[US Patent & Trademark Office, Patent Full Text and Image Database]
[Home] [Boolean Search] [Manual Search] [Number Search] [Help]
[NEXT_LIST] [Bottom] [View Shopping Cart]

Searching US Patent Collection...

Results of Search in US Patent Collection db for:
REF/6167520
: 138 patents.
Hits 1 through 50 out of 138




 


PAT. NO.Title
1 10,552,603 Full-Text Malicious mobile code runtime monitoring system and methods
2 10,540,494 Full-Text Determining source of side-loaded software using an administrator server
3 10,419,222 Full-Text Monitoring for fraudulent or harmful behavior in applications being installed on user devices
4 10,416,970 Full-Text Analysis device, analysis method, and analysis program
5 10,284,576 Full-Text Tiered object-related trust decisions
6 10,256,979 Full-Text Assessing application authenticity and performing an action in response to an evaluation result
7 9,756,074 Full-Text System and method for IPS and VM-based detection of suspicious objects
8 9,754,102 Full-Text Malware management through kernel detection during a boot sequence
9 9,516,032 Full-Text Methods and systems for using derived user accounts
10 9,444,844 Full-Text Malicious mobile code runtime monitoring system and methods
11 9,332,021 Full-Text Methods and systems for preventing security breaches
12 9,294,493 Full-Text Computer security method and system with input parameter validation
13 9,280,391 Full-Text Systems and methods for improving performance of computer systems
14 9,264,378 Full-Text Network monitoring by using packet header analysis
15 9,223,963 Full-Text Systems and methods for behavioral sandboxing
16 9,219,755 Full-Text Malicious mobile code runtime monitoring system and methods
17 9,208,327 Full-Text Tiered object-related trust decisions
18 9,189,621 Full-Text Malicious mobile code runtime monitoring system and methods
19 9,141,786 Full-Text Malicious mobile code runtime monitoring system and methods
20 9,027,121 Full-Text Method and system for creating a record for one or more computer security incidents
21 8,955,126 Full-Text Tiered object-related trust decisions
22 8,954,581 Full-Text Network monitoring by using packet header analysis
23 8,875,281 Full-Text Methods and systems for using derived user accounts
24 8,707,251 Full-Text Buffered viewing of electronic documents
25 8,701,181 Full-Text Methods and systems for preventing security breaches
26 8,683,578 Full-Text Methods and systems for using derived user accounts
27 8,677,494 Full-Text Malicious mobile code runtime monitoring system and methods
28 RE44,723 Full-Text Regulating file access rates according to file type
29 8,635,438 Full-Text Method and system of file manipulation during early boot time by accessing user-level data associated with a kernel-level function
30 RE44,686 Full-Text Dynamically modifying the resources of a virtual server
31 8,578,495 Full-Text System and method for analyzing packed files
32 8,489,764 Full-Text Restricting communication of selected processes to a set of specific network addresses
33 8,479,286 Full-Text Systems and methods for behavioral sandboxing
34 8,468,603 Full-Text Tiered object-related trust decisions
35 8,452,744 Full-Text System and method for analyzing locked files
36 8,448,245 Full-Text Automated identification of phishing, phony and malicious web sites
37 RE44,210 Full-Text Virtualizing super-user privileges for multiple virtual processes
38 8,418,245 Full-Text Method and system for detecting obfuscatory pestware in a computer memory
39 8,387,147 Full-Text Method and system for detecting and removing hidden pestware files
40 8,386,598 Full-Text Network monitoring by using packet header analysis
41 8,381,296 Full-Text Method and system for detecting and removing hidden pestware files
42 8,332,943 Full-Text Tiered object-related trust decisions
43 8,261,095 Full-Text Methods and systems for using derived user accounts
44 8,255,992 Full-Text Method and system for detecting dependent pestware objects on a computer
45 8,245,289 Full-Text Methods and systems for preventing security breaches
46 8,230,507 Full-Text Modular agent for network security intrusion detection system
47 8,225,408 Full-Text Method and system for adaptive rule-based content scanners
48 8,201,243 Full-Text Backwards researching activity indicative of pestware
49 8,190,868 Full-Text Malware management through kernel detection
50 8,181,244 Full-Text Backward researching time stamped events to find an origin of pestware


[NEXT_LIST] [Top] [View Shopping Cart]
[Home] [Boolean Search] [Manual Search] [Number Search] [Help]