US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
WO1999066383A2
(en)
*
|
1998-06-15 |
1999-12-23 |
Dmw Worldwide, Inc. |
Method and apparatus for assessing the security of a computer system
|
SE515084C2
(en)
*
|
1998-08-26 |
2001-06-05 |
Ericsson Telefon Ab L M |
Procedure and device in an IP network
|
US6321338B1
(en)
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
US6718382B1
(en)
*
|
1999-02-11 |
2004-04-06 |
Yunzhou Li |
Technique for detecting leaky points within a network protocol domain
|
US6405204B1
(en)
*
|
1999-03-02 |
2002-06-11 |
Sector Data, Llc |
Alerts by sector/news alerts
|
US6880087B1
(en)
*
|
1999-10-08 |
2005-04-12 |
Cisco Technology, Inc. |
Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system
|
US7159237B2
(en)
*
|
2000-03-16 |
2007-01-02 |
Counterpane Internet Security, Inc. |
Method and system for dynamic network intrusion monitoring, detection and response
|
US7032023B1
(en)
*
|
2000-05-16 |
2006-04-18 |
America Online, Inc. |
Throttling electronic communications from one or more senders
|
US7380272B2
(en)
*
|
2000-05-17 |
2008-05-27 |
Deep Nines Incorporated |
System and method for detecting and eliminating IP spoofing in a data transmission network
|
US7058976B1
(en)
|
2000-05-17 |
2006-06-06 |
Deep Nines, Inc. |
Intelligent feedback loop process control system
|
US6930978B2
(en)
*
|
2000-05-17 |
2005-08-16 |
Deep Nines, Inc. |
System and method for traffic management control in a data transmission network
|
US7299489B1
(en)
*
|
2000-05-25 |
2007-11-20 |
Lucent Technologies Inc. |
Method and apparatus for host probing
|
GB2411747B
(en)
*
|
2000-05-28 |
2005-10-19 |
Secureol |
System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
|
US9213836B2
(en)
|
2000-05-28 |
2015-12-15 |
Barhon Mayer, Batya |
System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
|
FR2810180B1
(en)
*
|
2000-06-08 |
2005-04-29 |
Cit Alcatel |
METHOD FOR PROVIDING ACCESS CONTROL FOR AND / OR TO USERS ACCESSING TERMINALS TO THE INTERNET NETWORK, THROUGH A PRIVATE ACCESS NODE, AND ARRANGEMENTS FOR IMPLEMENTING A SUCH METHOD
|
JP3619958B2
(en)
*
|
2000-06-13 |
2005-02-16 |
富士通株式会社 |
Crisis management system and computer
|
US6721721B1
(en)
*
|
2000-06-15 |
2004-04-13 |
International Business Machines Corporation |
Virus checking and reporting for computer database search results
|
US7725587B1
(en)
|
2000-08-24 |
2010-05-25 |
Aol Llc |
Deep packet scan hacker identification
|
US7711790B1
(en)
|
2000-08-24 |
2010-05-04 |
Foundry Networks, Inc. |
Securing an accessible computer system
|
US7970886B1
(en)
*
|
2000-11-02 |
2011-06-28 |
Arbor Networks, Inc. |
Detecting and preventing undesirable network traffic from being sourced out of a network domain
|
US6996845B1
(en)
|
2000-11-28 |
2006-02-07 |
S.P.I. Dynamics Incorporated |
Internet security analysis system and process
|
US7168093B2
(en)
|
2001-01-25 |
2007-01-23 |
Solutionary, Inc. |
Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
|
WO2002084495A1
(en)
*
|
2001-04-13 |
2002-10-24 |
Nokia, Inc. |
System and method for providing exploit protection for networks
|
US6941478B2
(en)
*
|
2001-04-13 |
2005-09-06 |
Nokia, Inc. |
System and method for providing exploit protection with message tracking
|
KR20010084950A
(en)
*
|
2001-06-02 |
2001-09-07 |
유진영 |
Secure worm
|
US20020199116A1
(en)
*
|
2001-06-25 |
2002-12-26 |
Keith Hoene |
System and method for computer network virus exclusion
|
US6513122B1
(en)
|
2001-06-29 |
2003-01-28 |
Networks Associates Technology, Inc. |
Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
|
US6873988B2
(en)
*
|
2001-07-06 |
2005-03-29 |
Check Point Software Technologies, Inc. |
System and methods providing anti-virus cooperative enforcement
|
US7228566B2
(en)
*
|
2001-07-10 |
2007-06-05 |
Core Sdi, Incorporated |
Automated computer system security compromise
|
EP1417802A1
(en)
*
|
2001-07-24 |
2004-05-12 |
Worldcom. Inc. |
Network security architecture
|
US7107446B2
(en)
|
2001-08-30 |
2006-09-12 |
International Business Machines Corporation |
Mechanism independent cluster security services
|
US6892241B2
(en)
*
|
2001-09-28 |
2005-05-10 |
Networks Associates Technology, Inc. |
Anti-virus policy enforcement system and method
|
US7210168B2
(en)
*
|
2001-10-15 |
2007-04-24 |
Mcafee, Inc. |
Updating malware definition data for mobile data processing devices
|
US7734752B2
(en)
*
|
2002-02-08 |
2010-06-08 |
Juniper Networks, Inc. |
Intelligent integrated network security device for high-availability applications
|
US7650634B2
(en)
|
2002-02-08 |
2010-01-19 |
Juniper Networks, Inc. |
Intelligent integrated network security device
|
US8370936B2
(en)
*
|
2002-02-08 |
2013-02-05 |
Juniper Networks, Inc. |
Multi-method gateway-based network security systems and methods
|
US6715084B2
(en)
*
|
2002-03-26 |
2004-03-30 |
Bellsouth Intellectual Property Corporation |
Firewall system and method via feedback from broad-scope monitoring for intrusion detection
|
US7042852B2
(en)
*
|
2002-05-20 |
2006-05-09 |
Airdefense, Inc. |
System and method for wireless LAN dynamic channel change with honeypot trap
|
US7058796B2
(en)
|
2002-05-20 |
2006-06-06 |
Airdefense, Inc. |
Method and system for actively defending a wireless LAN against attacks
|
US7277937B2
(en)
*
|
2002-07-17 |
2007-10-02 |
Core Sdi, Incorporated |
Distributed computing using syscall proxying
|
US7353539B2
(en)
*
|
2002-11-04 |
2008-04-01 |
Hewlett-Packard Development Company, L.P. |
Signal level propagation mechanism for distribution of a payload to vulnerable systems
|
US20040146006A1
(en)
*
|
2003-01-24 |
2004-07-29 |
Jackson Daniel H. |
System and method for internal network data traffic control
|
US7328454B2
(en)
*
|
2003-04-24 |
2008-02-05 |
At&T Delaware Intellectual Property, Inc. |
Systems and methods for assessing computer security
|
US20040254988A1
(en)
*
|
2003-06-12 |
2004-12-16 |
Rodriguez Rafael A. |
Method of and universal apparatus and module for automatically managing electronic communications, such as e-mail and the like, to enable integrity assurance thereof and real-time compliance with pre-established regulatory requirements as promulgated in government and other compliance database files and information websites, and the like
|
JP4229013B2
(en)
*
|
2003-09-01 |
2009-02-25 |
株式会社デンソー |
AC generator
|
US7730137B1
(en)
|
2003-12-22 |
2010-06-01 |
Aol Inc. |
Restricting the volume of outbound electronic messages originated by a single entity
|
US7548956B1
(en)
|
2003-12-30 |
2009-06-16 |
Aol Llc |
Spam control based on sender account characteristics
|
CN100349084C
(en)
*
|
2004-01-05 |
2007-11-14 |
华为技术有限公司 |
Method for ensuring system safety for window operating system
|
US7707634B2
(en)
*
|
2004-01-30 |
2010-04-27 |
Microsoft Corporation |
System and method for detecting malware in executable scripts according to its functionality
|
US7765597B2
(en)
*
|
2004-02-11 |
2010-07-27 |
Hewlett-Packard Development Company, L.P. |
Integrated crawling and auditing of web applications and web content
|
US20060282494A1
(en)
*
|
2004-02-11 |
2006-12-14 |
Caleb Sima |
Interactive web crawling
|
EP1716471B1
(en)
*
|
2004-02-11 |
2018-11-21 |
Entit Software LLC |
System and method for testing web applications with recursive discovery and analysis
|
US7529187B1
(en)
*
|
2004-05-04 |
2009-05-05 |
Symantec Corporation |
Detecting network evasion and misinformation
|
US8074277B2
(en)
*
|
2004-06-07 |
2011-12-06 |
Check Point Software Technologies, Inc. |
System and methodology for intrusion detection and prevention
|
KR100604604B1
(en)
*
|
2004-06-21 |
2006-07-24 |
엘지엔시스(주) |
Method for securing system using server security solution and network security solution, and security system implementing the same
|
US7716660B2
(en)
*
|
2004-12-14 |
2010-05-11 |
Microsoft Corporation |
Method and system for downloading updates
|
US20060185018A1
(en)
*
|
2005-02-17 |
2006-08-17 |
Microsoft Corporation |
Systems and methods for shielding an identified vulnerability
|
GB2425679A
(en)
*
|
2005-04-27 |
2006-11-01 |
Hewlett Packard Development Co |
Scanning computing entities for vulnerabilities
|
US7483424B2
(en)
*
|
2005-07-28 |
2009-01-27 |
International Business Machines Corporation |
Method, for securely maintaining communications network connection data
|
US20070130149A1
(en)
*
|
2005-10-12 |
2007-06-07 |
Lenovo (Singapore) Pte. Ltd. |
Method, system, and computer program product for troubleshooting/configuring communications settings of a computer system
|
US8291093B2
(en)
|
2005-12-08 |
2012-10-16 |
Microsoft Corporation |
Peer-to-peer remediation
|
JP4545085B2
(en)
*
|
2005-12-08 |
2010-09-15 |
富士通株式会社 |
Firewall device
|
US8301767B1
(en)
|
2005-12-21 |
2012-10-30 |
Mcafee, Inc. |
System, method and computer program product for controlling network communications based on policy compliance
|
KR20070099201A
(en)
*
|
2006-04-03 |
2007-10-09 |
삼성전자주식회사 |
Method of security management for mobile wireless device and apparatus for security management using the same
|
US8281392B2
(en)
|
2006-08-11 |
2012-10-02 |
Airdefense, Inc. |
Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
|
US20080052508A1
(en)
*
|
2006-08-25 |
2008-02-28 |
Huotari Allen J |
Network security status indicators
|
US20080059123A1
(en)
*
|
2006-08-29 |
2008-03-06 |
Microsoft Corporation |
Management of host compliance evaluation
|
JP2008071177A
(en)
*
|
2006-09-14 |
2008-03-27 |
Fujitsu Ltd |
Information processor, control method, and program for making computer execute same method
|
GB2443459A
(en)
*
|
2006-10-31 |
2008-05-07 |
Hewlett Packard Development Co |
Data packet incuding computing platform indication
|
US20080133639A1
(en)
*
|
2006-11-30 |
2008-06-05 |
Anatoliy Panasyuk |
Client Statement of Health
|
JP4925109B2
(en)
*
|
2007-01-16 |
2012-04-25 |
Kddi株式会社 |
Electronic device, program, and recording medium
|
US8782786B2
(en)
*
|
2007-03-30 |
2014-07-15 |
Sophos Limited |
Remedial action against malicious code at a client facility
|
US8024801B2
(en)
*
|
2007-08-22 |
2011-09-20 |
Agere Systems Inc. |
Networked computer system with reduced vulnerability to directed attacks
|
US20090119769A1
(en)
*
|
2007-11-05 |
2009-05-07 |
Microsoft Corporation |
Cross-site scripting filter
|
US8667583B2
(en)
*
|
2008-09-22 |
2014-03-04 |
Microsoft Corporation |
Collecting and analyzing malware data
|
US9342274B2
(en)
|
2011-05-19 |
2016-05-17 |
Microsoft Technology Licensing, Llc |
Dynamic code generation and memory management for component object model data constructs
|
US8881101B2
(en)
|
2011-05-24 |
2014-11-04 |
Microsoft Corporation |
Binding between a layout engine and a scripting engine
|
US8543543B2
(en)
*
|
2011-09-13 |
2013-09-24 |
Microsoft Corporation |
Hash-based file comparison
|
US9430452B2
(en)
|
2013-06-06 |
2016-08-30 |
Microsoft Technology Licensing, Llc |
Memory model for a layout engine and scripting engine
|
CN108809886A
(en)
*
|
2017-04-26 |
2018-11-13 |
牡丹江医学院 |
A kind of computer network security guard system
|
CN114584330A
(en)
*
|
2020-11-16 |
2022-06-03 |
华为技术有限公司 |
Vulnerability testing method and device
|