$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Distributed content identification system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
  • G06F-015/16
출원번호 US-0469567 (1999-12-22)
발명자 / 주소
  • Mark Raymond Pace
  • Brooks Cash Talley
대리인 / 주소
    Vierra Magen Marcus Harmon & DeNiro LLP
인용정보 피인용 횟수 : 632  인용 특허 : 18

초록

A file content classification system includes a digital ID generator and an ID appearance database coupled to receive IDs from the ID generator. The system further includes a characteristic comparison routine identifying the file as having a characteristic based on ID appearance in the appearance da

대표청구항

1. A file content classification system comprising:a plurality of agents, each agent including a file content ID generator creating file content IDs using a mathematical algorithm, at least one agent provided on one of a plurality of clients; an ID appearance database, provided on a server, coupled

이 특허에 인용된 특허 (18)

  1. Paul Sunil, Apparatus and method for controlling delivery of unsolicited electronic mail.
  2. Butler Theodore ; Wong Marcus, Apparatus and method for encryption key generation.
  3. Meyerzon Dmitriy ; Nichols William G., Automatic tagging of documents and exclusion by content.
  4. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  5. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  6. Metzger Stephen D. (Lancaster MA) Lomicka Jeffrey A. (Maynard MA) Vacon Gary (Melrose MA) Gili Pat (Westfield MA), Disposition filtering of messages using a single address and protocol table bridge.
  7. Hull Jonathan J. (Amherst NY) Hart Peter E. (Menlo Park CA), Image matching and retrieval by multi-access redundant hashing.
  8. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  9. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  10. Eidson John C ; Nicholson Clark ; Weibel Gerald ; O'Brien Dennis ; Wardle Jay M ; Engel Glenn R. ; van der Meulen Ronald, Message filters, automatic binding, and encoding for distributed systems.
  11. Donaldson Albert L., Method and apparatus for filtering junk email.
  12. Syeda-Mahmood Tanveer F., Method and means of matching documents based on text genre.
  13. Cobb Christopher Alan, Method and system for filtering electronic messages.
  14. Fleming ; III Hoyt A., Method and system for filtering unauthorized electronic mail messages.
  15. Lillibridge Mark D. ; Abadi Martin ; Bharat Krishna ; Broder Andrei Z., Method for selectively restricting access to computer systems.
  16. Cotten William D., Preventing delivery of unwanted bulk e-mail.
  17. Paul Sunil, System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing.
  18. Birrell Andrew D. ; Wobber Edward P. ; Schroeder Michael ; Melling Christopher,GBX ; Jaffer Simon,GBX, Technique for dynamically generating an address book in a distributed electronic mail system.

이 특허를 인용한 특허 (632)

  1. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  2. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  4. Fisher, Lee Adam; Clark, Jack Robert Arron; Baines, Nicholas Edward, Alert message control of security mechanisms in data processing systems.
  5. Bean, James; Spurlock, Joel R., Anomaly detection to identify malware.
  6. Stecher, Martin, Anonymous shipment brokering.
  7. Hugard, IV, James Michael; Keir, Robin; Rebelo, Joshua Cajetan; Arkin, Ofir; Schrecker, Sven, Asset detection system.
  8. Hugard, IV, James Michael; Keir, Robin; Rebelo, Joshua Cajetan; Arkin, Ofir; Schrecker, Sven, Asset detection system.
  9. Schrecker, Sven; Ritter, Stephen; Nakawatase, Ryan, Asset risk analysis.
  10. Schrecker, Sven; Ritter, Stephen; Nakawatase, Ryan, Asset risk analysis.
  11. Walker, Jesse Randall; Herbert, Howard C.; Brannock, Kirk D.; Cooper, Geoffrey H.; deVries, David A.; Amols, David M.; Schrecker, Sven; Price, Stephen H., Attestation device custody transfer protocol.
  12. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  13. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  14. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  15. Ahuja, Ratinder Paul Singh; Schrecker, Sven, Automated asset criticality assessment.
  16. Ralston,Geoffrey D.; Nakayama,David H.; Lewin,Matthew E.; Jayachandran,Ravichandran Menon; Woods,Brian R.; Manber,Udi, Automated bulk communication responder.
  17. Zheng,Hao; Chu,Bruce Hui der; Kundu,Anirban; Libbey,Miles A.; Nakayama,David H.; Zhu,Jing, Automated solicited message detection.
  18. Hunt, Simon; Robison, Brian T., Automatic sanitization of data on a mobile device in a network environment.
  19. McArdle, Mark J.; Johnston, Brent A.; Nathan, Philip D. R.; Dool, James, Automatically configuring a computer firewall based on network connection.
  20. Mondiguing, Stephen; Cruz, Benjamin, Behavioral detection of malware agents.
  21. Smith, Ned M.; Rubakha, Dmitri; Shah, Samir; Martin, Jason; Sheller, Micah J.; Chakrabarti, Somnath; Xing, Bin, Binary translation of a trusted binary with input tagging.
  22. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, Blocking of spam e-mail at a firewall.
  23. Horvath, Akos; Faieta, Alessandro, Bootstrap OS protection and recovery.
  24. Horvath, Akos; Faieta, Alessandro, Bootstrap OS protection and recovery.
  25. Horvath, Akos; Faieta, Alessandro, Bootstrap OS protection and recovery.
  26. Chasin, C. Scott, Bounce management in a trusted communication network.
  27. Basavapatna, Prasanna Ganapathi; Kolingivadi, Deepakeshwaran; Schrecker, Sven, Calculating quantitative asset risk.
  28. Parnell, Todd C.; Uzquiano, Michael G.; Royston, Scott C., Classification based content management system.
  29. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  30. Liebmann, Nicholas; Neal, Peter; Bishop, Michael G.; Cragin, Justin; Driscoll, Michael, Cloud email message scanning with local policy application in a network environment.
  31. Liebmann, Nicholas; Neal, Peter; Bishop, Michael G.; Cragin, Justin; Driscoll, Michael, Cloud email message scanning with local policy application in a network environment.
  32. Liebmann, Nicholas; Neal, Peter; Bishop, Michael G.; Cragin, Justin; Driscoll, Michael, Cloud email message scanning with local policy application in a network environment.
  33. Pearcy, Derek Patton, Collaborative searching.
  34. Pearcy, Derek Patton, Collaborative searching.
  35. Pearcy, Derek Patton, Collaborative searching.
  36. Flury, Andrew; Banister, Scott; Sprosts, Craig; Peterson, Patrick R.; Olivier, Michael V., Collecting, aggregating, and managing information relating to electronic messages.
  37. Pearcy, Derek Patton; Gaskins, Jessica J.; Ackroyd, Edward C., Computer display screen with graphical user interface.
  38. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  39. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  40. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  41. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  42. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  43. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  44. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  45. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  46. Pearcy, Derek Patton; Gaskins, Jessica J., Computer having graphical user interface.
  47. Harris, Steven M., Computer program for securely viewing a file.
  48. Pearcy, Derek Patton; Heinrich, Jessica Anne; Phillips, Craig Anthony, Computer system security dashboard.
  49. McDowell, John R.; Kaul, Neeraj; Bharathapudi, Pavan Kumar V.; Revashetti, Siddaraya B.; Narjala, Ranjit S.; Venkatachary, Ramkumar Ram Chary; Mostafa, Sahar; Yalapalli, Vani; Slate, Charles, Conditional login promotion.
  50. Berenbaum, Alan D.; Weiss, Raphael, Configurable signature for authenticating data or program code.
  51. Gaitonde, Jitendra B., Configuration management for a capture/registration system.
  52. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  53. Verma, Snigdha; Li, Jun; Zhang, Junbiao, Content timing method and system.
  54. Nadkarni, Hemang; Das, Sudeep, Context-aware network on a data exchange layer.
  55. Hunt, Simon; Sambandam, Venkata Ramanan; Venkateswaran, Prasanna, Contextual scoring of automobile drivers.
  56. Hallam-Baker, Phillip Martin, Control and management of electronic messaging.
  57. Hallam-Baker, Phillip Martin, Control and management of electronic messaging.
  58. Hallam-Baker, Phillip Martin, Control and management of electronic messaging.
  59. Gartside, Paul Nicholas; Harris, Mark, Controlling use of a computer program installed on a computer.
  60. Pearcy, Derek Patton, Cooperative mobile analytics.
  61. Schmelzer, Richard A., Copyright detection and protection system and method.
  62. Schmelzer, Richard A., Copyright detection and protection system and method.
  63. Schmelzer, Richard A., Copyright detection and protection system and method.
  64. Schmelzer, Richard A., Copyright detection and protection system and method.
  65. Schmelzer, Richard A., Copyright detection and protection system and method.
  66. Schmelzer, Richard A., Copyright detection and protection system and method.
  67. Schmelzer, Richard A., Copyright detection and protection system and method.
  68. Schmelzer, Richard A.; Pellom, Bryan L., Copyright detection and protection system and method.
  69. Schmelzer,Richard A.; Pellom,Bryan L., Copyright detection and protection system and method.
  70. Buruganahalli, Shivakumar; Nedbal, Manuel, Creating and managing a network security tag.
  71. Buruganahalli, Shivakumar; Nedbal, Manuel, Creating and managing a network security tag.
  72. Hunt, Simon; Mankin, Jennifer; Zimmerman, Jeffrey, Cross-view malware detection.
  73. Ahuja, Ratinder Paul Singh; Singh, Balbir; Bhattacharjee, Rajbir; Kulkarni, Dattatraya, Data loss prevention for mobile computing devices.
  74. Ahuja, Ratinder Paul Singh; Singh, Balbir; Bhattacharjee, Rajbir; Kulkarni, Dattatraya, Data loss prevention for mobile computing devices.
  75. Ahuja, Ratinder Paul Singh; Singh, Balbir; Bhattacharjee, Rajbir; Kulkarni, Dattatraya, Data loss prevention for mobile computing devices.
  76. Mehta, Kunal; Woodward, Carl D.; Grobman, Steven; Durand, Ryan; Hunt, Simon, Data loss prevention of social media content.
  77. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  78. Smith, Ned; Gutierrez, Esteban; Woodruff, Andrew; Kapoor, Aditya, Data verification using enclave attestation.
  79. Smith, Ned; Gutierrez, Esteban; Woodruff, Andrew; Kapoor, Aditya, Data verification using enclave attestation.
  80. Lowe, Rick; Brocker, Stephen, Database for a capture system.
  81. Kumar, Lokesh; Ramchetty, Harinath Vishwanath; Kulkarni, Girish R., Detecting and responding to malware using link files.
  82. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  83. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  84. Muttik, Igor Garrievich, Detecting malicious computer program activity using external program calls with dynamic rule sets.
  85. Tarbotton, Lee Codel Lawson; Gudgion, Kevin Andrew, Detecting malware carried by an E-mail message.
  86. Sahita, Ravi; Deng, Lu; Shanbhogue, Vedvyas; Lu, Lixin; Shepsen, Alexander; Tatourian, Igor, Detection and mitigation of malicious invocation of sensitive code.
  87. Das, Sudeep; Divakarla, Jayasankar; Sharma, Pramod, Detection and prevention of installation of malicious mobile applications.
  88. Das, Sudeep; Divakarla, Jayasankar; Sharma, Pramod, Detection and prevention of installation of malicious mobile applications.
  89. Edwards, Jonathan L.; Cochin, Cedric; Kapoor, Aditya, Detection of a malicious peripheral.
  90. Xu, Chong; Sun, Bing; Singh, Navtej; Lin, Yichong; Bu, Zheng, Detection of malicious scripting language code in a network environment.
  91. Singh, Baibhav; Kashyap, Rahul, Detection of malicious system calls.
  92. Kapoor, Aditya; Spurlock, Joel R.; Edwards, Jonathan L., Detection of malicious thread suspension.
  93. Sheinin, Michael; Targosz, Rob, Detection of spam images.
  94. Li, Xiaoning; Lu, Lixin; Deng, Lu, Detection of stack pivoting.
  95. Teddy, John D.; Venugopalan, Ramnath; Cochin, Cedric; Spurlock, Joel R., Determining a reputation through network characteristics.
  96. Ying, John; Saung, Eming; Zheng, Yi, Device lock while in motion.
  97. Lancioni, German; Molina, Emiliano Gabriel; Maller, Patricio A., Device pairing in a local network.
  98. Ueda,Haruyasu, Device, method, and storage medium to block junk email.
  99. Jordan, Christopher J., Device, system and method for defending a computer network.
  100. Jordan, Christopher J., Device, system and method for defending a computer network.
  101. Muttik, Igor, Device-tailored whitelists.
  102. Nayshtut, Alex; Pogorelik, Oleg; Sharaga, Avishay; Smith, Ned M.; Muttik, Igor, Digital heritage notary.
  103. Zhang, Zheng; Schmugar, Craig D., Discovery of malicious strings.
  104. Nachenberg,Carey; Perriot,Frederic, Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis.
  105. Goldschlag, David; Sapp, Kevin; Walker, David, Distributed data revocation using data commands.
  106. Hinchliffe, Alex J.; Howard, Fraser P.; Rai, Bobby; Kemp, Andrew, Distribution of security policies for small to medium-sized organizations.
  107. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  108. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  109. Pollack, Jordan B.; Sack, Andy M., Dual-use email system.
  110. Muttik, Igor; Whittington, Paul H., Dynamic feature set management.
  111. Kirsch, Steven T.; Kiraly, Kenneth P., Electronic mail filtering system and methods.
  112. Banister,Scott; Clegg,Paul; Schlampp,Peter; Peterson,Patrick R., Electronic message delivery using an alternate source approach.
  113. Perry, Jr., George Thomas; Flury, Andrew; Banister, Scott; Peterson, Patrick R.; Moore, James F.; Olivier, Michael Varney, Electronic message delivery with estimation approaches and complaint, bond, and statistics panels.
  114. Gartside, Paul Nicholas; Heron, George L.; Bolin, Christopher S., Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites.
  115. Gartside, Paul Nicholas; Heron, George L.; Bolin, Christopher S., Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites.
  116. Gartside, Paul Nicholas; Heron, George L.; Bolin, Christopher S., Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites.
  117. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  118. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  119. Vank, Alexandru Z.; Shen, Xin; Cobb, Matt B.; Robel-Forrest, Brad; Phoenix, Evan M., Enabling dynamic authentication with different protocols on the same port for a switch.
  120. Vank, Alexandru Z.; Shen, Xin; Cobb, Matt B.; Robel-Forrest, Brad; Phoenix, Evan M., Enabling dynamic authentication with different protocols on the same port for a switch.
  121. Vank, Alexandru Z.; Shen, Xin; Cobb, Matt B.; Robel-Forrest, Brad; Webb, Evan M., Enabling dynamic authentication with different protocols on the same port for a switch.
  122. Zimmer, Vincent J.; Muttik, Igor; Poornachandran, Rajesh; Yao, Jiewen Jacques; Atreya, Mohan; Selvaraje, Gopinatth, Encryption key retrieval.
  123. Hunt, Simon, Encryption of memory device with wear leveling.
  124. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  125. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  126. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  127. Bean, James; Spurlock, Joel R.; Venugopalan, Ramnath, Enterprise reputations for uniform resource locators.
  128. Shahbazi, Majid, Enterprise-wide security for computer devices.
  129. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  130. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  131. Horstmann, Ralf; Kendzorra, Juergen; Madikonda, Pavan Kumar; Stein, Andre; Stecher, Martin, Establishing nodes for global routing manager.
  132. Sahita, Ravi; Li, Xiaoning; Lu, Lixin; Deng, Lu; Shepsen, Alexander; Xu, Xiang; Huang, Liangjun; Liu, Hua; Huang, Kai, Executing full logical paths for malware detection.
  133. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  134. Dalcher, Greg W.; Yamada, Koichi; Shanmugavelayutham, Palanivel Rajan; Singh, Jitendra P., Execution profiling detection of malicious objects.
  135. Nair, Santosh S.; Sood, Shikhar; Tenneti, Phani Gautham, Exposure of an apparatus to a technical hazard.
  136. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  137. Muttik, Igor, Frequency-based reputation.
  138. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  139. Beechey, Mostyn J.; Gartside, Paul N.; Stern, Henry C., Game console system, method and computer program product with anti-malware/spyware and parental control capabilities.
  140. Ajanovic, Jasmin; Harriman, David; Fanning, Blaise; Lee, David, General input/output architecture with PCI express protocol with credit-based flow control.
  141. Sun, Bing; Xu, Chong; Hetzler, Jeff; Bu, Zheng, Generic privilege escalation prevention.
  142. Sun, Bing; Xu, Chong; Hetzler, Jeff; Bu, Zheng, Generic privilege escalation prevention.
  143. Pearcy, Derek Patton; Heinrich, Jessica Anne; Gaskins, Jessica Jeanne, Geo-mapping system security events.
  144. Pearcy, Derek Patton; Heinrich, Jessica Anne; Gaskins, Jessica Jeanne, Geo-mapping system security events.
  145. Pearcy, Derek Patton; Heinrich, Jessica Anne; Gaskins, Jessica Jeanne, Geo-mapping system security events.
  146. Li, Xiaoning; Lu, Lixin; Sahita, Ravi, Hardware assisted branch transfer self-check mechanism.
  147. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven, Hardware management interface.
  148. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Hardware-based device authentication.
  149. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Hardware-based device authentication.
  150. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Hardware-based device authentication.
  151. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Hardware-based device authentication.
  152. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Hardware-based device authentication.
  153. Woodward, Carl D.; Mankin, Jennifer Eligius; Bennett, Jeremy, Hardware-enforced code paths.
  154. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  155. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  156. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  157. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  158. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  159. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  160. Liu, Weimin; de la Iglesia, Erik; Deninger, William; Lowe, Rick; Broeker, Stephen, High speed packet capture.
  161. Nojiri, Daisuke, Hooking nonexported functions by the offset of the function.
  162. Narasimhan, Srinivasan, Host entry synchronization.
  163. Narasimhan, Srinivasan; Hejmadi, Parthiv; Porwal, Vinod Kumar A., Host information collection.
  164. Narasimhan, Srinivasan; Hejmadi, Parthiv; Sreenath, Sheshadri, Host state monitoring.
  165. Muttik, Igor, Identification of call participants.
  166. Agrawal, Gopal; Mulka, Shivakrishna Anandam, Identifying a source device in a software-defined network.
  167. Ramchetty, Harinath Vishwanath; Kapoor, Aditya; Giri, Babu Nath, Identifying malicious threads.
  168. Nakawatase, Ryan; Ritter, Stephen; Schrecker, Sven, Identifying relationships between security metrics.
  169. Olinsky, Craig Philip, Implicit crowdsourcing for untracked correction or verification of categorization information.
  170. Dixon, Christopher John; Pinckney, Thomas, Indicating Website reputations during Website manipulation of user information.
  171. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations based on website handling of personal information.
  172. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during user interactions.
  173. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  174. Rubakha, Dmitri; Brinkley, Matthew D., Input verification.
  175. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  176. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  177. Pearcy, Derek Patton; Heinrich, Jessica Anne; Gaskins, Jessica Jeanne; Phillips, Craig Anthony, Integrating security policy and event management.
  178. Pearcy, Derek Patton; Heinrich, Jessica Anne; Gaskins, Jessica Jeanne; Phillips, Craig Anthony, Integrating security policy and event management.
  179. Mulka, Shivakrishna Anandam; Nair, Jayakrishnan, Intelligent devices in a software-defined network.
  180. Fredericksen, Robin Eric, Isolated security monitoring system.
  181. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system and method.
  182. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system method.
  183. Gryaznov, Dmitry, Known files database for malware elimination.
  184. Mahadik, Vinay; Madhusudan, Bharath, Local reputation to adjust sensitivity of behavioral detection system.
  185. Muttik, Igor Garrievich; Teblyashkin, Ivan Alexandrovich, Malware detection using external call characteristics.
  186. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections and messages at a server by associating different actions for both different senders and different recipients.
  187. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Srinivasan, Krishna; Schlampp, Peter; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections, messages, and directory harvest attacks at a server.
  188. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  189. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  190. Yamazaki, Katsuyuki; Fujikawa, Hiromitsu; Nakashima, Akihiro; Honma, Teruaki; Yoshida, Kenichi, Mass mail detection system and mail server.
  191. Singleton, Richard B., Master security policy server.
  192. Singleton, Richard B., Master security policy server.
  193. Singleton, Richard B., Master security policy server.
  194. Rassool,Reza; Worzel,William P.; Baker,Brian, Media tracking system and method.
  195. Das, Sudeep; Hanson, II, Don R., Merging multiple system trees over a data exchange layer.
  196. Shuster, Gary Stephen, Message filtering method.
  197. Shuster, Gary Stephen, Message filtering method.
  198. Shuster, Gary Stephen, Message filtering method.
  199. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  200. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  201. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  202. Srivastava, Neeta; Zheng, Yi; Bennett, Jeremy, Message sender authenticity validation.
  203. Prakash, Vipul V., Method and an apparatus to screen electronic communications.
  204. Sadowsky, Richard, Method and apparatus for automatically uninstalling software on a network.
  205. Gilchrist, Rod; Fogel, Richard; Osborne, Robert; Alsop, John, Method and apparatus for controlling unsolicited messaging.
  206. Gilchrist, Rod; Fogel, Richard; Osborne, Robert; Alsop, John, Method and apparatus for controlling unsolicited messaging.
  207. Gilchrist, Rod; Fogel, Richard; Alsop, John, Method and apparatus for controlling unsolicited messaging in real time messaging networks.
  208. Gilchrist, Rod; Fogel, Richard; Alsop, John, Method and apparatus for controlling unsolicited messaging in real time messaging networks.
  209. Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Method and apparatus for creating a unique audio signature.
  210. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  211. Jeong, Ho Wook; Kang, Jae Ho; Kim, Hyung Deok, Method and apparatus for detecting spam user created content.
  212. Wold, Erling H., Method and apparatus for identifying an unknown work.
  213. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  214. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  215. Ikezoye,Vance E.; Schrempp,James B., Method and apparatus for identifying media content presented on a media playing device.
  216. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Kvitek, Louis, Method and apparatus for identifying new media content.
  217. Olivier, Michael; Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Taylor, Craig, Method and apparatus for managing computer virus outbreaks.
  218. Aoki,Norihiro Edwin, Method and apparatus for managing subscription-type messages.
  219. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  220. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  221. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  222. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  223. Krishnamurthy, Balachander; Spatscheck, Oliver, Method and apparatus for providing an application-level utility metric.
  224. Harrison, Robert Brian; Jasinskyj, Lonhyn; Clegg, Paul J.; Cottrell, Ben, Method and apparatus for providing temporary access to a network device.
  225. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  226. Schrempp, James B.; Edel, Alan; Ikezoy, Vanc, Method and apparatus to identify a work received by a processing system.
  227. Sargent, John; Barton, Chris; Engelken, Dallas; Roberts, Guy, Method and computer program product utilizing multiple UDP data packets to transfer a quantity of data otherwise in excess of a single UDP packet.
  228. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  229. Kirsch,Steven T., Method and system for categorizing and processing e-mails.
  230. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  231. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  232. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  233. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  234. Werner, Eran; Zucker, Elad; Matzkel, Ben, Method and system for generic real time management of devices on computers connected to a network.
  235. Shinde, Rajesh; Awasthi, Harish Mohan, Method and system for handling unwanted email messages.
  236. Schrempp, James B.; Wold, Erling H., Method and system for modifying communication flows at a port level.
  237. Zucker, Elad; Werner, Eran, Method and system for policy based monitoring and blocking of printing activities on local and network printers.
  238. Murray,David J.; Kirsch,Steven T., Method for creating a whitelist for processing e-mails.
  239. Cox, Ingemar J., Method for linking an electronic media work to perform an action.
  240. Cunningham, Brian, Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification.
  241. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Method for removing unsolicited e-mail messages.
  242. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  243. Cox, Ingemar J., Method for tagging an electronic media work to perform an action.
  244. Cox, Ingemar J., Method for taking action based on a request related to an electronic media work.
  245. Cox, Ingemar J., Method for taking action with respect to an electronic media work.
  246. Cox, Ingemar J., Method for using extracted features from an electronic work.
  247. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  248. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  249. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  250. Banister,Scott; Peterson,Patrick R.; Moore,James, Method of electronic message delivery with penalties for unsolicited messages.
  251. Branigan,James Peter; Lavin,David Kenneth; Yokeley,Eric Stephen, Method, system and computer program product for dynamically optimized handling of messages received from a message transmission backbone by a data processing system node.
  252. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer.
  253. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key.
  254. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  255. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  256. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  257. Hallam-Baker, Phillip Martin, Methods for control and management of electronic messaging based on sender information.
  258. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  259. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  260. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  261. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  262. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  263. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  264. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  265. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  266. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  267. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  268. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  269. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  270. Alme, Christoph; Hahn, Slawa; Thoene, Sebastian, Mitigation of malware.
  271. Crowe, Simon, Mitigation of stack corruption exploits.
  272. Nalluri, Srikanth; Kulkarni, Dattatraya; Sinha, Raja; Krishnapur, Venkatasubrahmanyam; Dhruw, Kaushal Kumar; Halder, Kamlesh, Mobile application management.
  273. Shahbazi, Majid, Mobile data security system and methods.
  274. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  275. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  276. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  277. Hockey, Alyn, Monitoring electronic mail message digests.
  278. Sahita, Ravi; Li, Xiaoning; Lu, Lixin; Deng, Lu; Shepsen, Alexander; Xu, Xiang; Huang, Liangjun; Liu, Hua; Huang, Kai, Monitoring executed script for zero-day attack of malware.
  279. Slater, Charles S.; Clegg, Paul J.; Evans, Brennan H.; Schlampp, Peter, Monitoring the flow of messages received at a server.
  280. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  281. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  282. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  283. Waldin,Ray Soon; Nachenberg,Carey, Multi-tiered incremental software updating.
  284. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, Network access control system and method using adaptive proxies.
  285. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  286. Hugard, IV, James Michael; Keir, Robin; Rebelo, Joshua Cajetan; Arkin, Ofir; Schrecker, Sven, Network address repository management.
  287. Whitmore, Brent S; La Cholter, William J.; Lawler, Geoff, Network analysis system and method utilizing collected metadata.
  288. Gilde, Robert G.; Boscolo, Christopher Daniel, Network appliance for customizable quarantining of a node on a network.
  289. Webb, Evan M.; Boscolo, Christopher D.; Gilde, Robert G., Network appliance for vulnerability assessment auditing over multiple networks.
  290. Webb, Evan M.; Boscolo, Christopher D.; Gilde, Robert G., Network appliance for vulnerability assessment auditing over multiple networks.
  291. Webb, Evan M.; Boscolo, Christopher Daniel; Gilde, Robert G., Network appliance for vulnerability assessment auditing over multiple networks.
  292. Shinde, Rajesh; Marri, Srikanth Chowdary, Network browser system, method, and computer program product for conditionally loading a portion of data from a network based on a data transfer rate.
  293. Gartside, Paul Nicholas; Heron, George L.; Bolin, Christopher S., Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites.
  294. Johri, Amritanshu; Singh, Balbir; Khurana, Jaskaran; Pandey, Ratnesh, Non-invasive whitelisting.
  295. Kumar, Rishi; Chatterji, Varun; Jayaraghavendran, Vedvyas; Biswas, Indradeep; Mahajan, Kapil, Non-obtrusive security system for devices.
  296. Narasimhan, Srinivasan, Nonce generation.
  297. Mukherjee, Joydeb; Subramanian, Saravana Kumar; Vardhan, Raj; Narayana, Rangaswamy; Subramanian, Shankar; Kulkarni, Dattatraya; Hasan, Javed, Notification of human safety reputation of a place based on historical events, profile data, and dynamic factors.
  298. Hugard, IV, James Michael; Schrecker, Sven, Opportunistic system scanning.
  299. Smith, Ned M.; Gutierrez, Esteban; Woodruff, Andrew; Kapoor, Aditya, Outbreak pathology inference.
  300. Nedbal, Manuel; Kajekar, Sachin, Pattern recognition using transition table templates.
  301. Nayshtur, Alex; Smith, Ned; Sharaga, Avishay; Pogorelik, Oleg; Bhargav-Spantzel, Abhilasha; Raziel, Michael; Priev, Avi; Shaliv, Adi; Muttik, Igor, Platform identity architecture with a temporary pseudonymous identity.
  302. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Play list generation method and apparatus.
  303. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Playlist generation method and apparatus.
  304. Das, Sudeep; Sharma, Pramod; Vashisth, Sumant, Premises aware security.
  305. Simone, Jr., Kenneth D.; Whitehurst, Paul A.; Boudreaux, Mark Joseph, Prevalence-based reputations.
  306. Kishore, Nandi Dharma; Ramabhatta, Anil Bhadrarajapura; Ramchetty, Harinath Vishwanath, Preventing and responding to disabling of malware protection software.
  307. Nakawatase, Ryan; Schrecker, Sven; Ritter, Stephen, Prioritizing asset remediations.
  308. Edukulla, Santhosh Kumar; Rajanna, Suresh, Prioritizing network assets.
  309. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  310. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  311. Stecher, Martin, Privacy broker.
  312. Narasimhan, Srinivasan, Probe election in failover configuration.
  313. Narasimhan, Srinivasan, Probe election in failover configuration.
  314. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of textual electronic communication distributed in bulk.
  315. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic communication.
  316. Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic mail.
  317. Pikhur, Volodymyr; Mathur, Rachit, Profiling event based exploit detection.
  318. Cooper, Geoffrey Howard; Nedbal, Manuel; Nadkarni, Hemang Satish, Providing a virtual security appliance architecture to a virtual cloud infrastructure.
  319. Dixon, Christopher John; Pinckney, Thomas, Providing alternative web content based on website reputation assessment.
  320. Morrey, Richard; Roberts, Guy; Venugopalan, Ramnath; Wilson, Nick, Providing prevalence information using query data.
  321. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  322. Chahal, Sudip; Tatourian, Igor, Real-time mobile security posture.
  323. Chahal, Sudip; Tatourian, Igor, Real-time mobile security posture.
  324. Krishnaprasad, Vijayasree, Real-time policy distribution.
  325. Teddy, John D.; Bean, James Douglas; Dalcher, Gregory William; Hetzler, Jeff, Remote malware remediation.
  326. Teddy, John; Bean, James Douglas; Dalcher, Gregory William; Hetzler, Jeff, Remote malware remediation.
  327. Teddy, John; Bean, James Douglas; Dalcher, Gregory William; Hetzler, Jeff, Remote malware remediation.
  328. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  329. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  330. Singh, Prabhat Kumar; Jyoti, Nitin; Srinivasa, Gangadharasa, Rollback feature.
  331. Singh, Prabhat Kumar; Jyoti, Nitin; Srinivasa, Gangadharasa, Rollback feature.
  332. Singh, Prabhat Kumar; Jyoti, Nitin; Srinivasa, Gangadharasa, Rollback feature.
  333. Singh, Prabhat Kumar; Jyoti, Nitin; Srinivasa, Gangadharasa, Rollback feature.
  334. Singh, Prabhat Kumar; Jyoti, Nitin; Srinivasa, Gangadharasa, Rollback feature.
  335. Pham, Khai N.; Kapoor, Aditya; Ramachetty, Harinath V.; Mathur, Rachit, Rootkit scanning system, method, and computer program product.
  336. de la Iglesia, Erik; Deninger, William, Rule parser.
  337. de la Iglesia, Erik; Deninger, William J., Rule parser.
  338. Lowe, Joseph C.; Edwards, Jonathan L.; Woodruff, Andrew A.; Spurlock, Joel R., Rule set-based system and method for advanced virus protection.
  339. Ujigawa, Taichi; Hayashi, Katzumi; Kimura, Masaya; Oda, Yasutaka, SYSTEM AND METHOD FOR DISTRIBUTING AND COLLECTING INFORMATION BETWEEN A SERVER AND A PLURALITY OF CLIENTS BY MERGING A COMMUNICATION BLOCK FROM A FINAL CLIENT OF EACH CIRCULATION DESTINATION IN EACH .
  340. Morrey, Richard, Scanner-driven email message decomposition.
  341. Grupe, Robert, Scanning computer files for specified content.
  342. Grupe, Robert, Scanning computer files for specified content.
  343. Perlmutter, Amnon; Mor, Aviad; Gonda, Oded; Raz, Ofer; LeGrow, Matt, Scripting language processing engine in data leak prevention application.
  344. Kulkarni, Dattatraya; Nalluri, Srikanth; Krishnapur, Venkatasubrahmanyam; Dhruw, Kaushal; Doss, Aravind; Sinha, Raja; Nayak, Susmita; Jain, Yogesh, Secure context sharing for priority calling and various personal safety mechanisms.
  345. Kabra, Atul; Hughes, Michael; Teddy, John, Secure disk access control.
  346. Nayshtut, Alex; Pogorelik, Oleg; Ben-Shalom, Omer; Muttik, Igor, Secure service matching.
  347. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  348. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  349. Liebmann, Nicholas; McKerrell, Graeme; Neal, Peter, Securing email conversations.
  350. Liebmann, Nicholas; McKerrell, Graeme; Neal, Peter, Securing email conversations.
  351. Price, Michael; Bettini, Anthony, Security assessment of virtual machine environments.
  352. Condry, Michael; Schrecker, Sven, Security broker.
  353. Coburn, Ward; Singh, Harvir, Security content over a management band.
  354. Nadkarni, Hemang, Security orchestration framework.
  355. Arkin, Ofir, Security-connected framework.
  356. Smith, Ned M.; Hunt, Simon; Sambandam, Venkata Ramanan, Sentinel appliance in an internet of things realm.
  357. Teddy, John D.; Bean, James Douglas; Dalcher, Gregory William; Hetzler, Jeff; Woodruff, Andrew Arlin, Server-assisted anti-malware client.
  358. Teddy, John; Bean, James Douglas; Dalcher, Gregory William; Hetzler, Jeff, Server-assisted anti-malware client.
  359. Pham, Khai N., Server-based system, method, and computer program product for scanning data on a client using only a subset of the data.
  360. Pham, Khai N., Server-based system, method, and computer program product for scanning data on a client using only a subset of the data.
  361. Smith, Christopher; Das, Sudeep, Service-oriented architecture.
  362. de la Iglesia, Erik; Ahuja, Ratinder Paul Singh; Deninger, William; King, Sam, Signature distribution in a document registration system.
  363. Schrecker, Sven, Simplified mobile communication device.
  364. Schrecker, Sven, Simplified mobile communication device.
  365. Walker, Jesse Randall; Herbert, Howard C.; Brannock, Kirk D.; Price, Stephen H.; Cooper, Geoffrey H.; deVries, David A.; Amols, David M.; Schrecker, Sven, Simplified sensor integrity.
  366. Alme, Christoph; Hahn, Slawa; Finke, Stefan, Simulation of an application.
  367. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  368. Sebes, E. John, Solidifying the executable software set of a computer.
  369. Qutub, S. Shehryar; Sharma, Alok, Spam filtering for mobile communication devices.
  370. Mahadik, Vinay; Madhusudan, Bharath; Buruganahalli, Shivakumar; Vissamsetty, Venu, Stealth network attack monitoring.
  371. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  372. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  373. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  374. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  375. Grobman, Steve; Samani, Raj; Arkin, Ofir; Schrecker, Sven, System and method for an endpoint hardware assisted network firewall in a security environment.
  376. Grobman, Steve; Samani, Raj; Arkin, Ofir; Schrecker, Sven, System and method for an endpoint hardware assisted network firewall in a security environment.
  377. Schrecker, Sven; Andrews, Michael, System and method for application security assessment.
  378. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  379. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  380. Schrecker, Sven; Robison, Brian, System and method for cloud based scanning for computer vulnerabilities in a network environment.
  381. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  382. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  383. Ahuja, Ratinder Paul Singh; Deninger, William; Lakhani, Faizel; Christner, Joel, System and method for concept building.
  384. Schiavone, Vincent J.; Brussin, David Ian; DiPasquale, Tobias Phillip; D'Alessio, John Francis, System and method for controlling distribution of network communications.
  385. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  386. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  387. Schiavone, Vincent J.; Koenig, James H.; Brussin, David I., System and method for controlling distribution of network communications.
  388. Schiavone,Vincent J.; Koenig,James H.; Brussin,David I., System and method for controlling distribution of network communications.
  389. Laudermilch, Norm; Supernor, William; Boroday, Roman; Goldschlag, David, System and method for controlling mobile device access to a network.
  390. Gupta, Bikram Kumar; Swamy, Sudarshan; Vissamsetti, Srikant, System and method for correlating network information with subscriber information in a mobile network environment.
  391. Gupta, Bikram Kumar; Ammoor Anbalagan, Elanthiraiyan; Subramanian, Sakthikumar; Gupta, Manish, System and method for correlating security events with subscriber information in a mobile network environment.
  392. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  393. Ahuja, Ratinder Paul Singh; Lakhani, Faizel, System and method for data mining and security policy management.
  394. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  395. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  396. Liu, Weimin, System and method for data mining and security policy management.
  397. Liu, Weimin, System and method for data mining and security policy management.
  398. Ma, Denys Lok Hang; Mahadik, Vinay; Pathak, Swapnil, System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file.
  399. Balupari, Ravindra; Mahadik, Vinay; Madhusudan, Bharath; Shah, Chintan H., System and method for detecting a malicious command and control channel.
  400. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  401. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  402. Muttik, Igor G.; Bartram, Anthony Vaughan, System and method for detecting malware by transforming objects and analyzing different views of objects.
  403. O'Connor, Bryan D., System and method for detecting unwanted content.
  404. O'Connor, Bryan D., System and method for detecting unwanted content.
  405. O'Connor, Bryan D., System and method for detecting unwanted content.
  406. Cooper, Geoffrey Howard; Diehl, David Frederick; Green, Michael W.; Ma, Robert, System and method for determining and using local reputations of users and hosts to protect information in a network environment.
  407. Cooper, Geoffrey Howard; Diehl, David Frederick; Green, Michael W.; Ma, Robert, System and method for determining and using local reputations of users and hosts to protect information in a network environment.
  408. Shahbazi, Majid, System and method for enforcing a security policy on mobile devices using dynamically generated security profiles.
  409. Brydon, Antony; Patterson, Jeff, System and method for enforcing privacy in social networks.
  410. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  411. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  412. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  413. Nedbal, Manuel; Ahluwalia, Manoj; Slate, Charles, System and method for flexible network access control policies in a network environment.
  414. Nedbal, Manuel; Ahluwalia, Manoj; Slate, Charles, System and method for flexible network access control policies in a network environment.
  415. Hugard, IV, James M.; Leroux, Alexander Lawrence; Mallabarapu, Charles; Muniz, Jorge Armando; Russell, Braden C.; Wu, Zengjue, System and method for grouping computer vulnerabilities.
  416. Hugard, IV, James M.; Leroux, Alexander Lawrence; Mallabarapu, Charles; Muniz, Jorge Armando; Russell, Braden C.; Wu, Zengjue, System and method for grouping computer vulnerabilities.
  417. Freedman, Jerome N., System and method for heuristic determination of network protocols.
  418. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  419. Dalcher, Gregory W., System and method for indirect interface monitoring and plumb-lining.
  420. Dalcher, Gregory W., System and method for indirect interface monitoring and plumb-lining.
  421. Buruganahalli, Shivakumar; Vissamsetty, Venu, System and method for innovative management of transport layer security session tickets in a network environment.
  422. Buruganahalli, Shivakumar; Vissamsetty, Venu, System and method for innovative management of transport layer security session tickets in a network environment.
  423. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  424. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  425. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  426. Ahuja, Ratinder Paul Singh; Deninger, William, System and method for intelligent term grouping.
  427. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  428. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  429. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  430. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  431. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  432. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  433. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  434. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  435. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  436. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  437. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  438. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  439. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  440. Fair,Allen M.; Thameen,Omar L., System and method for mailing list mediation.
  441. Alperovitch, Dmitri; Krasser, Sven, System and method for malware and network reputation correlation.
  442. Alperovitch, Dmitri; Krasser, Sven, System and method for malware and network reputation correlation.
  443. Ahuja, Ratinder Paul Singh; Christener, Joel; Gaitonde, Jitendra; Ganti, Sirisha; Haridasa, Sridevi; Hegde, Damodar K.; Jayaram, Chaitra; Kasim, Rahila; Lakhani, Faizel; Patil, Swati; Sandhu, Harsimran S., System and method for managing data and policies.
  444. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  445. Gaddala, Satish Kumar, System and method for monitoring social engineering in a computer network environment.
  446. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  447. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  448. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  449. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  450. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  451. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  452. McClure, Stuart; Price, Michael Morgan, System and method for network-based asset operational dependence scoring.
  453. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  454. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  455. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  456. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  457. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  458. Bhattacharjee, Rajbir; Singh, Balbir, System and method for profile based filtering of outgoing information in a mobile environment.
  459. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  460. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  461. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  462. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  463. Alperovitch, Dmitri; Bu, Zheng; Diehl, David Frederick; Krasser, Sven, System and method for protocol fingerprinting and reputation correlation.
  464. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  465. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  466. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  467. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  468. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  469. Jayaraman, Shankar; Singh, Vikas; Sreedharan, Jayesh K., System and method for risk rating and detecting redirection activities.
  470. Binder, Yehuda, System and method for routing-based internet security.
  471. Binder, Yehuda, System and method for routing-based internet security.
  472. Binder, Yehuda, System and method for routing-based internet security.
  473. Russell, Braden; Mallabarapu, Charles; Hugard, IV, James M., System and method for scanning for computer vulnerabilities in a network environment.
  474. Lichtenstadt, Aviad; Lichtman, Guy; Markovich, Slavik, System and method for securing database activity.
  475. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  476. Cox, Ingemar J., System and method for taking action with respect to an electronic media work.
  477. Cox, Ingemar J., System and method for taking action with respect to an electronic media work and logging event information related thereto.
  478. Jayanthi, Sridhar; Khare, Praneet; Srinivasa, Gangadharasa, System and method for transitioning to a whitelist mode during a malware attack in a network environment.
  479. Brydon, Antony; Patterson, Jeff, System and method for using social networks to facilitate business processes.
  480. Dalcher, Gregory W.; Edwards, Jonathan L., System and method for virtual partition monitoring.
  481. Dalcher, Gregory W.; Edwards, Jonathan L., System and method for virtual partition monitoring.
  482. Edwards, Jonathan L.; Dalcher, Gregory W.; Teddy, John D., System and method for virtual partition monitoring.
  483. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  484. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  485. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  486. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  487. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  488. Spurlock, Joel R.; Teddy, John D., System and method to combine multiple reputations.
  489. Spurlock, Joel R.; Teddy, John D., System and method to combine multiple reputations.
  490. Szor, Peter; Mathur, Rachit, System and method to mitigate malicious calls.
  491. Szor, Peter; Mathur, Rachit, System and method to mitigate malicious calls.
  492. Alme, Christoph; Hahn, Slawa; Finke, Stefan, System and method to mitigate malware.
  493. Alme, Christoph; Hahn, Slawa; Finke, Stefan, System and method to mitigate malware.
  494. Krause, Robert G.; Orbke, Wayne H., System and methods for electronic message content identification.
  495. Hugard, IV, James Michael; Keir, Robin; Rebelo, Joshua Cajetan; Arkin, Ofir; Schrecker, Sven, System asset repository management.
  496. Schrempp, James B., System for distributing decoy content in a peer to peer network.
  497. Wold, Erling, System for identifying content of digital data.
  498. Wold, Erling, System for identifying content of digital data.
  499. Wold, Erling, System for identifying content of digital data.
  500. Wold, Erling, System for identifying content of digital data.
  501. Wold, Erling, System for identifying content of digital data.
  502. Wold, Erling, System for identifying content of digital data.
  503. Cox, Ingemar J., System for taking action based on a request related to an electronic media work.
  504. Cox, Ingemar J., System for taking action with respect to a media work.
  505. Cox, Ingemar J., System for taking action with respect to a media work.
  506. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  507. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  508. Cox, Ingemar J., System for using extracted features from an electronic work.
  509. Motwani, Rajiv; Painkras, Gerald S., System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes.
  510. Spurlock, Joel Robert; Schmugar, Craig D.; Howard, Fraser Peter, System, method and computer program product for context-driven behavioral heuristics.
  511. Davis, Michael Anthony; Lowe, Joe C.; Zeigler, Arthur S., System, method and computer program product for controlling network communications based on policy compliance.
  512. Steiner, Thomas C. H.; Schlemmer, Andreas; Fellner, Paul G., System, method and computer program product for detecting patterns among information from a distributed honey pot system.
  513. McGuigan, Mark, System, method and computer program product for detecting unwanted data using a rendered format.
  514. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  515. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  516. Spurlock, Joel Robert; Kapoor, Aditya, System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed.
  517. Bartram, Anthony V., System, method and computer program product for identifying unwanted code associated with network communications.
  518. Sallam, Ahmed Said, System, method and computer program product for inserting an emulation layer in association with a COM server DLL.
  519. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna Ganapathi, System, method and computer program product for maintaining a confidentiality of data on a network.
  520. Dalcher, Gregory William, System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface.
  521. Heron, George L.; Bolin, Christopher S., System, method and computer program product for obtaining a reputation associated with a file.
  522. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  523. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  524. Makinson, Graham A.; Hackett, Paul C., System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer.
  525. Makinson, Graham A.; Hackett, Paul C., System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer.
  526. Kuo, Chengi J.; Barbieri, Federico, System, method and computer program product for removing null values during scanning.
  527. Wills, Ronald Holland; Ross, Charles Allen; Heron, George L., System, method and computer program product for scanning and indexing data for different purposes.
  528. Hearnden, Stephen Owen; Lucas, Martin J.; Hinton, Christopher M., System, method and computer program product for scanning portions of data.
  529. Hearnden, Stephen Owen; Lucas, Martin J.; Hinton, Christopher M.; Wilson, Nicolas K., System, method and computer program product for scanning portions of data.
  530. Hearnden, Stephen Owen; Lucas, Martin J.; Hinton, Christopher M.; Wilson, Nicolas K., System, method and computer program product for scanning portions of data.
  531. Telafici, Joseph V., System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing.
  532. Walker, David; Sapp, Kevin; Goldschlag, David, System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  533. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, System, method and program to limit rate of transferring messages from suspected spammers.
  534. Paul, Manabendra; Sudharma, Praveen Ravichandran, System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy.
  535. Paul, Manabendra; Sudharma, Praveen Ravichandran, System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy.
  536. Beveridge, David Neill; Cochin, Cedric, System, method, and computer program product for applying a regular expression to content based on required strings of the regular expression.
  537. Gartside, Paul Nicholas; Bishop, Michael G., System, method, and computer program product for applying a rule to associated events.
  538. Singh, Manish; Marri, Srikanth Chowdary; Shinde, Rajesh, System, method, and computer program product for communicating automatic response messages based on a policy.
  539. Camp, Tracy E., System, method, and computer program product for comparing an object with object enumeration results to identify an anomaly that at least potentially indicates unwanted activity.
  540. Cambridge, Rodney Derrick; Dyton, Jonathan, System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device.
  541. Kolingivadi, Deepakeswaran; Hariharasubramanian, Muthu Nivas, System, method, and computer program product for conditionally performing a scan on data based on an associated data structure.
  542. Das, Sudeep; Paranjape, Sameer Shashikant; Sharma, Pramod, System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof.
  543. Das, Sudeep; Chakravarthy, Anil Z.; Paranjape, Sameer Shashikant, System, method, and computer program product for determining a hop count between network devices utilizing a binary search.
  544. Sallam, Ahmed Said, System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity.
  545. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  546. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  547. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  548. Bartram, Anthony V.; Dunbar, Adrian M. M. T.; Hearnden, Steve O., System, method, and computer program product for determining whether code is unwanted based on the decompilation thereof.
  549. Narayanan, Udhayakumar Lakshmi, System, method, and computer program product for determining whether text within an image includes unwanted data, utilizing a matrix.
  550. Thomas, Vinoo; Jyoti, Nitin, System, method, and computer program product for directing predetermined network traffic to a honeypot.
  551. Pearcy, Derek Patton; Caldera, Jose, System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device.
  552. Dalcher, Gregory W., System, method, and computer program product for dynamically adjusting a level of security applied to a system.
  553. Muttik, Igor; Hearnden, Steve O.; Spurlock, Joel Robert, System, method, and computer program product for enabling communication between security systems.
  554. Dharmastala, Aravind, System, method, and computer program product for identifying objects as at least potentially unwanted based on strings of symbols.
  555. Thomas, Vinoo; Jyoti, Nitin, System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking.
  556. Dalcher, Gregory William, System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code.
  557. Dalcher, Gregory William, System, method, and computer program product for invoking an application program interface within an interception of another application program interface.
  558. Balasubramanian, Harish, System, method, and computer program product for making a scan decision during communication of data over a network.
  559. Melnyk, Mykhaylo; Mathews, Justin A., System, method, and computer program product for managing at least one aspect of a connection based on application behavior.
  560. Dalcher, Gregory William, System, method, and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface.
  561. Sallam, Ahmed Said, System, method, and computer program product for populating a list of known wanted data.
  562. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface.
  563. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  564. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  565. Kumar, Lokesh; Ramachetty, Harinath Vishwanath; Kishore, Nandi Dharma, System, method, and computer program product for preventing a modification to a domain name system setting.
  566. Kumar, Lokesh; Ramachetty, Harinath Vishwanath; Kishore, Nandi Dharma, System, method, and computer program product for preventing a modification to a domain name system setting.
  567. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna, System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session.
  568. Bishop, Michael G., System, method, and computer program product for preventing data leakage utilizing a map of data.
  569. Basavapatna, Prasanna Ganapathi; Chebiyyam, Gopi Krishna, System, method, and computer program product for preventing image-related data loss.
  570. Rathor, Hirendra; Hariharasubramanian, Muthu Nivas, System, method, and computer program product for preventing scanning of a copy of a message.
  571. Schlemmer, Andreas; Steiner, Thomas C. H.; Blaimschein, Peter, System, method, and computer program product for processing a prefix tree file utilizing a selected agent.
  572. Yadava, Amit Kumar; Mathur, Asheesh Dayal, System, method, and computer program product for providing a rating of an electronic message.
  573. Mariswamy, Hariprasad; Barton, Christopher; Kelly, Nick P.; Roberts, Guy William Welch; Sargent, John; Umashankar, Karthik; Walker, Paul D., System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages.
  574. Kumar, Lokesh; Ramachetty, Harinath V., System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device.
  575. Kumar, Lokesh; Ramachetty, Harinath V., System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device.
  576. Gaddala, Satish Kumar, System, method, and computer program product for securing data on a server based on a heuristic analysis.
  577. Dey, Sankha S., System, method, and computer program product for selecting a wireless network based on security information.
  578. Lowe,Joseph C.; Edwards,Jonathan L.; Kumar,Srin N., System, method, and computer program product for tailoring security responses for local and remote file open requests.
  579. Sallam, Ahmed Said, System, method, and computer program product for terminating a hidden kernel process.
  580. Muttik, Igor G.; Roberts, Guy; Barton, Chris; Hinchliffe, Alex, System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check.
  581. Fredericksen, Robin Eric; Keir, Robin Malcolm, System, method, and computer program product for updating an algorithm.
  582. Sapp, Kevin; Goldschlag, David; Walker, David, System, method, and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  583. Sapp, Kevin; Goldschlag, David; Walker, David, System, method, and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  584. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  585. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  586. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  587. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  588. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  589. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  590. Bessis, David, Systems and methods for data mining automation.
  591. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  592. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  593. Krause, Robert G.; Orbke, Wayne H., Systems and methods for electronic message content identification.
  594. Chamberlain, Charles R., Systems and methods for electronic postmarking of data including location data.
  595. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  596. Lu, Lixin, Systems and methods of processing data associated with detection and/or handling of malware.
  597. Lu, Lixin, Systems and methods of processing data associated with detection and/or handling of malware.
  598. Kulkarni, Dattatraya; Nalluri, Srikanth; Halder, Kamlesh; Krishnapur, Venkatasubrahmanyam; Shankar, Shailaja; Dhruw, Kaushal Kumar; Gadde, Kranthikumar, Task-context architecture for efficient data sharing.
  599. Durham, David; Sahita, Ravi; Grewal, Karanvir; Smith, Ned; Sood, Kapil, Techniques for authenticated posture reporting and associated enforcement of network access.
  600. Durham, David; Sahita, Ravi; Grewal, Karanvir; Smith, Ned; Sood, Kapil, Techniques for authenticated posture reporting and associated enforcement of network access.
  601. Brahms, Robert; Quinlan, Daniel; Sprosts, Craig, Techniques for determining the reputation of a message sender.
  602. Zhang, Zheng; Teddy, John D.; Schmugar, Craig D.; Aktas, Erdem; Merrill, Clint R.; Mehta, Kunal, Temporary process deprivileging.
  603. Nedbal, Manuel; Viswambharan, Girish; Krishnamurthy, Vishwas, Token processing.
  604. Shah, Samir; Smith, Ned M.; Martin, Jason; Sheller, Micah J.; Chakrabarti, Somnath; Xing, Bin, Trusted binary translation.
  605. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  606. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  607. Von Bokern, Vincent Edward; Goel, Purushottam; Schrecker, Sven; Smith, Ned McArthur, Trusted container.
  608. Nakawatase, Ryan Tadashi; Hugard, IV, James Michael; Schrecker, Sven, Unified scan engine.
  609. Nakawatase, Ryan Tadashi; Hugard, IV, James Michael; Schrecker, Sven, Unified scan management.
  610. Schrecker, Sven; Nakawatase, Ryan, Uniquely identifying attacked assets.
  611. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  612. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message diverting communications processor.
  613. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message intercepting communications processor.
  614. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message rejecting communications processor.
  615. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Unsolicited message rejecting communications processor.
  616. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  617. Basavapatna, Prasanna Ganapathi; Moyle, Michael Mason; Schrecker, Sven, User behavioral risk assessment.
  618. Basavapatna, Prasanna Ganapathi; Moyle, Michael Mason; Schrecker, Sven, User behavioral risk assessment.
  619. Moyle, Michael Mason; Basavapatna, Prasanna Ganapathi; Schrecker, Sven, User behavioral risk assessment.
  620. Moyle, Michael Mason; Basavapatna, Prasanna Ganapathi; Schrecker, Sven, User behavioral risk assessment.
  621. Condry, Michael; Schrecker, Sven, User device security profile.
  622. Woodward, Carl D.; Sambandam, Venkata Ramanan; Rubakha, Dmitri, User mode heap swapping.
  623. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  624. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  625. Spurlock, Joel R.; Zhang, Zheng; Kapoor, Aditya; Edwards, Jonathan L.; Pham, Khai N., Virtualized trusted storage.
  626. Babb, Grant; Briercliffe, Matthew; Diercks, Paul; Glamm, Robert P.; Koster, Kirby, Visualization and analysis of complex security information.
  627. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  628. Faieta, Alessandro; Beach, Jameson; Bell, Douglas, Windows registry modification verification.
  629. Schrecker, Sven, Wireless storage device.
  630. Schrecker, Sven, Wireless token authentication.
  631. Schrecker, Sven, Wireless token device.
  632. Schrecker, Sven, Wireless token device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로