Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 726/25
Name: Information security > Monitoring or scanning of software or data including attack prevention > Vulnerability assessment
Description: Subject matter wherein monitoring or scanning of software or data includes methods or systems to evaluate the defensive capabilities of a system, process, apparatus, or entity against attacks.










Patents under this class:

Patent Number Title Of Patent Date Issued
8713686 System and method for reducing antivirus false positives Apr. 29, 2014
8713685 PC secure video path Apr. 29, 2014
8713684 Quantifying the risks of applications for mobile devices Apr. 29, 2014
8713683 Security arrangements for extended USB protocol stack of a USB host system Apr. 29, 2014
8713682 Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Apr. 29, 2014
8713679 Detection of code-based malware Apr. 29, 2014
8713677 Anti-phishing system and method Apr. 29, 2014
8713675 Method and apparatus for the prevention of a service degradation attack Apr. 29, 2014
8713674 Systems and methods for excluding undesirable network transactions Apr. 29, 2014
8713673 Qualification screening system and screening method thereof, qualification screening device and device under qualification screening Apr. 29, 2014
8713651 Advocate for facilitating verification for the online presence of an entity Apr. 29, 2014
8713312 Method and system for detecting data modification within computing device Apr. 29, 2014
8707441 Techniques for identifying optimized malicious search engine results Apr. 22, 2014
8707440 System and method for passively identifying encrypted and interactive network sessions Apr. 22, 2014
8707439 Selecting security offerings Apr. 22, 2014
8707438 System and method for providing storage for electronic records Apr. 22, 2014
8707436 Defining code by its functionality Apr. 22, 2014
8707385 Automated compliance policy enforcement in software systems Apr. 22, 2014
8707384 Change recommendations for compliance policy enforcement Apr. 22, 2014
8707180 System for cyber investigation and data management Apr. 22, 2014
8706772 Strict tenant isolation in multi-tenant enabled systems Apr. 22, 2014
8695099 Login initiated scanning of computing devices Apr. 8, 2014
8695098 Detecting security vulnerabilities in web applications Apr. 8, 2014
8695097 System and method for detection and prevention of computer fraud Apr. 8, 2014
8689336 Tiered exposure model for event correlation Apr. 1, 2014
8689335 Mapping between users and machines in an enterprise security assessment sharing system Apr. 1, 2014
8689334 Security protection for a customer programmable platform Apr. 1, 2014
8689332 Information processing apparatus cooperating with virus management function device, and anti-virus method Apr. 1, 2014
8689327 Method for characterization of a computer program part Apr. 1, 2014
8689203 Software update techniques based on ascertained identities Apr. 1, 2014
8688995 Method and apparatus for detection of a fault attack Apr. 1, 2014
8683599 Static analysis for verification of software program access to secure resources for computer systems Mar. 25, 2014
8683598 Mechanism to evaluate the security posture of a computer system Mar. 25, 2014
8683597 Risk-based authentication duration Mar. 25, 2014
8683596 Detection of DOM-based cross-site scripting vulnerabilities Mar. 25, 2014
8683593 Server-assisted analysis of data for a mobile device Mar. 25, 2014
8683589 Providing protection against unauthorized network access Mar. 25, 2014
8683584 Risk assessment Mar. 25, 2014
8683544 System and method for providing access to a network using flexible session rights Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677497 Mobile risk assessment Mar. 18, 2014
8677496 Method and apparatus for automatic risk assessment of a firewall configuration Mar. 18, 2014
8677480 Anomaly information distribution with threshold Mar. 18, 2014
8677479 Detection of adversaries through collection and correlation of assessments Mar. 18, 2014
8677465 Preventing inadvertent lock-out during password entry dialog Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8671451 Method and apparatus for preventing misuse of a group key in a wireless network Mar. 11, 2014
8671449 Systems and methods for identifying potential malware Mar. 11, 2014
8671438 Method and system for managing security of mobile terminal Mar. 11, 2014
8667596 Systems and methods for network curation Mar. 4, 2014











 
 
  Recently Added Patents
Hand sign
Method for combining images and magnetic resonance scanner
Apparatus and method for connection control with media negotiation successful on different media formats
System and method for detecting crop rows in an agricultural field
Acrylic pressure-sensitive adhesive composition, acrylic pressure-sensitive adhesive layer, and acrylic pressure-sensitive adhesive tape
Profiled rail for advertising/display units
Jet pump and reactor
  Randomly Featured Patents
Compositions and methods of natural products in nanoformulations for the prevention and treatment of osteoporosis
Aqueous ink of pigment type
Riding mower with deck height adjustment
Apparatus and method for manufacturing optical disks, apparatus and method for recording data on optical disks, apparatus and method for reproducing data from optical disks, and optical disk f
Dynamic mouse tray
Process for drying coal
EL light emitting unit, power feeding unit and EL light emitting device
Method of increasing the layout efficiency of dies on a wafer, and increasing the ratio of I/O area to active area per die
Endoscope
Cellular vaccines and immunotherapeutics and methods for their preparation