Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 726/25
Name: Information security > Monitoring or scanning of software or data including attack prevention > Vulnerability assessment
Description: Subject matter wherein monitoring or scanning of software or data includes methods or systems to evaluate the defensive capabilities of a system, process, apparatus, or entity against attacks.










Patents under this class:

Patent Number Title Of Patent Date Issued
8713686 System and method for reducing antivirus false positives Apr. 29, 2014
8713685 PC secure video path Apr. 29, 2014
8713684 Quantifying the risks of applications for mobile devices Apr. 29, 2014
8713683 Security arrangements for extended USB protocol stack of a USB host system Apr. 29, 2014
8713682 Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Apr. 29, 2014
8713679 Detection of code-based malware Apr. 29, 2014
8713677 Anti-phishing system and method Apr. 29, 2014
8713675 Method and apparatus for the prevention of a service degradation attack Apr. 29, 2014
8713674 Systems and methods for excluding undesirable network transactions Apr. 29, 2014
8713673 Qualification screening system and screening method thereof, qualification screening device and device under qualification screening Apr. 29, 2014
8713651 Advocate for facilitating verification for the online presence of an entity Apr. 29, 2014
8713312 Method and system for detecting data modification within computing device Apr. 29, 2014
8707441 Techniques for identifying optimized malicious search engine results Apr. 22, 2014
8707440 System and method for passively identifying encrypted and interactive network sessions Apr. 22, 2014
8707439 Selecting security offerings Apr. 22, 2014
8707438 System and method for providing storage for electronic records Apr. 22, 2014
8707436 Defining code by its functionality Apr. 22, 2014
8707385 Automated compliance policy enforcement in software systems Apr. 22, 2014
8707384 Change recommendations for compliance policy enforcement Apr. 22, 2014
8707180 System for cyber investigation and data management Apr. 22, 2014
8706772 Strict tenant isolation in multi-tenant enabled systems Apr. 22, 2014
8695099 Login initiated scanning of computing devices Apr. 8, 2014
8695098 Detecting security vulnerabilities in web applications Apr. 8, 2014
8695097 System and method for detection and prevention of computer fraud Apr. 8, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689335 Mapping between users and machines in an enterprise security assessment sharing system Apr. 1, 2014
8689334 Security protection for a customer programmable platform Apr. 1, 2014
8689332 Information processing apparatus cooperating with virus management function device, and anti-virus method Apr. 1, 2014
8689327 Method for characterization of a computer program part Apr. 1, 2014
8689203 Software update techniques based on ascertained identities Apr. 1, 2014
8688995 Method and apparatus for detection of a fault attack Apr. 1, 2014
8683599 Static analysis for verification of software program access to secure resources for computer systems Mar. 25, 2014
8683598 Mechanism to evaluate the security posture of a computer system Mar. 25, 2014
8683597 Risk-based authentication duration Mar. 25, 2014
8683596 Detection of DOM-based cross-site scripting vulnerabilities Mar. 25, 2014
8683593 Server-assisted analysis of data for a mobile device Mar. 25, 2014
8683589 Providing protection against unauthorized network access Mar. 25, 2014
8683584 Risk assessment Mar. 25, 2014
8683544 System and method for providing access to a network using flexible session rights Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677497 Mobile risk assessment Mar. 18, 2014
8677496 Method and apparatus for automatic risk assessment of a firewall configuration Mar. 18, 2014
8677480 Anomaly information distribution with threshold Mar. 18, 2014
8677479 Detection of adversaries through collection and correlation of assessments Mar. 18, 2014
8677465 Preventing inadvertent lock-out during password entry dialog Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8671451 Method and apparatus for preventing misuse of a group key in a wireless network Mar. 11, 2014
8671449 Systems and methods for identifying potential malware Mar. 11, 2014
8671438 Method and system for managing security of mobile terminal Mar. 11, 2014
8667596 Systems and methods for network curation Mar. 4, 2014











 
 
  Recently Added Patents
Integrated circuits with magnetic core inductors and methods of fabrications thereof
Local access to data while roaming with a mobile telephony device
Multi-protocol data transfers
Continuously variable transmission and control method thereof
Flexible quantization
Authentication method
Image processing unit, image processing method and program
  Randomly Featured Patents
System and method of control tone amplitude modulation in a linked compression-expansion (Lincomplex) system
Dietetic cake mix
Extendable/retractable foot/leg rest for a wheelchair
Switching valve
Methods and apparatus to respond to signaling protocol failures in traffic engineering tunnels
Methods and compositions for poly-.beta.-1-4-N-acetylglucosamine cell therapy system
Apparatus for auto docking PCI cards
Ultrasonic detecting method for bearing ring
Yarn heaters
Can body maker with magnetic ram bearing and redraw actuator