Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 726/25
Name: Information security > Monitoring or scanning of software or data including attack prevention > Vulnerability assessment
Description: Subject matter wherein monitoring or scanning of software or data includes methods or systems to evaluate the defensive capabilities of a system, process, apparatus, or entity against attacks.










Patents under this class:

Patent Number Title Of Patent Date Issued
8713686 System and method for reducing antivirus false positives Apr. 29, 2014
8713685 PC secure video path Apr. 29, 2014
8713684 Quantifying the risks of applications for mobile devices Apr. 29, 2014
8713683 Security arrangements for extended USB protocol stack of a USB host system Apr. 29, 2014
8713682 Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Apr. 29, 2014
8713679 Detection of code-based malware Apr. 29, 2014
8713677 Anti-phishing system and method Apr. 29, 2014
8713675 Method and apparatus for the prevention of a service degradation attack Apr. 29, 2014
8713674 Systems and methods for excluding undesirable network transactions Apr. 29, 2014
8713673 Qualification screening system and screening method thereof, qualification screening device and device under qualification screening Apr. 29, 2014
8713651 Advocate for facilitating verification for the online presence of an entity Apr. 29, 2014
8713312 Method and system for detecting data modification within computing device Apr. 29, 2014
8707441 Techniques for identifying optimized malicious search engine results Apr. 22, 2014
8707440 System and method for passively identifying encrypted and interactive network sessions Apr. 22, 2014
8707439 Selecting security offerings Apr. 22, 2014
8707438 System and method for providing storage for electronic records Apr. 22, 2014
8707436 Defining code by its functionality Apr. 22, 2014
8707385 Automated compliance policy enforcement in software systems Apr. 22, 2014
8707384 Change recommendations for compliance policy enforcement Apr. 22, 2014
8707180 System for cyber investigation and data management Apr. 22, 2014
8706772 Strict tenant isolation in multi-tenant enabled systems Apr. 22, 2014
8695099 Login initiated scanning of computing devices Apr. 8, 2014
8695098 Detecting security vulnerabilities in web applications Apr. 8, 2014
8695097 System and method for detection and prevention of computer fraud Apr. 8, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689335 Mapping between users and machines in an enterprise security assessment sharing system Apr. 1, 2014
8689334 Security protection for a customer programmable platform Apr. 1, 2014
8689332 Information processing apparatus cooperating with virus management function device, and anti-virus method Apr. 1, 2014
8689327 Method for characterization of a computer program part Apr. 1, 2014
8689203 Software update techniques based on ascertained identities Apr. 1, 2014
8688995 Method and apparatus for detection of a fault attack Apr. 1, 2014
8683599 Static analysis for verification of software program access to secure resources for computer systems Mar. 25, 2014
8683598 Mechanism to evaluate the security posture of a computer system Mar. 25, 2014
8683597 Risk-based authentication duration Mar. 25, 2014
8683596 Detection of DOM-based cross-site scripting vulnerabilities Mar. 25, 2014
8683593 Server-assisted analysis of data for a mobile device Mar. 25, 2014
8683589 Providing protection against unauthorized network access Mar. 25, 2014
8683584 Risk assessment Mar. 25, 2014
8683544 System and method for providing access to a network using flexible session rights Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677497 Mobile risk assessment Mar. 18, 2014
8677496 Method and apparatus for automatic risk assessment of a firewall configuration Mar. 18, 2014
8677480 Anomaly information distribution with threshold Mar. 18, 2014
8677479 Detection of adversaries through collection and correlation of assessments Mar. 18, 2014
8677465 Preventing inadvertent lock-out during password entry dialog Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8671451 Method and apparatus for preventing misuse of a group key in a wireless network Mar. 11, 2014
8671449 Systems and methods for identifying potential malware Mar. 11, 2014
8671438 Method and system for managing security of mobile terminal Mar. 11, 2014
8667596 Systems and methods for network curation Mar. 4, 2014











 
 
  Recently Added Patents
Tailoring the band gap of solar cells made of liquid silane by adding germanium
Secondary battery pack including insulative mounting member into which PCM is inserted in lateral direction
Co-crystals of agomelatine, a process for there preparation and pharmaceutical compositions containing them
Method for computing an energy efficient route
Techniques for distributed storage aggregation
Temporary protective cover for an exposed junction box
Stevia formulation
  Randomly Featured Patents
Method of separating layers of material
Systems and methods for vacuum-assisted regeneration of damaged tissue
Axisymmetric stabilized liner implosion system
Flutter control system for aircraft wings
Ink sheet cartridge and exchangeable ink-sheet set mounted on the ink sheet cartridge
System for periodically reversing the order of video data in a flat panel display device
Shift redundancy circuit, method for controlling shift redundancy circuit, and semiconductor memory device
Plasma control system
Automatically performing failover operations with a load balancer
Adducts of 3-methacroyl-2-hydroxypropyl esters with diisocyanates