted Applications with Reduced Trusted Computing BaseAPPLICATION2011-06-232009-12-2344153138GoodIntel CorpIntel Corp
US20040107363A10.197SYSTEM AND METHOD FOR ANTICIPATING THE TRUSTWORTHINESS OF AN INTERNET SITEAPPLICATION2004-06-032003-08-2232393742GoodEmergency 24 IncEmergency 24 Inc
US8321832B20.196Composite application modelingGRANT2012-11-272006-03-3138255549GoodSAP SE SAP SE
US9152966B20.196Data reporting framework across on-premise and hosted CRM servicesGRANT2015-10-062011-05-0347090970GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US6823454B10.196Using device certificates to authenticate servers before automatic address assignmentGRANT2004-11-231999-11-0833434868GoodInternational Business Machines CorpInternational Business Machines Corp
US9374620B20.195Terminal apparatus  server apparatus  information processing method  program  and interlocked application feed systemGRANT2016-06-212011-10-2147215687GoodSony CorpSaturn Licensing LLC
US8484741B10.195Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scamsGRANT2013-07-092012-01-2748701579GoodChapman Tech Group IncBarracuda Networks Inc
US7013481B10.190Attestation key memory device and busGRANT2006-03-142000-03-3135998940GoodIntel CorpIntel Corp
US20060031940A10.188System and method for protecting a computer system from malicious softwareAPPLICATION2006-02-092004-08-0735759063GoodROZMAN MORGAN LEEROZMAN MEGAN ELIZABETH, ROZMAN MELANIE ANN
US7065494B10.187Electronic customer service and rating system and methodGRANT2006-06-201999-06-2536586520GoodCxt Systems IncCxt Systems Inc
US9479471B20.186Networked transmission of reciprocal identity related data messagesGRANT2016-10-252012-12-2851018501GoodEquifax IncEquifax Inc
US6002867A0.185Development system with methods providing visual form inheritanceGRANT1999-12-141996-10-2424968001GoodBorland Software CorpCODEGEAR LLC
US20080114987A10.185Multiple security access mechanisms for a single identifierAPPLICATION2008-05-152006-10-3138996649GoodMicro Focus Software IncEMC Corp
US9450966B20.184Method and apparatus for lifecycle integrity verification of virtual machinesGRANT2016-09-202004-11-2940509947GoodKIP SIGN P1 LPKIP SIGN P1 LP
US6466983B10.184Systems and methods for controlling access to data maintained in a repositoryGRANT2002-10-151999-09-3023606938GoodCuica LLCCuica LLC
US20060173788A10.181Flexible licensing architecture in content rights management systemsAPPLICATION2006-08-032005-02-0136368254GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20120131334A10.181Method for Attesting a Plurality of Data Processing SystemsAPPLICATION2012-05-242010-11-1846065508GoodInternational Business Machines CorpInternational Business Machines Corp
US9465657B20.181Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priorityGRANT2016-10-112011-07-1947556751GoodElwha LLCRPX Corp
US6968536B20.180Frame component containerGRANT2005-11-222000-07-1427396521GoodBorland Software CorpCODEGEAR LLC
US7178030B20.180Electronically signing a documentGRANT2007-02-132000-10-2526712522GoodTecsec IncTecsec Inc
US7024431B10.180Data transformation to maintain detailed user information in a data warehouseGRANT2006-04-042000-07-0632043602GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7797549B20.179Secure method and system for biometric verificationGRANT2010-09-142001-06-284169366GoodIrdeto Canada CorpIrdeto BV
US8374896B20.178Architectural design for opportunity management application softwareGRANT2013-02-122008-09-1842008038GoodSAP SE SAP SE
US6209091B10.178Multi-step digital signature method and systemGRANT2001-03-271994-01-1327391477GoodCertco IncCertco Inc
US20050138417A10.178Trusted network access control system and methodAPPLICATION2005-06-232003-12-1934678066GoodBlack White Box IncBlack White Box Inc
US6609200B20.177Method and system for processing electronic documentsGRANT2003-08-191996-12-2021873091GoodFinancial Services Technology ConsortiumInternational Business Machines Corp, Financial Services Technology Consortium, FleetBoston Financial Corp, Sun Microsystems Inc, Fleet National Bank, Iconectiv LLC
US8438119B20.177Foundation layer for services based enterprise software architectureGRANT2013-05-072006-03-3038230147GoodSAP SE SAP SE
US9170843B20.177Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlementGRANT2015-10-272011-09-2447912717GoodElwha LLCRPX Corp
US6327652B10.177Loading and identifying a digital rights management operating systemGRANT2001-12-041998-10-2626803068GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9338152B20.176Personal control of personal informationGRANT2016-05-102011-08-1546614229GoodUniloc Luxembourg SAUniloc 2017 LLC
US8311904B20.176Architectural design for intra-company stock transfer application softwareGRANT2012-11-132008-12-0342223648GoodSAP SE SAP SE
US20090172814A10.175DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAMAPPLICATION2009-07-022007-12-3140800405GoodIntel CorpIntel Corp
US20120084850A10.175TRUSTWORTHY DEVICE CLAIMS FOR ENTERPRISE APPLICATIONSAPPLICATION2012-04-052010-09-3045890973GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020166063A10.174System and method for anti-network terrorismAPPLICATION2002-11-072001-03-0123040950GoodCyber Operations LLCCyber Operations LLC
US6108786A0.174Monitor network bindings for computer securityGRANT2000-08-221997-04-2525295608GoodIntel CorpIntel Corp
US20070005992A10.173Signed manifest for run-time verification of software program identity and integrityAPPLICATION2007-01-042005-06-3037591240GoodIntel CorpIntel Corp
US9253185B20.173Cloud centric application trust validationGRANT2016-02-022012-12-1250933805GoodNokia Technologies OyNokia Technologies Oy
US20020144149A10.170Trust ratings in group credentialsAPPLICATION2002-10-032001-04-0325243105GoodSun Microsystems IncOracle America Inc
US8930714B20.170Encrypted memoryGRANT2015-01-062011-07-1947555757GoodElwha LLCRPX Corp
US20050086499A10.169System and method for malicious code detectionAPPLICATION2005-04-212001-05-2225339538GoodMCI LLCRakuten Group Inc
US9418216B20.168Cloud service authenticationGRANT2016-08-162011-07-2147556770GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20060200680A10.168ATTESTATION KEY MEMORY DEVICE AND BUSAPPLICATION2006-09-072000-03-3146321555Good
US20120169458A10.167Method and System for Monitoring Physical Security and Notifying if AnomaliesAPPLICATION2012-07-052010-12-3146380258GoodSchneider Electric Buildings ABSchneider Electric Buildings LLC
US10168413B20.167Service enhancements using near field communicationGRANT2019-01-012011-03-2546878150GoodT Mobile USA IncT Mobile USA Inc
US20110035577A10.165ENHANCED DIGITAL RIGHT MANAGEMENT FRAMEWORKAPPLICATION2011-02-102007-03-2639788016GoodIntel CorpIntel Corp
US6976087B10.164Service provisioning methods and apparatusGRANT2005-12-132000-11-2435452717GoodRedback Networks IncEricsson AB
US20070185856A10.163System and method for managing attestationsAPPLICATION2007-08-092006-01-2338335220GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US20110173643A10.162USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEMAPPLICATION2011-07-142008-10-1042027920GoodPanasonic CorpPanasonic Corp
US9798873B20.161Processor operable to ensure code integrityGRANT2017-10-242011-08-0447627814GoodElwha LLCRPX Corp
US8359218B20.161Computer readable medium for implementing supply chain control using service-oriented methodologyGRANT2013-01-222008-09-1842008045GoodSAP SE SAP SE
US7194759B10.161Used trusted co-servers to enhance security of web interactionGRANT2007-03-202000-09-1537863991GoodInternational Business Machines CorpInternational Business Machines Corp
US6507904B10.159Executing isolated mode instructions in a secure system running in privilege ringsGRANT2003-01-142000-03-3124159746GoodIntel CorpIntel Corp
US8402426B20.158Architectural design for make to stock application softwareGRANT2013-03-192005-12-3037770271GoodSAP SE SAP SE
US20120023568A10.156Method and Apparatus for Trusted Federated Identity Management and Data Access AuthorizationAPPLICATION2012-01-262010-01-2243799457GoodInterDigital Patent Holdings IncInterDigital Patent Holdings Inc
US6263492B10.156Run time object layout model with object type that differs from the derived object type in the class structure at design time and the ability to store the optimized run time object layout modelGRANT2001-07-171997-06-0625354900GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060005009A10.155Method  system and program product for verifying an attribute of a computing deviceAPPLICATION2006-01-052004-06-3035515400GoodInternational Business Machines CorpInternational Business Machines Corp
US20060048228A10.154Communication system and security assurance deviceAPPLICATION2006-03-022004-08-3035945058GoodKDDI CorpKDDI Corp, Keio University
US8401928B20.153Providing supplier relationship management software application as enterprise servicesGRANT2013-03-192008-09-1842008380GoodSAP SE SAP SE
US20090204806A10.151CERTIFYING DEVICE  VERIFYING DEVICE  VERIFYING SYSTEM  COMPUTER PROGRAM AND INTEGRATED CIRCUITAPPLICATION2009-08-132006-07-0338894494GoodPanasonic CorpSovereign Peak Ventures LLC
US8839376B20.150Application authorization for video servicesGRANT2014-09-162012-06-2949779745GoodCable Television Laboratories IncCable Television Laboratories Inc
US20090158410A10.148NETWORK SYSTEM  ITS CONTROL METHOD  AND PROGRAMAPPLICATION2009-06-182004-10-2836227989GoodCanon IncCanon Inc
US8321831B20.146Architectural design for internal projects application softwareGRANT2012-11-272005-12-3037992316GoodSAP SE SAP SE
US9575903B20.146Security perimeterGRANT2017-02-212011-08-0447627733GoodElwha LLCRPX Corp
US20070050622A10.146Method  system and apparatus for prevention of flash IC replacement hacking attackAPPLICATION2007-03-012005-09-0137805748GoodMotorola IncMotorola Solutions Inc
US8352338B20.145Architectural design for time recording application softwareGRANT2013-01-082008-09-1842008162GoodSAP SE SAP SE
US7797544B20.145Attesting to establish trust between computer entitiesGRANT2010-09-142003-12-1134653278GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20150199510A10.143FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONSAPPLICATION2015-07-162010-05-2848780927GoodApple IncApple Inc
US6470448B10.142Apparatus and method for proving transaction between users in network environmentGRANT2002-10-221996-10-3017731554GoodFujitsu LtdFujitsu Ltd
US8671035B20.141Providing payroll software application as enterprise servicesGRANT2014-03-112008-12-1142241680GoodSAP SE SAP SE
US9087196B20.141Secure application attestation using dynamic measurement kernelsGRANT2015-07-212010-12-2446314825GoodIntel CorpIntel Corp
US6760441B10.140Generating a key hieararchy for use in an isolated execution environmentGRANT2004-07-062000-03-3124150840GoodIntel CorpIntel Corp
US6799272B10.139Remote device authentication systemGRANT2004-09-281999-05-2632987138GoodLucent Technologies IncNokia of America Corp
US9210051B20.138Compound certifications for assurance without revealing infrastructureGRANT2015-12-082012-09-1250278559GoodEmpire Technology Development LLCEmpire Technology Development LLC, Ardent Research Corp
US8380549B20.138Architectural design for embedded support application softwareGRANT2013-02-192008-09-1842008009GoodSAP SE SAP SE
US20120210436A10.136SYSTEM AND METHOD FOR FINGERPRINTING IN A CLOUD-COMPUTING ENVIRONMENTAPPLICATION2012-08-162011-02-1446637963GoodEricsson Television IncEricsson Television Inc
US20080256363A10.136Trusted component update system and methodAPPLICATION2008-10-162007-04-1339854844GoodHewlett Packard Development Co LPTelefonaktiebolaget LM Ericsson AB, Individual
US7587607B20.135Attesting to platform configurationGRANT2009-09-082003-12-2234678852GoodIntel CorpIntel Corp
US8380553B20.134Architectural design for plan-driven procurement application softwareGRANT2013-02-192005-12-3037913696GoodSAP SE SAP SE
US20080267406A10.134Method and Device for Verifying The Integrity of Platform Software of an Electronic DeviceAPPLICATION2008-10-302004-11-2236406864GoodNokia OyjConversant Wireless Licensing SARL, 2011 Intellectual Property Asset Trust
US8522194B20.133Software modelingGRANT2013-08-272005-12-3037836679GoodSAP SE SAP SE
US8818884B20.132Architectural design for customer returns handling application softwareGRANT2014-08-262008-09-1842008039GoodSAP SE SAP SE
US8538864B20.131Providing payment software application as enterprise servicesGRANT2013-09-172006-03-3038197743GoodSAP SE SAP SE
US20070174406A10.128Techniques for attesting to contentAPPLICATION2007-07-262006-01-2438056498GoodMicro Focus Software IncApple Inc
US8396749B20.127Providing customer relationship management application as enterprise servicesGRANT2013-03-122006-03-3038055580GoodSAP SE SAP SE
US8326702B20.127Providing supplier relationship management software application as enterprise servicesGRANT2012-12-042006-03-3038255117GoodSAP SE SAP SE
US8386325B20.127Architectural design for plan-driven procurement application softwareGRANT2013-02-262008-09-1842008034GoodSAP SE SAP SE
US8595077B20.125Architectural design for service request and order management application softwareGRANT2013-11-262008-09-1842008040GoodSAP SE SAP SE
US20120272103A10.124SOFTWARE OPERABILITY SERVICEAPPLICATION2012-10-252011-04-2147022210GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6223281B10.122Method of controlling the degree of parallelism when performing parallel processing on an inherently serial computer programGRANT2001-04-241996-07-3110797793GoodInternational Business Machines CorpInternational Business Machines Corp
US20080083039A10.118METHOD FOR INTEGRITY ATTESTATION OF A COMPUTING PLATFORM HIDING ITS CONFIGURATION INFORMATIONAPPLICATION2008-04-032006-09-2939262541GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20060074600A10.117Method for providing integrity measurements with their respective time stampsAPPLICATION2006-04-062004-09-1536126632GoodIntel CorpIntel Corp
US8326703B20.116Architectural design for product catalog management application softwareGRANT2012-12-042005-12-3037857129GoodSAP SE SAP SE
US20050114154A10.116Personnel monitoring and feedback system and methodAPPLICATION2005-05-262003-11-2434591630GoodKimberly Clark Worldwide IncKimberly Clark Worldwide Inc
US20060225141A10.115Unauthorized access searching method and deviceAPPLICATION2006-10-052005-03-3037072196GoodFujitsu LtdFujitsu Ltd
US6990579B10.114Platform and method for remote attestation of a platformGRANT2006-01-242000-03-3124158202GoodIntel CorpIntel Corp
US7100046B20.113VPN enrollment protocol gatewayGRANT2006-08-292000-04-1232927794GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8401908B20.111Architectural design for make-to-specification application softwareGRANT2013-03-192008-12-0342223659GoodSAP SE SAP SE
US8738476B20.111Architectural design for selling standardized services application softwareGRANT2014-05-272008-12-0342223647GoodSAP SE SAP SE
US20050221766A10.110Method and apparatus to perform dynamic attestationAPPLICATION2005-10-062004-03-3135055013GoodIntel CorpIntel Corp
US6996710B10.110Platform and method for issuing and certifying a hardware-protected attestation keyGRANT2006-02-072000-03-3135734371GoodIntel CorpIntel Corp
US20050283660A10.109Mechanism to handle events in a machine with isolated executionAPPLICATION2005-12-222000-09-2835481964Good
US20050091161A10.108Automated banking system for dispensing money orders  wire transfer and bill paymentAPPLICATION2005-04-281997-05-3025347006GoodCapital Security Systems IncCapital Security Systems Inc
US20120144067A10.108METHOD FOR ADDING PROVENANCE METADATA TO FILES DOWNLOADED FROM A WEB-BASED SOURCEAPPLICATION2012-06-072010-12-0146163314GoodXerox CorpXerox Corp
US8447657B20.107Architectural design for service procurement application softwareGRANT2013-05-212007-12-3140800328GoodSAP SE SAP SE
US20050163317A10.107Method and apparatus for initializing multiple security modulesAPPLICATION2005-07-282004-01-2634795386GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7979696B20.106System and method of providing securityGRANT2011-07-122006-12-0639499727GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20100153239A10.106PROVIDING ACCOUNTING SOFTWARE APPLICATION AS ENTERPRISE SERVICESAPPLICATION2010-06-172008-12-1142241679GoodSAP SE SAP SE
US10929565B20.105Integrated circuit device  information processing apparatus  memory management method for information storage device  mobile terminal apparatus  semiconductor integrated circuit device  and communication method using mobile terminal apparatusGRANT2021-02-232001-06-2726617653GoodSony CorpSony Corp
US8396731B20.101Architectural design for service procurement application softwareGRANT2013-03-122005-12-3037898633GoodSAP SE SAP SE
US20040205340A10.101File editing system and shared file editing system with file content secrecy  file version management  and asynchronous editingAPPLICATION2004-10-141994-03-1532600994GoodToshiba CorpToshiba Corp
US8676617B20.099Architectural design for self-service procurement application softwareGRANT2014-03-182005-12-3037912420GoodSAP SE SAP SE
US10430839B20.091Distributed advertisement insertion in content-centric networksGRANT2019-10-012012-12-1250882001GoodCisco Technology IncCisco Technology Inc
US20090030832A10.088CREDIT EVALUATION SYSTEM AND METHOD FOR NETWORK EFFECT CREDIT EXTENSIONAPPLICATION2009-01-292007-07-2640296239GoodShacom com IncShacom com Inc
US20090144818A10.080SYSTEM AND METHOD FOR USING VARIABLE SECURITY TAG LOCATION IN NETWORK COMMUNICATIONSAPPLICATION2009-06-042008-11-1040677167GoodApplied Identity IncCitrix Systems Inc
US20050089237A10.047Method and apparatus for bezier curve approximation data compressionAPPLICATION2005-04-282003-10-2434522172GoodMotorola IncMotorola Solutions Inc
CN104106276ANRMulti-tiered secure mobile transactions enabling platformGRANT2014-10-152011-10-1248082515Good
CN103685151ANRAccount number single sign on protecting method and deviceGRANT2014-03-262012-09-0350182526Good
CN103117884ANRSecurity event monitoring device  method  and programGRANT2013-05-222011-09-1347831099Good
CN102724208ANRSystem and method for controlling access to network resourcesGRANT2012-10-102011-06-2845033862Good
US7003578B20.675Method and system for controlling a policy-based networkGRANT2006-02-212001-04-2625286591FairHewlett Packard Development Co LPHitachi Ltd, Hewlett Packard Enterprise Development LP
US8924375B10.412Item attention tracking system and methodGRANT2014-12-302012-05-3152112608FairSymantec CorpVeritas Technologies LLC
US5699403A0.353Network vulnerability management apparatus and methodGRANT1997-12-161995-04-1223668374FairLucent Technologies IncNokia of America Corp
US9901290B20.306Fall detection and fall risk detection systems and methodsGRANT2018-02-272007-10-1246272853FairBiosensics LLCBBY Solutions Inc
US6850949B20.269System and method for generating a dynamic interface via a communications networkGRANT2005-02-012002-06-0329583549FairRightNow Technologies IncOracle OTC Subsidiary LLC
US8930327B20.261Method and system for scrubbing information from heap dumpsGRANT2015-01-062010-05-0444902648FairSalesforce com IncSalesforce com Inc
US20120317089A10.256Scheduler for Search Engine CrawlerAPPLICATION2012-12-132003-07-0342184367FairGoogle LLCGoogle LLC
US9479448B20.244Methods for improved provisioning of information technology resources and devices thereofGRANT2016-10-252012-04-0249236591FairWipro LtdWipro Ltd
US20030014755A10.243Method and system for processing correlated audio-video segments with digital signatures within a broadcast systemAPPLICATION2003-01-162001-07-1325420320Fair
US20040260694A10.235Efficient fuzzy match for evaluating data recordsAPPLICATION2004-12-232003-06-2033517657FairMicrosoft CorpMicrosoft Technology Licensing LLC
US20120092163A10.195INTRUDER DETECTION AND INTERDICTION SYSTEM AND METHODS FOR USING THE SAMEAPPLICATION2012-04-192010-04-1445933662Fair
US7191429B20.182System and method for managing architectural layers within a software modelGRANT2007-03-132001-09-2823266844FairManyeta Informatique IncAxure Software Solutions Inc
US9383212B20.167Bezier curves for advanced driver assistance system applicationsGRANT2016-07-052008-10-0141449929FairHere Global BVHere Global BV
US8316344B20.142Software model deployment unitsGRANT2012-11-202005-12-3037944891FairSAP SE SAP SE
US8448137B20.129Software model integration scenariosGRANT2013-05-212005-12-3037888394FairSAP SE SAP SE
US8370794B20.126Software model process componentGRANT2013-02-052005-12-3037767655FairSAP SE SAP SE
US8471852B10.125Method and system for tessellation of subdivision surfacesGRANT2013-06-252003-05-3048627687FairNvidia CorpNvidia Corp
US7228227B20.114Bezier curve flightpath guidance using moving waypointsGRANT2007-06-052004-07-0735600511FairBoeing CoBoeing Co
US20130225115A10.101COMMUNICATION TERMINAL AND INFORMATION PROVIDING METHODAPPLICATION2013-08-292011-07-1147505915FairNTT Docomo IncNTT Docomo Inc
US7268906B20.098Systems and methods for authenticating and verifying documentsGRANT2007-09-112002-01-0722937821FairXerox CorpXerox Corp
US20050184576A10.068MOUNTING ANCHOR FOR A MOTOR VEHICLEAPPLICATION2005-08-252004-02-2334711897FairDelphi Technologies IncAptiv Technologies Ltd
US5821988A0.065NTSC co-channel interference reduction systemGRANT1998-10-131995-08-2924073067FairZenith Electronics LLCZenith Electronics LLC
US5464299A0.004Clamping deviceGRANT1995-11-071992-12-154264343FairUSM Holding AGUSM Holding AG
CN102945340ANRInformation object detection method and systemGRANT2013-02-272012-10-2347728281Fair
CN102542691ANRMethod and system for realizing bank card transaction between mobile phones in point-to-point wayGRANT2012-07-042011-12-3146349490Fair
CN101996381ANRMethod and system for calculating retail asset riskGRANT2011-03-302009-08-1443786510Fair
CN101071490ANRMember name and bank card binding electronic business system and methodGRANT2007-11-142007-03-2338898700Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
326
Recommended Classes
82
Government Assigned Classes
5
CPC
Title
Score
G06F21/552involving long-term monitoring or reporting1.738
G06F21/577Assessing vulnerabilities and evaluating computer system security1.738
H04L63/1433Vulnerability analysis0.887
G06F21/554involving event detection and direct action0.859
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.856
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.856
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.851
G06F21/567using dedicated hardware0.851
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.847
G06F21/564by virus signature recognition0.847
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)0.845
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.821
H04L63/1425Traffic logging  e.g. anomaly detection0.821
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)0.821
H04L63/1416Event detection  e.g. attack signature detection0.817
G06N20/00Machine learning0.817
G06F16/252between a Database Management System and a front-end application0.808
G06N5/02Knowledge representation0.805
H04N21/44226on social networks0.805
G06F11/3612by runtime analysis | performance monitoring | (ref: G06F11/3466)0.795
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.788
H04L67/02based on web technology  e.g. hypertext transfer protocol [HTTP]0.782
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.782
G06F21/55Detecting local intrusion or implementing counter-measures0.779
H04L63/14for detecting or protecting against malicious traffic0.778
H04L67/1095Replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes0.771
H04W12/10Integrity0.770
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.770
H04L41/0893Assignment of logical groups to network elements0.769
H04L41/5019Ensuring fulfilment of SLA0.769
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems0.761
G06F11/3664Environments for testing or debugging software0.761
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.760
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.760
G06V20/52Surveillance or monitoring of activities  e.g. for recognising suspicious objects | recognising microscopic objects | (ref: G06V20/69)0.758
G06V20/41Higher-level  semantic clustering  classification or understanding of video scenes  e.g. detection  labelling or Markovian modelling of sport events or news items | segmenting video sequences | (ref: G06V20/49)0.758
G08B13/19654Details concerning communication with a camera0.758
H04W12/08Access security0.758
H04L63/102Entity profiles0.756
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.754
H04L63/0263Rule management0.753
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions | information retrieval  database structures or file system structures therefor | (ref: G06F16/00)0.749
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.749
G06F11/3466Performance evaluation by tracing or monitoring0.749
G06F21/54by adding security routines or objects to programs0.749
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.748
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.747
G06F21/629to features or functions of an application0.747
H04L67/306User profiles0.747
G06F8/60Software deployment0.745
G06F9/06using stored programs  i.e. using an internal store of processing equipment to receive or retain programs0.745
G06F9/542Event management| Broadcasting| Multicasting| Notifications0.745
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)0.742
G06F21/45Structures or tools for the administration of authentication0.742
G06F21/561Virus type analysis0.741
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)0.740
G06F9/45508Runtime interpretation or emulation  e g. emulator loops  bytecode interpretation0.740
G06F21/563by source code analysis0.740
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.740
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.740
H04L63/104Grouping of entities0.739
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communications| Network security protocols0.739
G06F21/31User authentication0.738
G06F21/44Program or device authentication0.738
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.738
H04W12/66Trust-dependent  e.g. using trust scores or trust relationships0.724
G06F16/248Presentation of query results0.717
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.717
G06Q10/00Administration| Management0.715
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.708
G06F21/42using separate channels for security data0.708
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.708
G06F3/0613in relation to throughput0.707
G06F21/602Providing cryptographic facilities or services0.706
G06F9/547Remote procedure calls [RPC]| Web services0.702
A47G7/044Hanging flower-pot holders  e.g. mounted on walls  balcony fences or the like | on windows or doors | (ref: A47H27/00)0.702
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.699
G06F16/907Retrieval characterised by using metadata  e.g. metadata not derived from the content or metadata generated manually0.693
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.688
H04L51/046Interoperability with other network applications or services0.688
H04L43/10Active monitoring  e.g. heartbeat  ping or trace-route0.679
H04L63/101Access control lists [ACL]0.670
G06F21/565by checking file integrity0.666
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.663
H04L63/1458Denial of Service0.663
G06F11/00Error detection| Error correction| Monitoring | error detection  correction or monitoring in information storage based on relative movement between record carrier and transducer | (ref: G11B20/18)| | monitoring  i.e. supervising the progress of recording or reproducing | (ref: G11B27/36)| | in static stores | (ref: G11C29/00)0.662
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.653
G06Q50/20Education0.649
G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers | mechanically operated | (ref: G09B3/00)| | computing arrangements | (ref: G06F)0.649
H04W12/128Anti-malware arrangements  e.g. protection against SMS fraud or mobile malware0.322
H04L67/10in which an application is distributed across nodes in the network | software deployment | (ref: G06F8/60)| | multiprogramming arrangements | (ref: G06F9/46)0.318
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.318
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.318
G06N3/08Learning methods0.308
H04W12/12Detection or prevention of fraud0.308
H04W12/122Counter-measures against attacks| Protection against rogue devices0.308
G06N5/025Extracting rules from data0.307
G06F3/0486Drag-and-drop0.306
G06N20/10using kernel methods  e.g. support vector machines [SVM]0.306
G06K9/622Non-hierarchical partitioning techniques0.306
G06F3/04842Selection of displayed objects or displayed text elements | (ref: G06F3/0482)|  takes precedence0.306
G06K9/6218Clustering techniques0.306
G06V30/10Character recognition0.306
H04L67/12specially adapted for proprietary or special-purpose networking environments  e.g. medical networks  sensor networks  networks in vehicles or remote metering networks0.306
G06F16/2455Query execution0.306
H04L51/224providing notification on incoming messages  e.g. pushed notifications of received messages0.306
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.306
G06F40/40Processing or translation of natural language | natural language analysis | (ref: G06F40/20)| | semantic analysis | (ref: G06F40/30)0.306
H04L51/42Mailbox-related aspects  e.g. synchronisation of mailboxes0.306
H04L41/22comprising specially adapted graphical user interfaces [GUI]0.306
H04L43/045for graphical visualisation of monitoring data0.306
H04L51/212using filtering or selective blocking0.306
G06F21/36by graphic or iconic representation0.306
H04L63/108when the policy decisions are valid for a limited amount of time0.305
H04N21/4542Blocking scenes or portions of the received content  e.g. censoring scenes0.302
H04N21/4425Monitoring of client processing errors or hardware failure0.302
H04N21/4627Rights management | associated to the content | security in data switching network management | (ref: H04L41/28)| | security management or policies for network security | (ref: H04L63/20)| | access security in wireless networks | (ref: H04W12/08)0.302
H04W12/086using security domains0.300
H04L63/105Multiple levels of security0.300
H04L41/28Restricting access to network management systems or functions  e.g. using authorisation function to access network configuration0.300
H04L43/04Processing captured monitoring data  e.g. for logfile generation0.300
G06F11/3409for performance assessment0.298
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.298
G06F11/3438monitoring of user actions | tracking the activity of the user | (ref: H04L67/535)0.298
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.296
G06F21/60Protecting data0.296
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)0.293
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine0.293
H04L67/1001for accessing one among a plurality of replicated servers0.293
H04L67/34involving the movement of software or configuration parameters  | network booting or remote initial program loading [RIPL] | (ref: G06F9/4416)0.293
G06F21/604Tools and structures for managing or administering access control systems0.293
G06F16/2379Updates performed during online database operations| commit processing0.293
G06F21/82Protecting input  output or interconnection devices0.293
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.292
H04W12/126Anti-theft arrangements  e.g. protection against subscriber identity module [SIM] cloning0.292
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.291
G06F16/16File or folder operations  e.g. details of user interfaces specifically adapted to file systems0.289
H04L67/1097for distributed storage of data in networks  e.g. transport arrangements for network file system [NFS]  storage area networks [SAN] or network attached storage [NAS]0.289
G06F16/1844Management specifically adapted to replicated file systems0.289
G06F16/178Techniques for file synchronisation in file systems0.289
H04L67/133Protocols for remote procedure calls [RPC]0.289
H04L63/168above the transport layer0.289
G06N5/003Dynamic search techniques| Heuristics| Dynamic trees| Branch-and-bound0.289
G06N5/046Forward inferencing| Production systems0.289
H04L67/01Protocols0.289
H03K19/17768for security0.289
H03K19/17728Reconfigurable logic blocks  e.g. lookup tables0.289
H04L9/3236using cryptographic hash functions0.289
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures0.289
H04L63/123received data contents  e.g. message integrity0.289
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material0.289
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.289
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | user-to-user messaging in packet switching-networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail  | (ref: H04L51/00)| Time management  e.g. calendars  reminders  meetings or time accounting0.289
H04L47/20Traffic policing0.288
H04L47/805QOS or priority aware0.288
H04L63/0281Proxies0.288
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.287
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code0.287
G06F8/40Transformation of program code0.287
H04L41/0853by actively collecting configuration information or by backing up configuration information0.285
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.285
G08B13/19608Tracking movement of a target  e.g. by detecting an object predefined as a target  using target direction and or velocity to predict its new position0.284
H04N7/18Closed circuit television systems  i.e. systems in which the signal is not broadcast | television transmission of measured quantities | (ref: G01D5/39)| | intruder alarm or detection by television surveillance | (ref: G08B13/196)0.284
G06Q50/26Government or public services0.284
G06K9/6256Obtaining sets of training patterns| Bootstrap methods  e.g. bagging  boosting0.284
G08B13/19602Image analysis to detect motion of the intruder  e.g. by frame subtraction0.284
G06N3/0454using a combination of multiple neural nets0.284
G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion0.284
G06V10/768using context analysis  e.g. recognition aided by known co-occurring patterns0.284
G06V40/20Movements or behaviour  e.g. gesture recognition | recognition of facial expressions | (ref: G06V40/16)0.284
G08B13/196using television cameras0.284
G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data0.284
G08B13/19645Multiple cameras  each having view on one of a plurality of scenes  e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over0.284
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)0.284
H04W12/37Managing security policies for mobile devices or for controlling mobile applications0.284
H04W88/02Terminal devices0.284
H04W8/245from a network towards a terminal0.284
G06F16/285Clustering or classification0.283
H04L67/535Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)0.283
G06F15/76Architectures of general purpose stored program computers | with program plugboard | (ref: G06F15/08)| | multicomputers | (ref: G06F15/16)0.283
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.283
H04L41/12Discovery or management of network topologies0.282
H04L41/142using statistical or mathematical methods0.282
G06F16/254Extract  transform and load [ETL] procedures  e.g. ETL data flows in data warehouses0.282
H04L41/024using relational databases for representation of network management data  e.g. managing via structured query language [SQL]0.281
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.281
G06F9/4484Executing subprograms0.281
G06F9/468Specific access rights for resources  e.g. using capability register0.281
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object  an image or a displayed text element  setting a parameter value or selecting a range0.280
G06F40/205Parsing0.280
G06F8/20Software design0.279
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.279
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.278
G06N5/048Fuzzy inferencing0.278
G06F16/137Hash-based | content-based indexing of textual data | (ref: G06F16/31)0.278
G06N3/0675using electro-optical  acousto-optical or opto-electronic means0.278
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.278
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.278
H04L41/20Network management software packages0.278
G06F16/93Document management systems0.278
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.278
H04L63/0838using one-time-passwords0.278
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)0.278
G06F21/568eliminating virus  restoring damaged files0.278
H04L41/06Management of faults  events  alarms or notifications0.278
G06F9/45516Runtime code conversion or optimisation0.278
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.278
H04L67/60Scheduling or organising the servicing of application requests  e.g. requests for application data transmissions using the analysis and optimisation of the required network resources | admission control or resource allocation | (ref: H04L47/70)0.278
G06F9/45558Hypervisor-specific management and integration aspects0.278
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/212)0.278
G07C9/00Individual registration on entry or exit0.277
G08G5/0013with a ground station0.277
H04L41/0859by keeping history of different configuration generations or by rolling back to previous configuration versions0.275
H04L41/0866Checking the configuration0.275
H04L41/0631using root cause analysis| using analysis of correlation between notifications  alarms or events based on decision criteria  e.g. hierarchy  tree or time analysis0.273
G06Q10/107Computer aided management of electronic mail | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L51/00)| | network security protocols | (ref: H04L63/00)| | real-time communication protocols in data switching networks | (ref: H04L65/00)| | network protocols for data switching network services | (ref: H04L67/00)0.273
H04W60/00Affiliation to network  e.g. registration| Terminating affiliation with the network  e.g. de-registration0.271
H04W12/69Identity-dependent0.271
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders or dials0.269
G06Q10/06315Needs-based resource requirements planning or analysis0.269
G06Q10/0635Risk analysis0.269
G06F9/54Interprogram communication0.269
G06F16/2282Tablespace storage structures| Management thereof0.269
G06F9/5072Grid computing0.269
H04L43/028by filtering0.265
H04L69/16Implementation or adaptation of Internet protocol [IP]  of transmission control protocol [TCP] or of user datagram protocol [UDP]0.265
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling0.265
H04W12/61Time-dependent0.265
H04W12/63Location-dependent| Proximity-dependent0.265
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.265
G06F3/0614Improving the reliability of storage systems0.265
G06F3/0673Single storage device0.265
G06F3/0676Magnetic disk device0.265
H04L63/164at the network layer0.265
G06F16/9024Graphs| Linked lists | (ref: G06F16/9027)|  takes precedence0.265
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.265
H04L9/0822using key encryption key0.265
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.265
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.265
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]0.263
A01G9/02Receptacles  e.g. flower-pots or boxes | self-acting watering devices | (ref: A01G27/00)| | hanging flower baskets  holders or containers for flower-pots | (ref: A47G7/00)| Glasses for cultivating flowers0.263
A47G7/06Flower vases0.263
G06N3/04Architectures  e.g. interconnection topology0.263
H04L67/141Setup of application sessions | admission control or resource allocation in data switching networks | (ref: H04L47/70)0.263
G06N7/005Probabilistic networks0.263
G06F11/302where the computing system component is a software system0.262
G06F11/323Visualisation of programs or trace data0.262
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.262
G06F3/04886by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas  e.g. virtual keyboards or menus0.262
G06F17/18for evaluating statistical data |   e.g. average values  frequency distributions  probability functions  regression analysis | forecasting specially adapted for a specific administrative  business or logistic context | (ref: G06Q10/04)0.262
G06F40/284Lexical analysis  e.g. tokenisation or collocates0.262
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.262
G06F11/076by exceeding a count or rate limit  e.g. word- or bit count limit0.262
G06N3/02using neural network models0.262
G06F11/327Alarm or error message display0.262
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.262
G06F16/9535Search customisation based on user profiles and personalisation0.258
H04L51/00User-to-user messaging in packet-switching networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail0.255
G06K9/6267Classification techniques0.252
H04L41/085Retrieval of network configuration| Tracking network configuration history0.251
H04L41/0813characterised by the conditions triggering a change of settings0.251
H04L41/0869Validating the configuration within one network element0.251
H04L9/3247involving digital signatures0.249
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.249
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.249
H04L67/104Peer-to-peer [P2P] networks0.248
G06F21/43wireless channels0.248
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.248
H04L63/02for separating internal from external traffic  e.g. firewalls0.248
H04L63/0254Stateful filtering0.248
G06F21/40by quorum  i.e. whereby two or more security principals are required0.248
G06F11/3495for systems0.247
G06F11/3447Performance evaluation by modeling0.247
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.247
G09B5/06with both visual and audible presentation of the material to be studied0.243
G06Q10/0639Performance analysis0.243
G09B7/02of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student0.243
G09B5/00Electrically-operated educational appliances | working with questions and answers | (ref: G09B7/00)| | simulators | (ref: G09B9/00)| | advertising or displaying in general | (ref: G09F)0.243
G06Q10/101Collaborative creation of products or services0.243
G06F2221/034Test or assess a computer or a system0.053
H04W12/68Gesture-dependent or behaviour-dependent0.051
H04L2463/146Tracing the source of attacks0.051
H04L51/18Commands or executable codes0.051
G06N20/20Ensemble learning0.051
G06F2221/2101Auditing as a secondary aspect0.050
G06F2221/2105Dual mode as a secondary aspect0.050
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.050
G06F2221/033Test or assess software0.048
G06T11/60Editing figures and text| Combining figures or text0.048
G06T2200/24involving graphical user interfaces [GUIs]0.048
G06T11/206Drawing of charts or graphs0.048
H04L2209/84Vehicles0.048
G06F8/30Creation or generation of source code0.048
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.047
G06F2221/2113Multi-level security  e.g. mandatory access control0.047
G06F2221/2107File encryption0.047
H04L43/0894Packet rate0.047
G06F11/1458Management of the backup or restore process0.047
H04L9/40Network security protocols0.047
G06F11/368for test version control  e.g. updating test cases to a new software version0.047
G06F2209/543Local0.047
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key0.046
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.046
H04L9/3271using challenge-response0.046
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.046
G06F9/45529Embedded in an application  e.g. JavaScript in a Web browser0.046
G06F2009/45562Creating  deleting  cloning virtual machine instances0.046
G08G5/0095Aspects of air-traffic control not provided for in the other subgroups of this main group0.046
G06F2221/2115Third party0.046
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.046
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.046
H04L41/0672by re-configuring the faulty entity0.046
H04L41/0863by rolling back to previous configuration versions0.046
H04L51/48Message addressing  e.g. address format or anonymous messages  aliases0.046
H04L51/08Annexed information  e.g. attachments0.046
G06Q30/018Business or product certification or verification0.045
H04L63/0272Virtual private networks0.044
G06F11/3636by tracing the execution of the program0.044
G06F2201/865Monitoring of software0.044
H04L67/55Push-based network services0.042
H04L43/16Threshold monitoring0.042
H04L2463/144Detection or countermeasures against botnets0.041
G06F2201/81Threshold0.041
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.041
G06F21/88Detecting or preventing theft or loss0.041
G06F2221/2147Locking files0.041
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.