Movatterモバイル変換


[0]ホーム

URL:


US20030172291A1 - Systems and methods for automated whitelisting in monitored communications - Google Patents

Systems and methods for automated whitelisting in monitored communications
Download PDF

Info

Publication number
US20030172291A1
US20030172291A1US10/361,067US36106703AUS2003172291A1US 20030172291 A1US20030172291 A1US 20030172291A1US 36106703 AUS36106703 AUS 36106703AUS 2003172291 A1US2003172291 A1US 2003172291A1
Authority
US
United States
Prior art keywords
communication
received
whitelist
system processor
anomaly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/361,067
Inventor
Paul Judge
Guru Rajan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secure Computing LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/093,553external-prioritypatent/US6941467B2/en
Priority claimed from US10/094,266external-prioritypatent/US7124438B2/en
Priority claimed from US10/094,211external-prioritypatent/US7458098B2/en
Application filed by IndividualfiledCriticalIndividual
Priority to US10/361,067priorityCriticalpatent/US20030172291A1/en
Assigned to CIPHERTRUST, INC.reassignmentCIPHERTRUST, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JUDGE, PAUL, RAJAN, GURU
Priority to EP03723691.6Aprioritypatent/EP1488316B1/en
Priority to JP2003575222Aprioritypatent/JP4688420B2/en
Priority to EP12189404.2Aprioritypatent/EP2562986B1/en
Priority to AU2003230606Aprioritypatent/AU2003230606B2/en
Priority to EP12189413.3Aprioritypatent/EP2562976B1/en
Priority to PCT/US2003/007042prioritypatent/WO2003077071A2/en
Priority to EP12189407Aprioritypatent/EP2562987A1/en
Priority to CA2478299Aprioritypatent/CA2478299C/en
Priority to EP12189412Aprioritypatent/EP2562975A1/en
Publication of US20030172291A1publicationCriticalpatent/US20030172291A1/en
Priority to US11/142,943prioritypatent/US20060015942A1/en
Priority to US11/173,941prioritypatent/US8132250B2/en
Priority to US11/383,347prioritypatent/US7903549B2/en
Priority to US11/423,329prioritypatent/US7870203B2/en
Priority to US11/423,313prioritypatent/US8578480B2/en
Priority to US11/423,308prioritypatent/US7693947B2/en
Assigned to CITICORP USA, INC. AS ADMINISTRATIVE AGENTreassignmentCITICORP USA, INC. AS ADMINISTRATIVE AGENTSECURITY AGREEMENTAssignors: CIPHERTRUST, INC., SECURE COMPUTING CORPORATION
Assigned to SECURE COMPUTING CORPORATIONreassignmentSECURE COMPUTING CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CIPHERTRUST, INC.
Priority to AU2009203095Aprioritypatent/AU2009203095B2/en
Priority to US13/185,653prioritypatent/US8549611B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level, a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be used to direct the further handling of the communication. The system processor can dispose of communications by quarantining, deleting, or forwarding.

Description

Claims (31)

What is claimed is:
1. A system for detecting an unsolicited communication transmitted over a communications network, the system comprising:
a) an interface coupling the system with the communications network;
b) a system data store capable of storing data associated with communications transmitted over the communications network and one or more whitelists;
c) a system processor in communication with the interface and the system data store, wherein the system processor comprises one or more processing elements and wherein the system processor:
1) receive a communication via the interface;
2) compares the communication to at least one whitelist; and
3) modifies at least one whitelist based on the communication.
2. The system ofclaim 1, wherein the system processor is programmed or adapted to modify the at least one whitelist by updating the at least one whitelist with data derived from the received communication.
3. The system ofclaim 1, wherein the system processor is further programmed or adapted to modify the at least one whitelist by updating the at least one whitelist with data derived from inbound or outbound communication traffic patterns.
4. The system ofclaim 3, wherein the system processor modifies the at least one whitelist by updating the at least one whitelist with data derived from inbound and outbound communication traffic patterns.
5. The system ofclaim 1, wherein the system processor is programmed or adapted to modify the at least one whitelist by adding an entry to the at least one whitelist corresponding to a destination address associated with the received communication.
6. The system ofclaim 1, wherein the system processor is further programmed or adapted to assign a confidence level to received communications.
7. The system ofclaim 6, wherein the system processor is further programmed or adapted to forward a communication with an indication of its confidence level.
8. The system ofclaim 1, wherein the communication is transmitted or received over the Internet.
9. The system ofclaim 8, wherein the communication is an e-mail communication.
10. The system ofclaim 1, wherein the communication comprises an e-mail communication, an HTTP communication, an FTP communication, a WAIS communication, a telnet communication or a Gopher communication.
11. The system ofclaim 1, wherein the system processor is further programmed pr adapted to provide an interface for modifying the at least one whitelist.
12. The system ofclaim 11, wherein the system processor is further programmed or adapted to receive information from the provided interface and apply changes to at least one whitelist based on information received from the interface.
13. The system ofclaim 11, wherein the interface provides for manual editing of the at least one whitelist.
14. The system ofclaim 1, wherein the system processor is further programmed or adapted to determine deliverability of a received communication by applying one or more tests.
15. The system ofclaim 14, wherein received communications determined to be undeliverable are quarantined, discarded, or forwarded.
16. The system ofclaim 14, wherein the system processor is further programmed or adapted to forward the received communication for delivery if it was determined to be deliverable.
17. The system ofclaim 14, wherein the system processor applies each of the one or more tests in a parallel fashion.
18. The system ofclaim 14, wherein the system processor applies each of the one or more tests in a sequential fashion.
19. The system ofclaim 14, wherein the system data store stores configuration information and wherein the system processor applies each of the one or more tests based upon configuration information stored in the system data store.
20. The system ofclaim 14, wherein the system processor determines deliverability by calculating an level of trust.
21. The system ofclaim 20, wherein the system processor determines deliverability by comparing the level of trust to a threshold level.
22. The system ofclaim 14, wherein the system processor determines whether to deliver a received communication further based upon configuration information stored in the system data store.
23. The system ofclaim 22, wherein the configuration information comprises communication types, confidence information, time period information, or combinations thereof.
24. The system ofclaim 14, wherein the system processor is further programmed or adapted to select the one or more tests to determine deliverability.
25. The system ofclaim 24, wherein the system processor selects the one or more tests based upon communication type, configuration information, or combinations thereof.
26. The system ofclaim 24, wherein the system processor is further programmed or adapted to compare a received communication to the at least one whitelist and wherein the system processor selects the one or more tests based upon the comparison.
27. The system ofclaim 14, wherein the system processor is further programmed or adapted to compare a received communication to the at least one whitelist and to selectively bypass the determination of deliverability based upon the comparison.
28. A method for detecting an unsolicited communication transmitted over a communications network, the method comprising the steps of:
a) providing an interface for manually modifying at least one whitelist;
b) receiving an outbound communication of a type selected from the group consisting of an e-mail communication, an HTTP communication, an FTP communication, a WAIS communication, a telnet communication and a Gopher communication;
c) storing the received outbound communication; and
d) modifying the at least one whitelist by adding or modifying an entry on the at least one white list based upon a destination of the received outbound communication.
29. The method ofclaim 28, and further comprising the steps of:
a) receiving an inbound communication;
b) comparing the received inbound communication to the at least one whitelist;
c) selecting a plurality of trust level tests based on a type associated with the received inbound communication, configuration information, the whilelist comparison or combinations thereof;
d) determining deliverability of the received inbound communication by applying the selected plurality of trust level tests;
e) assigning a confidence level to the communication based upon the determined deliverability; and
f) quarantining, discarding, or forwarding the received communication based on the assigned confidence level.
30. A system for detecting an unsolicited communication transmitted over a communications network, the system comprising:
a) means for receiving an electronic communication;
b) direction determination means for determining if the received electronic communication is inbound or outbound;
c) whitelist modification means for updating at least one whitelist based upon a received communication determined to be outbound by the direction determination means by adding an entry or updating an existing entry in the at least one whitelist based upon the received communication; and
d) communication disposition means for disposing of a received communication determined to be inbound by the direction determination means by:
1) comparing the received inbound communication to the at least one whitelist;
2) selecting a plurality of trust level tests based on a type associated with the received inbound communication, configuration information, the whilelist comparison or combinations thereof;
3) assigning a confidence level to the communication based upon the determined deliverability; and
4) quarantining, discarding, or forwarding the received communication based on the assigned confidence level.
31. Computer readable media storing instruction that upon execution by a system processor cause the system processor to automatically generate a whitelist based upon received outbound communication by performing the steps comprising of:
a) providing an interface for manually modifying at least one whitelist;
b) receiving an outbound communication of a type selected from the group consisting of an e-mail communication, an HTTP communication, an FTP communication, a WAIS communication, a telnet communication and a Gopher communication;
c) storing the received outbound communication; and
d) modifying the at least one whitelist by adding or modifying an entry on the at least one white list based upon a destination of the received outbound communication.
US10/361,0672002-03-082003-02-07Systems and methods for automated whitelisting in monitored communicationsAbandonedUS20030172291A1 (en)

Priority Applications (18)

Application NumberPriority DateFiling DateTitle
US10/361,067US20030172291A1 (en)2002-03-082003-02-07Systems and methods for automated whitelisting in monitored communications
EP12189412AEP2562975A1 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
CA2478299ACA2478299C (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
EP03723691.6AEP1488316B1 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
EP12189407AEP2562987A1 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
PCT/US2003/007042WO2003077071A2 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
JP2003575222AJP4688420B2 (en)2002-03-082003-03-06 System and method for enhancing electronic security
EP12189404.2AEP2562986B1 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
AU2003230606AAU2003230606B2 (en)2002-03-082003-03-06Systems and methods for enhancing electronic communication security
EP12189413.3AEP2562976B1 (en)2002-03-082003-03-06Systems and Methods for Enhancing Electronic Communication Security
US11/142,943US20060015942A1 (en)2002-03-082005-06-02Systems and methods for classification of messaging entities
US11/173,941US8132250B2 (en)2002-03-082005-07-01Message profiling systems and methods
US11/383,347US7903549B2 (en)2002-03-082006-05-15Content-based policy compliance systems and methods
US11/423,308US7693947B2 (en)2002-03-082006-06-09Systems and methods for graphically displaying messaging traffic
US11/423,313US8578480B2 (en)2002-03-082006-06-09Systems and methods for identifying potentially malicious messages
US11/423,329US7870203B2 (en)2002-03-082006-06-09Methods and systems for exposing messaging reputation to an end user
AU2009203095AAU2009203095B2 (en)2002-03-082009-07-30Systems and methods for enhancing electronic communication security
US13/185,653US8549611B2 (en)2002-03-082011-07-19Systems and methods for classification of messaging entities

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US10/093,553US6941467B2 (en)2002-03-082002-03-08Systems and methods for adaptive message interrogation through multiple queues
US10/094,266US7124438B2 (en)2002-03-082002-03-08Systems and methods for anomaly detection in patterns of monitored communications
US10/094,211US7458098B2 (en)2002-03-082002-03-08Systems and methods for enhancing electronic communication security
US10/361,067US20030172291A1 (en)2002-03-082003-02-07Systems and methods for automated whitelisting in monitored communications

Related Parent Applications (4)

Application NumberTitlePriority DateFiling Date
US10/094,211Continuation-In-PartUS7458098B2 (en)2002-03-082002-03-08Systems and methods for enhancing electronic communication security
US10/094,266Continuation-In-PartUS7124438B2 (en)2002-03-082002-03-08Systems and methods for anomaly detection in patterns of monitored communications
US10/093,553Continuation-In-PartUS6941467B2 (en)2002-03-082002-03-08Systems and methods for adaptive message interrogation through multiple queues
US10/384,924Continuation-In-PartUS7694128B2 (en)2002-03-082003-03-06Systems and methods for secure communication delivery

Related Child Applications (8)

Application NumberTitlePriority DateFiling Date
US10/361,091Continuation-In-PartUS7096498B2 (en)2002-03-082003-02-07Systems and methods for message threat management
US10/373,325Continuation-In-PartUS7213260B2 (en)2002-03-082003-02-24Systems and methods for upstream threat pushback
US11/142,943Continuation-In-PartUS20060015942A1 (en)2002-03-082005-06-02Systems and methods for classification of messaging entities
US11/173,941Continuation-In-PartUS8132250B2 (en)2002-03-082005-07-01Message profiling systems and methods
US11/383,347Continuation-In-PartUS7903549B2 (en)2002-03-082006-05-15Content-based policy compliance systems and methods
US11/423,308Continuation-In-PartUS7693947B2 (en)2002-03-082006-06-09Systems and methods for graphically displaying messaging traffic
US11/423,313Continuation-In-PartUS8578480B2 (en)2002-03-082006-06-09Systems and methods for identifying potentially malicious messages
US11/423,329Continuation-In-PartUS7870203B2 (en)2002-03-082006-06-09Methods and systems for exposing messaging reputation to an end user

Publications (1)

Publication NumberPublication Date
US20030172291A1true US20030172291A1 (en)2003-09-11

Family

ID=29554084

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US10/361,091Expired - LifetimeUS7096498B2 (en)2002-03-082003-02-07Systems and methods for message threat management
US10/361,067AbandonedUS20030172291A1 (en)2002-03-082003-02-07Systems and methods for automated whitelisting in monitored communications
US10/373,325Expired - LifetimeUS7213260B2 (en)2002-03-082003-02-24Systems and methods for upstream threat pushback
US11/388,575Expired - LifetimeUS7225466B2 (en)2002-03-082006-03-24Systems and methods for message threat management
US11/456,954Expired - Fee RelatedUS8042181B2 (en)2002-03-082006-07-12Systems and methods for message threat management
US11/456,960Expired - Fee RelatedUS8069481B2 (en)2002-03-082006-07-12Systems and methods for message threat management
US11/754,669Expired - Fee RelatedUS8042149B2 (en)2002-03-082007-05-29Systems and methods for message threat management
US13/305,029Expired - LifetimeUS8631495B2 (en)2002-03-082011-11-28Systems and methods for message threat management

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/361,091Expired - LifetimeUS7096498B2 (en)2002-03-082003-02-07Systems and methods for message threat management

Family Applications After (6)

Application NumberTitlePriority DateFiling Date
US10/373,325Expired - LifetimeUS7213260B2 (en)2002-03-082003-02-24Systems and methods for upstream threat pushback
US11/388,575Expired - LifetimeUS7225466B2 (en)2002-03-082006-03-24Systems and methods for message threat management
US11/456,954Expired - Fee RelatedUS8042181B2 (en)2002-03-082006-07-12Systems and methods for message threat management
US11/456,960Expired - Fee RelatedUS8069481B2 (en)2002-03-082006-07-12Systems and methods for message threat management
US11/754,669Expired - Fee RelatedUS8042149B2 (en)2002-03-082007-05-29Systems and methods for message threat management
US13/305,029Expired - LifetimeUS8631495B2 (en)2002-03-082011-11-28Systems and methods for message threat management

Country Status (4)

CountryLink
US (8)US7096498B2 (en)
EP (4)EP2562986B1 (en)
JP (1)JP4688420B2 (en)
AU (1)AU2009203095B2 (en)

Cited By (237)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030172301A1 (en)*2002-03-082003-09-11Paul JudgeSystems and methods for adaptive message interrogation through multiple queues
US20040199595A1 (en)*2003-01-162004-10-07Scott BanisterElectronic message delivery using a virtual gateway approach
US20040258044A1 (en)*2003-05-222004-12-23International Business Machines CorporationMethod and apparatus for managing email messages
US20050080857A1 (en)*2003-10-092005-04-14Kirsch Steven T.Method and system for categorizing and processing e-mails
US20050144279A1 (en)*2003-12-312005-06-30Wexelblat David E.Transactional white-listing for electronic communications
US20050204050A1 (en)*2004-03-102005-09-15Patrick TurleyMethod and system for controlling network access
US20050216587A1 (en)*2004-03-252005-09-29International Business Machines CorporationEstablishing trust in an email client
US20050265319A1 (en)*2004-05-292005-12-01Clegg Paul JMethod and apparatus for destination domain-based bounce profiles
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US20060015941A1 (en)*2004-07-132006-01-19Mckenna John JMethods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
US20060137012A1 (en)*2004-12-162006-06-22Aaron Jeffrey AMethods and systems for deceptively trapping electronic worms
US7096498B2 (en)2002-03-082006-08-22Cipher Trust, Inc.Systems and methods for message threat management
WO2006103843A1 (en)2005-03-282006-10-05Konami Digital Entertainment Co., Ltd.Message character string output system, control method thereof, and information storage medium
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US20060294090A1 (en)*2005-06-232006-12-28Microsoft CorporationProbabilistic analysis of personal store (.PST) files to determine owner with confidence factor
WO2007017408A1 (en)*2005-08-102007-02-15Nokia Siemens Networks Gmbh & Co. KgMethod and system for the automatic update of a white list
WO2005119484A3 (en)*2004-05-292007-04-05Ironport Systems IncMethod and apparatus for managing connections and electronic messages
US20070214504A1 (en)*2004-03-302007-09-13Paolo Milani ComparettiMethod And System For Network Intrusion Detection, Related Network And Computer Program Product
US20070271220A1 (en)*2006-05-192007-11-22Chbag, Inc.System, method and apparatus for filtering web content
US20070294762A1 (en)*2004-05-022007-12-20Markmonitor, Inc.Enhanced responses to online fraud
US20080126951A1 (en)*2005-06-032008-05-29C-Mail Corp.System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends
US20080263664A1 (en)*2007-04-172008-10-23Mckenna John JMethod of integrating a security operations policy into a threat management vector
US7458098B2 (en)2002-03-082008-11-25Secure Computing CorporationSystems and methods for enhancing electronic communication security
US20090083852A1 (en)*2007-09-262009-03-26Microsoft CorporationWhitelist and Blacklist Identification Data
US20090288169A1 (en)*2008-05-162009-11-19Yellowpages.Com LlcSystems and Methods to Control Web Scraping
WO2010002892A1 (en)*2008-06-302010-01-07Aol LlcSystems and methods for reporter-based filtering of electronic communications and messages
US7653695B2 (en)2004-02-172010-01-26Ironport Systems, Inc.Collecting, aggregating, and managing information relating to electronic messages
US7693947B2 (en)2002-03-082010-04-06Mcafee, Inc.Systems and methods for graphically displaying messaging traffic
US7694128B2 (en)2002-03-082010-04-06Mcafee, Inc.Systems and methods for secure communication delivery
US7756930B2 (en)2004-05-282010-07-13Ironport Systems, Inc.Techniques for determining the reputation of a message sender
US7765294B2 (en)2006-06-302010-07-27Embarq Holdings Company, LlcSystem and method for managing subscriber usage of a communications network
US7779156B2 (en)2007-01-242010-08-17Mcafee, Inc.Reputation based load balancing
US20100250762A1 (en)*2009-03-252010-09-30The Quantum Group, Inc.Method and system for regulating entry of data into a protected system
US7808918B2 (en)2006-08-222010-10-05Embarq Holdings Company, LlcSystem and method for dynamically shaping network traffic
US7843831B2 (en)2006-08-222010-11-30Embarq Holdings Company LlcSystem and method for routing data on a packet network
US7849142B2 (en)2004-05-292010-12-07Ironport Systems, Inc.Managing connections, messages, and directory harvest attacks at a server
US7870200B2 (en)2004-05-292011-01-11Ironport Systems, Inc.Monitoring the flow of messages received at a server
US7870608B2 (en)2004-05-022011-01-11Markmonitor, Inc.Early detection and monitoring of online fraud
US7870203B2 (en)2002-03-082011-01-11Mcafee, Inc.Methods and systems for exposing messaging reputation to an end user
US7889660B2 (en)2006-08-222011-02-15Embarq Holdings Company, LlcSystem and method for synchronizing counters on an asynchronous packet communications network
US7895448B1 (en)*2004-02-182011-02-22Symantec CorporationRisk profiling
US7895651B2 (en)2005-07-292011-02-22Bit 9, Inc.Content tracking in a network security system
US7903549B2 (en)2002-03-082011-03-08Secure Computing CorporationContent-based policy compliance systems and methods
US7913302B2 (en)*2004-05-022011-03-22Markmonitor, Inc.Advanced responses to online fraud
US7937480B2 (en)2005-06-022011-05-03Mcafee, Inc.Aggregation of reputation data
US7941491B2 (en)2004-06-042011-05-10Messagemind, Inc.System and method for dynamic adaptive user-based prioritization and display of electronic messages
US7940735B2 (en)2006-08-222011-05-10Embarq Holdings Company, LlcSystem and method for selecting an access point
US7948909B2 (en)2006-06-302011-05-24Embarq Holdings Company, LlcSystem and method for resetting counters counting network performance information at network communications devices on a packet network
US7949716B2 (en)2007-01-242011-05-24Mcafee, Inc.Correlation and analysis of entity attributes
US20110138002A1 (en)*2009-12-042011-06-09Electronic And Telecommunications Research InstituteInteractivity test apparatus and method for blocking ip application spam
US8000318B2 (en)2006-06-302011-08-16Embarq Holdings Company, LlcSystem and method for call routing based on transmission performance of a packet network
US8015294B2 (en)2006-08-222011-09-06Embarq Holdings Company, LPPin-hole firewall for communicating data packets on a packet network
US8042161B1 (en)*2006-11-222011-10-18Symantec CorporationAutomatic sharing of whitelist data
US8040811B2 (en)2006-08-222011-10-18Embarq Holdings Company, LlcSystem and method for collecting and managing network performance information
US8041769B2 (en)2004-05-022011-10-18Markmonitor Inc.Generating phish messages
US8045458B2 (en)2007-11-082011-10-25Mcafee, Inc.Prioritizing network traffic
US8064391B2 (en)2006-08-222011-11-22Embarq Holdings Company, LlcSystem and method for monitoring and optimizing network performance to a wireless device
US8068425B2 (en)2008-04-092011-11-29Embarq Holdings Company, LlcSystem and method for using network performance information to determine improved measures of path states
US8098579B2 (en)2006-08-222012-01-17Embarq Holdings Company, LPSystem and method for adjusting the window size of a TCP packet through remote network elements
US8102770B2 (en)2006-08-222012-01-24Embarq Holdings Company, LPSystem and method for monitoring and optimizing network performance with vector performance tables and engines
US8107366B2 (en)2006-08-222012-01-31Embarq Holdings Company, LPSystem and method for using centralized network performance tables to manage network communications
US8111692B2 (en)2007-05-312012-02-07Embarq Holdings Company LlcSystem and method for modifying network traffic
US8125897B2 (en)2006-08-222012-02-28Embarq Holdings Company LpSystem and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8132250B2 (en)2002-03-082012-03-06Mcafee, Inc.Message profiling systems and methods
US8130793B2 (en)2006-08-222012-03-06Embarq Holdings Company, LlcSystem and method for enabling reciprocal billing for different types of communications over a packet network
US8144587B2 (en)2006-08-222012-03-27Embarq Holdings Company, LlcSystem and method for load balancing network resources using a connection admission control engine
US8144586B2 (en)2006-08-222012-03-27Embarq Holdings Company, LlcSystem and method for controlling network bandwidth with a connection admission control engine
US8160975B2 (en)2008-01-252012-04-17Mcafee, Inc.Granular support vector machine with random granularity
US8166310B2 (en)2004-05-292012-04-24Ironport Systems, Inc.Method and apparatus for providing temporary access to a network device
US20120101967A1 (en)*2003-07-222012-04-26Sonicwall, Inc.Statistical message classifier
US8180834B2 (en)2004-10-072012-05-15Computer Associates Think, Inc.System, method, and computer program product for filtering messages and training a classification module
US8179798B2 (en)2007-01-242012-05-15Mcafee, Inc.Reputation based connection throttling
US8185930B2 (en)2007-11-062012-05-22Mcafee, Inc.Adjusting filter or classification control settings
US8189468B2 (en)*2006-10-252012-05-29Embarq Holdings, Company, LLCSystem and method for regulating messages between networks
US8194643B2 (en)2006-10-192012-06-05Embarq Holdings Company, LlcSystem and method for monitoring the connection of an end-user to a remote network
US8194555B2 (en)2006-08-222012-06-05Embarq Holdings Company, LlcSystem and method for using distributed network performance information tables to manage network communications
US8199653B2 (en)2006-08-222012-06-12Embarq Holdings Company, LlcSystem and method for communicating network performance information over a packet network
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US8223655B2 (en)2006-08-222012-07-17Embarq Holdings Company, LlcSystem and method for provisioning resources of a packet network based on collected network performance information
US8224255B2 (en)2006-08-222012-07-17Embarq Holdings Company, LlcSystem and method for managing radio frequency windows
US8228791B2 (en)2006-08-222012-07-24Embarq Holdings Company, LlcSystem and method for routing communications between packet networks based on intercarrier agreements
US8238253B2 (en)2006-08-222012-08-07Embarq Holdings Company, LlcSystem and method for monitoring interlayer devices and optimizing network performance
US8272058B2 (en)2005-07-292012-09-18Bit 9, Inc.Centralized timed analysis in a network security system
US8274905B2 (en)2006-08-222012-09-25Embarq Holdings Company, LlcSystem and method for displaying a graph representative of network performance over a time period
US8289965B2 (en)2006-10-192012-10-16Embarq Holdings Company, LlcSystem and method for establishing a communications session with an end-user based on the state of a network connection
US8307065B2 (en)2006-08-222012-11-06Centurylink Intellectual Property LlcSystem and method for remotely controlling network operators
US8358580B2 (en)2006-08-222013-01-22Centurylink Intellectual Property LlcSystem and method for adjusting the window size of a TCP packet through network elements
US8407765B2 (en)2006-08-222013-03-26Centurylink Intellectual Property LlcSystem and method for restricting access to network performance information tables
US8452874B2 (en)2010-11-222013-05-28Amazon Technologies, Inc.Request routing processing
US8468247B1 (en)2010-09-282013-06-18Amazon Technologies, Inc.Point of presence management in request routing
US8488447B2 (en)2006-06-302013-07-16Centurylink Intellectual Property LlcSystem and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US8495220B2 (en)2008-11-172013-07-23Amazon Technologies, Inc.Managing CDN registration by a storage provider
US8510448B2 (en)2008-11-172013-08-13Amazon Technologies, Inc.Service provider registration by a content broker
US8521885B1 (en)2009-03-272013-08-27Amazon Technologies, Inc.Dynamically translating resource identifiers for request routing using popularity information
US8521851B1 (en)2009-03-272013-08-27Amazon Technologies, Inc.DNS query processing using resource identifiers specifying an application broker
US8521880B1 (en)2008-11-172013-08-27Amazon Technologies, Inc.Managing content delivery network service providers
US8531954B2 (en)2006-08-222013-09-10Centurylink Intellectual Property LlcSystem and method for handling reservation requests with a connection admission control engine
US8533293B1 (en)2008-03-312013-09-10Amazon Technologies, Inc.Client side cache management
US8537695B2 (en)2006-08-222013-09-17Centurylink Intellectual Property LlcSystem and method for establishing a call being received by a trunk on a packet network
US8543702B1 (en)2009-06-162013-09-24Amazon Technologies, Inc.Managing resources using resource expiration data
US8549611B2 (en)2002-03-082013-10-01Mcafee, Inc.Systems and methods for classification of messaging entities
US8549405B2 (en)2006-08-222013-10-01Centurylink Intellectual Property LlcSystem and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US8549531B2 (en)2008-09-292013-10-01Amazon Technologies, Inc.Optimizing resource configurations
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US8577992B1 (en)2010-09-282013-11-05Amazon Technologies, Inc.Request routing management based on network components
US8578480B2 (en)2002-03-082013-11-05Mcafee, Inc.Systems and methods for identifying potentially malicious messages
US8576722B2 (en)2006-08-222013-11-05Centurylink Intellectual Property LlcSystem and method for modifying connectivity fault management packets
US8583776B2 (en)2008-11-172013-11-12Amazon Technologies, Inc.Managing content delivery network service providers
US8589503B2 (en)2008-04-042013-11-19Mcafee, Inc.Prioritizing network traffic
US8601090B1 (en)2008-03-312013-12-03Amazon Technologies, Inc.Network resource identification
US8606996B2 (en)2008-03-312013-12-10Amazon Technologies, Inc.Cache optimization
WO2013187989A1 (en)*2012-06-122013-12-19International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US8621638B2 (en)2010-05-142013-12-31Mcafee, Inc.Systems and methods for classification of messaging entities
US8619600B2 (en)2006-08-222013-12-31Centurylink Intellectual Property LlcSystem and method for establishing calls over a call path having best path metrics
US8626950B1 (en)2010-12-032014-01-07Amazon Technologies, Inc.Request routing processing
US8635690B2 (en)2004-11-052014-01-21Mcafee, Inc.Reputation based message processing
US8639817B2 (en)2008-03-312014-01-28Amazon Technologies, Inc.Content management
US8667127B2 (en)2009-03-242014-03-04Amazon Technologies, Inc.Monitoring web site content
US20140068021A1 (en)*2012-08-282014-03-06Alexey ArsenievConfiguring client services
US8713156B2 (en)2008-03-312014-04-29Amazon Technologies, Inc.Request routing based on class
US8717911B2 (en)2006-06-302014-05-06Centurylink Intellectual Property LlcSystem and method for collecting network performance information
US8732309B1 (en)2008-11-172014-05-20Amazon Technologies, Inc.Request routing utilizing cost information
US8743703B2 (en)2006-08-222014-06-03Centurylink Intellectual Property LlcSystem and method for tracking application resource usage
US8750158B2 (en)2006-08-222014-06-10Centurylink Intellectual Property LlcSystem and method for differentiated billing
US8756341B1 (en)2009-03-272014-06-17Amazon Technologies, Inc.Request routing utilizing popularity information
US8762526B2 (en)2008-09-292014-06-24Amazon Technologies, Inc.Optimizing content management
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US8769671B2 (en)2004-05-022014-07-01Markmonitor Inc.Online fraud solution
US8788671B2 (en)2008-11-172014-07-22Amazon Technologies, Inc.Managing content delivery network service providers by a content broker
US8819283B2 (en)2010-09-282014-08-26Amazon Technologies, Inc.Request routing in a networked environment
US8843625B2 (en)2008-09-292014-09-23Amazon Technologies, Inc.Managing network data display
US8902897B2 (en)2009-12-172014-12-02Amazon Technologies, Inc.Distributed routing architecture
US8924528B1 (en)2010-09-282014-12-30Amazon Technologies, Inc.Latency measurement in resource requests
US8930513B1 (en)2010-09-282015-01-06Amazon Technologies, Inc.Latency measurement in resource requests
US8938526B1 (en)2010-09-282015-01-20Amazon Technologies, Inc.Request routing management based on network components
US8971328B2 (en)2009-12-172015-03-03Amazon Technologies, Inc.Distributed routing architecture
US8984636B2 (en)2005-07-292015-03-17Bit9, Inc.Content extractor and analysis system
US9003035B1 (en)2010-09-282015-04-07Amazon Technologies, Inc.Point of presence management in request routing
US9009286B2 (en)2008-03-312015-04-14Amazon Technologies, Inc.Locality based content distribution
US9021128B2 (en)2008-06-302015-04-28Amazon Technologies, Inc.Request routing using network computing components
US9021129B2 (en)2007-06-292015-04-28Amazon Technologies, Inc.Request routing utilizing client location information
US9021127B2 (en)2007-06-292015-04-28Amazon Technologies, Inc.Updating routing information based on client location
US9026507B2 (en)2004-05-022015-05-05Thomson Reuters Global ResourcesMethods and systems for analyzing data related to possible online fraud
US9026616B2 (en)2008-03-312015-05-05Amazon Technologies, Inc.Content delivery reconciliation
US9037660B2 (en)2003-05-092015-05-19Google Inc.Managing electronic messages
US9083743B1 (en)2012-03-212015-07-14Amazon Technologies, Inc.Managing request routing information utilizing performance information
US9088460B2 (en)2008-09-292015-07-21Amazon Technologies, Inc.Managing resource consolidation configurations
US9094257B2 (en)2006-06-302015-07-28Centurylink Intellectual Property LlcSystem and method for selecting a content delivery network
US9130756B2 (en)2009-09-042015-09-08Amazon Technologies, Inc.Managing secure content in a content delivery network
US9135048B2 (en)2012-09-202015-09-15Amazon Technologies, Inc.Automated profiling of resource usage
US9141786B2 (en)1996-11-082015-09-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9154551B1 (en)2012-06-112015-10-06Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
US9160641B2 (en)2008-09-292015-10-13Amazon Technologies, Inc.Monitoring domain allocation performance
US9203648B2 (en)2004-05-022015-12-01Thomson Reuters Global ResourcesOnline fraud solution
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9237114B2 (en)2009-03-272016-01-12Amazon Technologies, Inc.Managing resources in resource cache components
US9246776B2 (en)2009-10-022016-01-26Amazon Technologies, Inc.Forward-based resource delivery network management techniques
US9258269B1 (en)*2009-03-252016-02-09Symantec CorporationMethods and systems for managing delivery of email to local recipients using local reputations
US9294391B1 (en)2013-06-042016-03-22Amazon Technologies, Inc.Managing network computing components utilizing request routing
US9323577B2 (en)2012-09-202016-04-26Amazon Technologies, Inc.Automated profiling of resource usage
US9391949B1 (en)2010-12-032016-07-12Amazon Technologies, Inc.Request routing processing
US9407681B1 (en)2010-09-282016-08-02Amazon Technologies, Inc.Latency measurement in resource requests
US20160308830A1 (en)*2010-06-252016-10-20Salesforce.Com, Inc.Methods And Systems For Providing Context-Based Outbound Processing Application Firewalls
US9479341B2 (en)2006-08-222016-10-25Centurylink Intellectual Property LlcSystem and method for initiating diagnostics on a packet network node
US9479476B2 (en)2008-03-312016-10-25Amazon Technologies, Inc.Processing of DNS queries
US9495338B1 (en)2010-01-282016-11-15Amazon Technologies, Inc.Content distribution network
US9525659B1 (en)2012-09-042016-12-20Amazon Technologies, Inc.Request routing utilizing point of presence load information
US9576271B2 (en)2003-06-242017-02-21Google Inc.System and method for community centric resource sharing based on a publishing subscription model
US9628554B2 (en)2012-02-102017-04-18Amazon Technologies, Inc.Dynamic content delivery
US9712484B1 (en)2010-09-282017-07-18Amazon Technologies, Inc.Managing request routing information utilizing client identifiers
US9742795B1 (en)2015-09-242017-08-22Amazon Technologies, Inc.Mitigating network attacks
US9774619B1 (en)2015-09-242017-09-26Amazon Technologies, Inc.Mitigating network attacks
US9787775B1 (en)2010-09-282017-10-10Amazon Technologies, Inc.Point of presence management in request routing
US9794281B1 (en)2015-09-242017-10-17Amazon Technologies, Inc.Identifying sources of network attacks
US9819567B1 (en)2015-03-302017-11-14Amazon Technologies, Inc.Traffic surge management for points of presence
US9832141B1 (en)2015-05-132017-11-28Amazon Technologies, Inc.Routing based request correlation
US9887931B1 (en)2015-03-302018-02-06Amazon Technologies, Inc.Traffic surge management for points of presence
US9887932B1 (en)2015-03-302018-02-06Amazon Technologies, Inc.Traffic surge management for points of presence
US9912740B2 (en)2008-06-302018-03-06Amazon Technologies, Inc.Latency measurement in resource requests
US9992086B1 (en)2016-08-232018-06-05Amazon Technologies, Inc.External health checking of virtual private cloud network environments
US10009344B2 (en)*2016-06-292018-06-26Duo Security, Inc.Systems and methods for endpoint management classification
US10021179B1 (en)2012-02-212018-07-10Amazon Technologies, Inc.Local resource delivery network
US10033691B1 (en)2016-08-242018-07-24Amazon Technologies, Inc.Adaptive resolution of domain name requests in virtual private cloud network environments
US10033627B1 (en)2014-12-182018-07-24Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10049051B1 (en)2015-12-112018-08-14Amazon Technologies, Inc.Reserved cache space in content delivery networks
US10075551B1 (en)2016-06-062018-09-11Amazon Technologies, Inc.Request management for hierarchical cache
US10091096B1 (en)2014-12-182018-10-02Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10097448B1 (en)2014-12-182018-10-09Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10097566B1 (en)2015-07-312018-10-09Amazon Technologies, Inc.Identifying targets of network attacks
US10110694B1 (en)2016-06-292018-10-23Amazon Technologies, Inc.Adaptive transfer rate for retrieving content from a server
US10116623B2 (en)2010-06-252018-10-30Salesforce.Com, Inc.Methods and systems for providing a token-based application firewall correlation
US10171252B2 (en)2015-01-162019-01-01Mitsubishi Electric CorporationData determination apparatus, data determination method, and computer readable medium
US10205698B1 (en)2012-12-192019-02-12Amazon Technologies, Inc.Source-dependent address resolution
US10225326B1 (en)2015-03-232019-03-05Amazon Technologies, Inc.Point of presence based data uploading
US10257307B1 (en)2015-12-112019-04-09Amazon Technologies, Inc.Reserved cache space in content delivery networks
US10270878B1 (en)2015-11-102019-04-23Amazon Technologies, Inc.Routing for origin-facing points of presence
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US10348639B2 (en)2015-12-182019-07-09Amazon Technologies, Inc.Use of virtual endpoints to improve data transmission rates
WO2019140280A1 (en)*2018-01-122019-07-18Brian GirardiSystem and method for trustworthy internet whitelists
US10372499B1 (en)2016-12-272019-08-06Amazon Technologies, Inc.Efficient region selection system for executing request-driven code
WO2019152945A1 (en)*2018-02-022019-08-08Findo, Inc.Method of using machine learning to predict problematic actions within an organization
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US10447648B2 (en)2017-06-192019-10-15Amazon Technologies, Inc.Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP
US10462025B2 (en)2008-09-292019-10-29Amazon Technologies, Inc.Monitoring performance and operation of data exchanges
US10469513B2 (en)2016-10-052019-11-05Amazon Technologies, Inc.Encrypted network addresses
US10503613B1 (en)2017-04-212019-12-10Amazon Technologies, Inc.Efficient serving of resources during server unavailability
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10592578B1 (en)2018-03-072020-03-17Amazon Technologies, Inc.Predictive content push-enabled content delivery network
US10616179B1 (en)2015-06-252020-04-07Amazon Technologies, Inc.Selective routing of domain name system (DNS) requests
US10621341B2 (en)2017-10-302020-04-14Bank Of America CorporationCross platform user event record aggregation system
US10623408B1 (en)2012-04-022020-04-14Amazon Technologies, Inc.Context sensitive object management
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US10721246B2 (en)2017-10-302020-07-21Bank Of America CorporationSystem for across rail silo system integration and logic repository
US10728256B2 (en)2017-10-302020-07-28Bank Of America CorporationCross channel authentication elevation via logic repository
US10831549B1 (en)2016-12-272020-11-10Amazon Technologies, Inc.Multi-region request-driven code execution system
US10862852B1 (en)2018-11-162020-12-08Amazon Technologies, Inc.Resolution of domain name requests in heterogeneous network environments
WO2021016276A1 (en)*2019-07-222021-01-28Whitestar Communications Inc.Systems and methods of distributed backup and recovery on a private network
US10938884B1 (en)2017-01-302021-03-02Amazon Technologies, Inc.Origin server cloaking using virtual private cloud network environments
US10958501B1 (en)2010-09-282021-03-23Amazon Technologies, Inc.Request routing information based on client IP groupings
US10977361B2 (en)2017-05-162021-04-13Beyondtrust Software, Inc.Systems and methods for controlling privileged operations
US20210112062A1 (en)*2017-01-232021-04-15Mitsubishi Electric CorporationWhitelist generator, whitelist evaluator, whitelist generator/evaluator, whitelist generation method, whitelist evaluation method, and whitelist generation/evaluation method
US10999073B2 (en)*2016-12-012021-05-04Utopia Planning Co., Ltd.Secure network communication method
US11025747B1 (en)2018-12-122021-06-01Amazon Technologies, Inc.Content request pattern-based routing system
US11075987B1 (en)2017-06-122021-07-27Amazon Technologies, Inc.Load estimating content delivery network
US11089033B2 (en)2016-04-262021-08-10Mitsubishi Electric CorporationIntrusion detection device, intrusion detection method, and computer readable medium
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US11290418B2 (en)2017-09-252022-03-29Amazon Technologies, Inc.Hybrid content request routing system
US11297105B2 (en)2020-07-222022-04-05International Business Machines CorporationDynamically determining a trust level of an end-to-end link
US11528149B2 (en)2019-04-262022-12-13Beyondtrust Software, Inc.Root-level application selective configuration
US11604667B2 (en)2011-04-272023-03-14Amazon Technologies, Inc.Optimized deployment based upon customer locality
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
US11757816B1 (en)*2019-11-112023-09-12Trend Micro IncorporatedSystems and methods for detecting scam emails
US20230367875A1 (en)*2021-01-222023-11-16Huawei Technologies Co., Ltd.Method for processing traffic in protection device, and protection device
US20240223616A1 (en)*2019-11-082024-07-04Open Text Holdings, Inc.Systems and methods of information security monitoring with third-party indicators of compromise
US12107970B2 (en)2020-05-262024-10-01Motorola Solutions, Inc.Method of establishing a future 2-way authentication between a client application and an application server

Families Citing this family (620)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070112512A1 (en)*1987-09-282007-05-17Verizon Corporate Services Group Inc.Methods and systems for locating source of computer-originated attack based on GPS equipped computing device
US6925572B1 (en)2000-02-282005-08-02Microsoft CorporationFirewall with two-phase filtering
US6938024B1 (en)*2000-05-042005-08-30Microsoft CorporationTransmitting information given constrained resources
US7627897B2 (en)*2001-01-032009-12-01Portauthority Technologies Inc.Method and apparatus for a reactive defense against illegal distribution of multimedia content in file sharing networks
WO2002054272A1 (en)*2001-01-042002-07-11New York UniversitySystem, process and software arrangement for assisting with a knowledge discovery
US8219620B2 (en)2001-02-202012-07-10Mcafee, Inc.Unwanted e-mail filtering system including voting feedback
US7543056B2 (en)2002-01-152009-06-02Mcafee, Inc.System and method for network vulnerability detection and reporting
US7257630B2 (en)2002-01-152007-08-14Mcafee, Inc.System and method for network vulnerability detection and reporting
US7290282B1 (en)*2002-04-082007-10-30Symantec CorporationReducing false positive computer virus detections
JP2003333096A (en)*2002-05-082003-11-21Nec CorpIncoming e-mail rejecting system, incoming e-mail rejecting method and incoming e-mail rejecting program
GB2391419A (en)2002-06-072004-02-04Hewlett Packard CoRestricting the propagation of a virus within a network
GB2401280B (en)*2003-04-292006-02-08Hewlett Packard Development CoPropagation of viruses through an information technology network
US7519990B1 (en)*2002-07-192009-04-14Fortinet, Inc.Managing network traffic flow
US7418729B2 (en)*2002-07-192008-08-26Symantec CorporationHeuristic detection of malicious computer code by page tracking
WO2004059506A1 (en)*2002-12-262004-07-15Commtouch Software Ltd.Detection and prevention of spam
US20040162795A1 (en)*2002-12-302004-08-19Jesse DoughertyMethod and system for feature extraction from outgoing messages for use in categorization of incoming messages
JP2006518080A (en)2003-02-142006-08-03プリベンシス,インコーポレイティド Network audit and policy assurance system
US7627891B2 (en)2003-02-142009-12-01Preventsys, Inc.Network audit and policy assurance system
US7366761B2 (en)*2003-10-092008-04-29Abaca Technology CorporationMethod for creating a whitelist for processing e-mails
US7552176B2 (en)*2003-03-122009-06-23Microsoft CorporationReducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles
US7398315B2 (en)*2003-03-122008-07-08Workman NydeggerReducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing
JP2004295684A (en)*2003-03-272004-10-21Fujitsu Ltd Authentication device
GB2401281B (en)*2003-04-292006-02-08Hewlett Packard Development CoPropagation of viruses through an information technology network
US7796515B2 (en)*2003-04-292010-09-14Hewlett-Packard Development Company, L.P.Propagation of viruses through an information technology network
US7817791B2 (en)*2003-05-152010-10-19Verizon Business Global LlcMethod and apparatus for providing fraud detection using hot or cold originating attributes
US7774842B2 (en)*2003-05-152010-08-10Verizon Business Global LlcMethod and system for prioritizing cases for fraud detection
US7783019B2 (en)*2003-05-152010-08-24Verizon Business Global LlcMethod and apparatus for providing fraud detection using geographically differentiated connection duration thresholds
US7971237B2 (en)*2003-05-152011-06-28Verizon Business Global LlcMethod and system for providing fraud detection for remote access services
EP1625687A4 (en)*2003-05-172011-11-23Microsoft CorpMechanism for evaluating security risks
US20070005970A1 (en)*2003-05-212007-01-04Trupp Steven EE-mail authentication protocol or MAP
US7653698B2 (en)*2003-05-292010-01-26Sonicwall, Inc.Identifying e-mail messages from allowed senders
US7346630B2 (en)2003-06-132008-03-18Yahoo! Inc.Method and system for delivery alerts to a user
US7051077B2 (en)*2003-06-302006-05-23Mx Logic, Inc.Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US20070113272A2 (en)2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US20050015626A1 (en)*2003-07-152005-01-20Chasin C. ScottSystem and method for identifying and filtering junk e-mail messages or spam based on URL content
US7386883B2 (en)*2003-07-222008-06-10International Business Machines CorporationSystems, methods and computer program products for administration of computer security threat countermeasures to a computer system
US20050022021A1 (en)*2003-07-222005-01-27Bardsley Jeffrey S.Systems, methods and data structures for generating computer-actionable computer security threat management information
EP1503285A1 (en)*2003-07-302005-02-02Hewlett-Packard Development Company, L.P.Communication system and method
US7565690B2 (en)*2003-08-042009-07-21At&T Intellectual Property I, L.P.Intrusion detection
US8645697B1 (en)*2003-08-082014-02-04Radix Holdings, LlcMessage authorization
GB2405229B (en)*2003-08-192006-01-11Sophos PlcMethod and apparatus for filtering electronic mail
KR100500589B1 (en)*2003-09-032005-07-12엘지엔시스(주)An apparatus and method for worm protection using pattern matching method based on a hardware system
US7437718B2 (en)*2003-09-052008-10-14Microsoft CorporationReviewing the security of trusted software components
US20050081057A1 (en)*2003-10-102005-04-14Oded CohenMethod and system for preventing exploiting an email message
US9026597B1 (en)*2003-11-072015-05-05Radix Holdings, LlcMessaging enhancements
US20050138426A1 (en)*2003-11-072005-06-23Brian StyslingerMethod, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests
US8839417B1 (en)*2003-11-172014-09-16Mcafee, Inc.Device, system and method for defending a computer network
US7620690B1 (en)*2003-11-202009-11-17Lashback, LLCPrivacy control system for electronic communication
US20050144297A1 (en)*2003-12-302005-06-30Kidsnet, Inc.Method and apparatus for providing content access controls to access the internet
US20050154601A1 (en)*2004-01-092005-07-14Halpern Joshua I.Information security threat identification, analysis, and management
US8627458B2 (en)*2004-01-132014-01-07Mcafee, Inc.Detecting malicious computer program activity using external program calls with dynamic rule sets
US20050289239A1 (en)*2004-03-162005-12-29Prakash Vipul VMethod and an apparatus to classify electronic communication
WO2005096572A1 (en)*2004-03-262005-10-13Hisham Arnold El-EmamMethod for monitoring the transmission of electronic messages
US8201257B1 (en)2004-03-312012-06-12Mcafee, Inc.System and method of managing network security risks
US7587537B1 (en)2007-11-302009-09-08Altera CorporationSerializer-deserializer circuits formed from input-output circuit registers
US8898788B1 (en)2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US8793787B2 (en)2004-04-012014-07-29Fireeye, Inc.Detecting malicious network content using virtual environment components
US8584239B2 (en)2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US8549638B2 (en)2004-06-142013-10-01Fireeye, Inc.System and method of containing computer worms
US9106694B2 (en)2004-04-012015-08-11Fireeye, Inc.Electronic message analysis for malware detection
US8881282B1 (en)2004-04-012014-11-04Fireeye, Inc.Systems and methods for malware attack detection and identification
US8528086B1 (en)2004-04-012013-09-03Fireeye, Inc.System and method of detecting computer worms
US8566946B1 (en)*2006-04-202013-10-22Fireeye, Inc.Malware containment on connection
US8171553B2 (en)2004-04-012012-05-01Fireeye, Inc.Heuristic based capture with replay to virtual machine
US20050223076A1 (en)*2004-04-022005-10-06International Business Machines CorporationCooperative spam control
US8528077B1 (en)*2004-04-092013-09-03Hewlett-Packard Development Company, L.P.Comparing events from multiple network security devices
GB2431316B (en)*2005-10-122008-05-21Hewlett Packard Development CoPropagation of malicious code through an information technology network
US20070107053A1 (en)*2004-05-022007-05-10Markmonitor, Inc.Enhanced responses to online fraud
US8407792B2 (en)*2004-05-192013-03-26Ca, Inc.Systems and methods for computer security
US20060010213A1 (en)*2004-05-192006-01-12Jignesh MehtaMethod for personal email archiving and organization for electronic data, including email, which can be utilized by both the user and the provider in a variety of ways
US8042180B2 (en)*2004-05-212011-10-18Computer Associates Think, Inc.Intrusion detection based on amount of network traffic
US7428579B2 (en)*2004-05-272008-09-23Yahoo! Inc.Method and system for segmentation of a message inbox
US20050289148A1 (en)*2004-06-102005-12-29Steven DornerMethod and apparatus for detecting suspicious, deceptive, and dangerous links in electronic messages
US20050278178A1 (en)*2004-06-102005-12-15International Business Machines CorporationSystem and method for intrusion decision-making in autonomic computing environments
US20050283519A1 (en)*2004-06-172005-12-22Commtouch Software, Ltd.Methods and systems for combating spam
US7953814B1 (en)2005-02-282011-05-31Mcafee, Inc.Stopping and remediating outbound messaging abuse
US8484295B2 (en)*2004-12-212013-07-09Mcafee, Inc.Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
US7680890B1 (en)2004-06-222010-03-16Wei LinFuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US8880611B1 (en)*2004-06-302014-11-04Google Inc.Methods and apparatus for detecting spam messages in an email system
CN100370757C (en)*2004-07-092008-02-20国际商业机器公司Method and system for dentifying a distributed denial of service (DDOS) attack within a network and defending against such an attack
WO2006017291A2 (en)*2004-07-122006-02-16Nfr SecurityIntrusion management system and method for providing dynamically scaled confidence level of attack detection
US7343624B1 (en)*2004-07-132008-03-11Sonicwall, Inc.Managing infectious messages as identified by an attachment
US9154511B1 (en)2004-07-132015-10-06Dell Software Inc.Time zero detection of infectious messages
US7490356B2 (en)*2004-07-202009-02-10Reflectent Software, Inc.End user risk management
US8631493B2 (en)*2004-08-122014-01-14Verizon Patent And Licensing Inc.Geographical intrusion mapping system using telecommunication billing and inventory systems
US8418246B2 (en)*2004-08-122013-04-09Verizon Patent And Licensing Inc.Geographical threat response prioritization mapping system and methods of use
US8082506B1 (en)*2004-08-122011-12-20Verizon Corporate Services Group Inc.Geographical vulnerability mitigation response mapping system
US8572734B2 (en)*2004-08-122013-10-29Verizon Patent And Licensing Inc.Geographical intrusion response prioritization mapping through authentication and flight data correlation
US7725589B2 (en)*2004-08-162010-05-25Fiberlink Communications CorporationSystem, method, apparatus, and computer program product for facilitating digital communications
US8443049B1 (en)*2004-08-202013-05-14Sprint Spectrum L.P.Call processing using trust scores based on messaging patterns of message source
US8914309B2 (en)2004-08-202014-12-16Ebay Inc.Method and system for tracking fraudulent activity
US20060045124A1 (en)*2004-08-312006-03-02Kidsnet, Inc.Method and apparatus for providing access controls to communication services
US20060069782A1 (en)*2004-09-162006-03-30Michael ManningMethod and apparatus for location-based white lists in a telecommunications network
GB2418330B (en)*2004-09-172006-11-08Jeroen OostendorpPlatform for intelligent Email distribution
US20060064740A1 (en)*2004-09-222006-03-23International Business Machines CorporationNetwork threat risk assessment tool
US7797749B2 (en)*2004-11-032010-09-14Intel CorporationDefending against worm or virus attacks on networks
US7519818B2 (en)*2004-12-092009-04-14Microsoft CorporationMethod and system for processing a communication based on trust that the communication is not unwanted as assigned by a sending domain
US7653812B2 (en)*2004-12-092010-01-26Microsoft CorporationMethod and system for evaluating confidence in a sending domain to accurately assign a trust that a communication is not unwanted
US7577984B2 (en)*2004-12-092009-08-18Microsoft CorporationMethod and system for a sending domain to establish a trust that its senders communications are not unwanted
US9160755B2 (en)2004-12-212015-10-13Mcafee, Inc.Trusted communication network
US9015472B1 (en)2005-03-102015-04-21Mcafee, Inc.Marking electronic messages to indicate human origination
US8738708B2 (en)*2004-12-212014-05-27Mcafee, Inc.Bounce management in a trusted communication network
US8250654B1 (en)2005-01-272012-08-21Science Applications International CorporationSystems and methods for implementing and scoring computer network defense exercises
US9325728B1 (en)2005-01-272016-04-26Leidos, Inc.Systems and methods for implementing and scoring computer network defense exercises
US8266320B1 (en)*2005-01-272012-09-11Science Applications International CorporationComputer network defense
US20060259950A1 (en)2005-02-182006-11-16Ulf MattssonMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US7831834B2 (en)*2005-03-142010-11-09Yahoo! IncAssociating a postmark with a message to indicate trust
US20060224673A1 (en)*2005-03-302006-10-05Microsoft CorporationThrottling inbound electronic messages in a message processing system
US7841003B1 (en)*2005-05-042010-11-23Capital One Financial CorporationPhishing solution method
JP4557815B2 (en)*2005-06-132010-10-06富士通株式会社 Relay device and relay system
CA2613083A1 (en)*2005-07-012007-01-11Markmonitor Inc.Enhanced fraud monitoring systems
US10764264B2 (en)*2005-07-112020-09-01Avaya Inc.Technique for authenticating network users
US9282081B2 (en)*2005-07-282016-03-08Vaporstream IncorporatedReduced traceability electronic message system and method
US20070056038A1 (en)*2005-09-062007-03-08Lok Technology, Inc.Fusion instrusion protection system
US8874477B2 (en)2005-10-042014-10-28Steven Mark HoffbergMultifactorial optimization system and method
US9055093B2 (en)*2005-10-212015-06-09Kevin R. BordersMethod, system and computer program product for detecting at least one of security threats and undesirable computer files
US20070112814A1 (en)*2005-11-122007-05-17Cheshire Stuart DMethods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
WO2007064880A2 (en)2005-12-012007-06-07Firestar Software, Inc.System and method for exchanging information among exchange applications
US20070150773A1 (en)*2005-12-192007-06-28Nortel Networks LimitedExtensions to SIP signaling to indicate SPAM
US8121839B2 (en)*2005-12-192012-02-21Rockstar Bidco, LPMethod and apparatus for detecting unsolicited multimedia communications
US7793138B2 (en)*2005-12-212010-09-07Cisco Technology, Inc.Anomaly detection for storage traffic in a data center
US20070143827A1 (en)*2005-12-212007-06-21FiberlinkMethods and systems for intelligently controlling access to computing resources
US20070143851A1 (en)2005-12-212007-06-21FiberlinkMethod and systems for controlling access to computing resources based on known security vulnerabilities
US20070157311A1 (en)*2005-12-292007-07-05Microsoft CorporationSecurity modeling and the application life cycle
US7890315B2 (en)*2005-12-292011-02-15Microsoft CorporationPerformance engineering and the application life cycle
US7774297B2 (en)*2005-12-302010-08-10Honeywell International Inc.System and method for network security
US20070153696A1 (en)*2006-01-032007-07-05AlcatelCollaborative communication traffic control systems and methods
WO2008002332A2 (en)*2006-01-052008-01-03Sundri Kaur KhalsaSystem and method for providing terrorism intelligence indications and warning
US8443442B2 (en)*2006-01-312013-05-14The Penn State Research FoundationSignature-free buffer overflow attack blocker
US20070186282A1 (en)*2006-02-062007-08-09Microsoft CorporationTechniques for identifying and managing potentially harmful web traffic
US8601160B1 (en)2006-02-092013-12-03Mcafee, Inc.System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US7818788B2 (en)*2006-02-142010-10-19Microsoft CorporationWeb application security frame
US9167000B2 (en)*2006-02-142015-10-20Ca, Inc.Dynamic threat event management system and method
US7712137B2 (en)*2006-02-272010-05-04Microsoft CorporationConfiguring and organizing server security information
US7627641B2 (en)*2006-03-092009-12-01Watchguard Technologies, Inc.Method and system for recognizing desired email
US20070234424A1 (en)*2006-03-312007-10-04Lucent Technologies, Inc.Design and evaluation of a fast and robust worm detection algorithm
WO2007117636A2 (en)*2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
US8458261B1 (en)*2006-04-072013-06-04Trend Micro IncorporatedDetermination of valid email addresses in a private computer network
US20070282770A1 (en)*2006-05-152007-12-06Nortel Networks LimitedSystem and methods for filtering electronic communications
JP4015690B1 (en)*2006-06-022007-11-28デュアキシズ株式会社 COMMUNICATION MANAGEMENT SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND COMMUNICATION CONTROL DEVICE
US8301703B2 (en)*2006-06-282012-10-30International Business Machines CorporationSystems and methods for alerting administrators about suspect communications
US7707222B2 (en)*2006-07-062010-04-27The United States Of America As Represented By The Secretary Of The Air ForceMethod and apparatus for providing access to information systems via e-mail
JP4679461B2 (en)*2006-07-282011-04-27Necビッグローブ株式会社 Site service device, site service system, site management method, and program
US8515912B2 (en)2010-07-152013-08-20Palantir Technologies, Inc.Sharing and deconflicting data changes in a multimaster database system
US20080155264A1 (en)*2006-12-202008-06-26Ross BrownAnti-virus signature footprint
US9008617B2 (en)*2006-12-282015-04-14Verizon Patent And Licensing Inc.Layered graphical event mapping
US8561166B2 (en)*2007-01-072013-10-15Alcatel LucentEfficient implementation of security applications in a networked environment
US8881276B2 (en)*2007-01-092014-11-04Cisco Technology, Inc.Dynamically generated whitelist for high throughput intrusion prevention system (IPS) functionality
AU2008214131B2 (en)2007-02-022012-06-14Websense, Inc.System and method for adding context to prevent data leakage over a computer network
US8312135B2 (en)2007-02-022012-11-13Microsoft CorporationComputing system infrastructure to administer distress messages
CL2008000410A1 (en)*2007-02-082008-05-30Aspenbio Pharma Inc ANALOG OF THE BOVINE FOLICULES STIMULATING HORMONE (bFSH) THAT INCLUDES TWO COVALENTLY LINKED POLYPEPTIDES; NUCLEIC ACID CODING THE ANALOG; VECTOR AND CELL LINE THAT INCLUDE SUCH NUCLEIC ACID; REPRODU INCREASE METHOD
US8910275B2 (en)*2007-02-142014-12-09Hewlett-Packard Development Company, L.P.Network monitoring
US20080201722A1 (en)*2007-02-202008-08-21Gurusamy SarathyMethod and System For Unsafe Content Tracking
US8955122B2 (en)*2007-04-042015-02-10Sri InternationalMethod and apparatus for detecting malware infection
US20080263106A1 (en)*2007-04-122008-10-23Steven AshermanDatabase queuing and distributed computing
US7853992B2 (en)*2007-05-312010-12-14Microsoft CorporationConfiguring security mechanisms utilizing a trust system
US8682982B2 (en)*2007-06-192014-03-25The Invention Science Fund I, LlcPreliminary destination-dependent evaluation of message content
US9374242B2 (en)*2007-11-082016-06-21Invention Science Fund I, LlcUsing evaluations of tentative message content
US20080320088A1 (en)*2007-06-192008-12-25Searete Llc, A Limited Liability Corporation Of The State Of DelawareHelping valuable message content pass apparent message filtering
US8984133B2 (en)2007-06-192015-03-17The Invention Science Fund I, LlcProviding treatment-indicative feedback dependent on putative content treatment
US8340091B2 (en)2007-07-112012-12-25Hewlett-Packard Development Company, L.P.Packet processing with adjusted access control list
US8086441B1 (en)*2007-07-272011-12-27Sonicwall, Inc.Efficient string search
JP5046158B2 (en)*2007-08-102012-10-10インターナショナル・ビジネス・マシーンズ・コーポレーション Apparatus and method for detecting characteristics of an e-mail message
US8065404B2 (en)*2007-08-312011-11-22The Invention Science Fund I, LlcLayering destination-dependent content handling guidance
US8082225B2 (en)*2007-08-312011-12-20The Invention Science Fund I, LlcUsing destination-dependent criteria to guide data transmission decisions
US8689330B2 (en)*2007-09-052014-04-01Yahoo! Inc.Instant messaging malware protection
US9009828B1 (en)*2007-09-282015-04-14Dell SecureWorks, Inc.System and method for identification and blocking of unwanted network traffic
US20090113039A1 (en)*2007-10-252009-04-30At&T Knowledge Ventures, L.P.Method and system for content handling
US20090125980A1 (en)*2007-11-092009-05-14Secure Computing CorporationNetwork rating
US7930389B2 (en)*2007-11-202011-04-19The Invention Science Fund I, LlcAdaptive filtering of annotated messages or the like
US8365276B1 (en)*2007-12-102013-01-29Mcafee, Inc.System, method and computer program product for sending unwanted activity information to a central system
US20090187467A1 (en)*2008-01-232009-07-23Palo Alto Research Center IncorporatedLinguistic extraction of temporal and location information for a recommender system
US9336385B1 (en)2008-02-112016-05-10Adaptive Cyber Security Instruments, Inc.System for real-time threat detection and management
US8370930B2 (en)*2008-02-282013-02-05Microsoft CorporationDetecting spam from metafeatures of an email message
US7792922B2 (en)*2008-03-052010-09-07Caterpillar Inc.Systems and methods for managing health of a client system
US8170965B2 (en)*2008-03-122012-05-01Fabian Matthew MihelicMethod for governing the operation of a generalist agent within a complex multi-agent adaptive system
US8370948B2 (en)*2008-03-192013-02-05Websense, Inc.System and method for analysis of electronic information dissemination events
US9130986B2 (en)*2008-03-192015-09-08Websense, Inc.Method and system for protection against information stealing software
US8407784B2 (en)2008-03-192013-03-26Websense, Inc.Method and system for protection against information stealing software
US9015842B2 (en)2008-03-192015-04-21Websense, Inc.Method and system for protection against information stealing software
US8839419B2 (en)*2008-04-052014-09-16Microsoft CorporationDistributive security investigation
FR2930392B1 (en)*2008-04-222022-01-28Trustseed METHOD AND DEVICE FOR SECURING DATA TRANSFERS
US20090328188A1 (en)*2008-05-012009-12-31Motorola, Inc.Context-based semantic firewall for the protection of information
US20090307183A1 (en)*2008-06-102009-12-10Eric Arno VigenSystem and Method for Transmission of Communications by Unique Definition Identifiers
US8201247B1 (en)*2008-06-112012-06-12Trend Micro IncorporatedMethod and apparatus for providing a computer security service via instant messaging
WO2010011467A1 (en)2008-06-292010-01-28Oceans' Edge, Inc.Mobile telephone firewall and compliance enforcement system and method
US8095635B2 (en)*2008-07-212012-01-10At&T Intellectual Property I, LpManaging network traffic for improved availability of network services
US10354229B2 (en)*2008-08-042019-07-16Mcafee, LlcMethod and system for centralized contact management
US8380793B2 (en)*2008-09-052013-02-19Microsoft CorporationAutomatic non-junk message list inclusion
US8463730B1 (en)2008-10-242013-06-11Vmware, Inc.Rapid evaluation of numerically large complex rules governing network and application transactions
US9559800B1 (en)2008-10-242017-01-31Vmware, Inc.Dynamic packet filtering
US8561180B1 (en)*2008-10-292013-10-15Symantec CorporationSystems and methods for aiding in the elimination of false-positive malware detections within enterprises
US8997219B2 (en)2008-11-032015-03-31Fireeye, Inc.Systems and methods for detecting malicious PDF network content
US8559304B2 (en)*2008-12-122013-10-15At&T Intellectual Property I, LpSystem and method for controlling streaming content in a cellular telephone
KR101544437B1 (en)*2009-02-112015-08-17삼성전자주식회사Apparatus and method for spam configuration
US8695091B2 (en)*2009-02-112014-04-08Sophos LimitedSystems and methods for enforcing policies for proxy website detection using advertising account ID
US8495736B2 (en)*2009-03-242013-07-23Lockheed Martin CorporationMethod and apparatus for providing information assurance attributes through a data providence architecture
US9231964B2 (en)*2009-04-142016-01-05Microsoft CorporationVulnerability detection based on aggregated primitives
US8356001B2 (en)*2009-05-192013-01-15Xybersecure, Inc.Systems and methods for application-level security
CA2763513A1 (en)2009-05-262010-12-02Roy BarkanSystems and methods for efficient detection of fingerprinted data and information
US8935258B2 (en)*2009-06-152015-01-13Microsoft CorporationIdentification of sample data items for re-judging
US8959157B2 (en)*2009-06-262015-02-17Microsoft CorporationReal-time spam look-up system
EP2454619A4 (en)2009-07-172016-01-06Hewlett Packard Development CoNon-periodic grating reflectors with focusing power and methods for fabricatting the same
US8489685B2 (en)2009-07-172013-07-16Aryaka Networks, Inc.Application acceleration as a service system and method
US8379639B2 (en)*2009-07-222013-02-19Cisco Technology, Inc.Packet classification
US8977705B2 (en)*2009-07-272015-03-10Verisign, Inc.Method and system for data logging and analysis
US9055077B2 (en)*2009-08-242015-06-09Apple Inc.Device identity matching
US9477947B2 (en)*2009-08-242016-10-25International Business Machines CorporationRetrospective changing of previously sent messages
EP2480917A4 (en)2009-09-232013-05-29Hewlett Packard Development CoOptical devices based on diffraction gratings
US8832829B2 (en)2009-09-302014-09-09Fireeye, Inc.Network-based binary file extraction and analysis for malware detection
CN106097107B (en)2009-09-302020-10-16柯蔼文Systems and methods for social graph data analysis to determine connectivity within a community
US20110099164A1 (en)2009-10-232011-04-28Haim Zvi MelmanApparatus and method for search and retrieval of documents and advertising targeting
EP2494484A4 (en)*2009-10-312016-05-18Hewlett Packard Development CoMalicious code detection
FR2954547B1 (en)*2009-12-212012-10-12Alcatel Lucent METHOD FOR DETECTING A MISUSE OF COMPUTER RESOURCES
US20170358027A1 (en)2010-01-142017-12-14Www.Trustscience.Com Inc.Scoring trustworthiness, competence, and/or compatibility of any entity for activities including recruiting or hiring decisions, composing a team, insurance underwriting, credit decisions, or shortening or improving sales cycles
CN102137059B (en)*2010-01-212014-12-10阿里巴巴集团控股有限公司Method and system for blocking malicious accesses
US8842363B2 (en)2010-01-292014-09-23Hewlett-Packard Development Company, L.P.Dynamically varying an optical characteristic of light by a sub-wavelength grating
US8952403B2 (en)2010-01-292015-02-10Hewlett-Packard Development, L.P.Optical devices based on non-periodic sub-wavelength gratings
US9093819B2 (en)2010-01-292015-07-28Hewlett-Packard Development Company, L.P.Vertical-cavity surface-emitting lasers with non-periodic gratings
US20110219016A1 (en)*2010-03-042011-09-08Src, Inc.Stream Mining via State Machine and High Dimensionality Database
US8424072B2 (en)*2010-03-092013-04-16Microsoft CorporationBehavior-based security system
US8910279B2 (en)2010-03-102014-12-09Sonicwall, Inc.Reputation-based threat protection
US8576890B2 (en)2010-04-262013-11-05Hewlett-Packard Development Company, L.P.Vertical-cavity surface-emitting laser
US9922134B2 (en)*2010-04-302018-03-20Www.Trustscience.Com Inc.Assessing and scoring people, businesses, places, things, and brands
US20110282950A1 (en)*2010-05-122011-11-17Kfir LuzzattoReverse message classification
US20120174219A1 (en)*2010-05-142012-07-05Mcafee, Inc.Identifying mobile device reputations
US9202049B1 (en)2010-06-212015-12-01Pulse Secure, LlcDetecting malware on mobile devices
US8369664B2 (en)2010-07-302013-02-05Hewlett-Packard Development Company, L.P.Optical apparatus for forming a tunable cavity
US9356941B1 (en)*2010-08-162016-05-31Symantec CorporationSystems and methods for detecting suspicious web pages
US8627463B1 (en)*2010-09-132014-01-07Symantec CorporationSystems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions
US9015093B1 (en)2010-10-262015-04-21Michael Lamport CommonsIntelligent control with hierarchical stacked neural networks
US8775341B1 (en)2010-10-262014-07-08Michael Lamport CommonsIntelligent control with hierarchical stacked neural networks
JP5777722B2 (en)2010-10-292015-09-09ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Small-mode volume vertical cavity surface emitting laser
US8775607B2 (en)*2010-12-102014-07-08International Business Machines CorporationIdentifying stray assets in a computing enviroment and responsively taking resolution actions
US8959626B2 (en)*2010-12-142015-02-17F-Secure CorporationDetecting a suspicious entity in a communication network
US8640245B2 (en)2010-12-242014-01-28Kaspersky Lab, ZaoOptimization of anti-malware processing by automated correction of detection rules
US8621618B1 (en)*2011-02-072013-12-31Dell Products, LpSystem and method for assessing whether a communication contains an attack
US8606866B2 (en)*2011-02-102013-12-10Kaspersky Lab ZaoSystems and methods of probing data transmissions for detecting spam bots
ES2442747T3 (en)*2011-02-102014-02-13Telefónica, S.A. Procedure and system to improve the detection of security threats in communication networks
US9122877B2 (en)2011-03-212015-09-01Mcafee, Inc.System and method for malware and network reputation correlation
US9117074B2 (en)2011-05-182015-08-25Microsoft Technology Licensing, LlcDetecting a compromised online user account
US20120315893A1 (en)*2011-06-092012-12-13Alcatel-Lucent Canada Inc.Intelligent network management of subscriber-related events
JP5760736B2 (en)2011-06-222015-08-12富士通株式会社 Communication device
US9106680B2 (en)2011-06-272015-08-11Mcafee, Inc.System and method for protocol fingerprinting and reputation correlation
US9087324B2 (en)*2011-07-122015-07-21Microsoft Technology Licensing, LlcMessage categorization
US9065826B2 (en)2011-08-082015-06-23Microsoft Technology Licensing, LlcIdentifying application reputation based on resource accesses
US8713672B2 (en)2011-08-152014-04-29Bank Of America CorporationMethod and apparatus for token-based context caching
US9442881B1 (en)2011-08-312016-09-13Yahoo! Inc.Anti-spam transient entity classification
GB2494406A (en)*2011-09-062013-03-13SkypeSystem to detect protocol discrimination by network provider in the event of communication problems
US20140366084A1 (en)*2012-01-252014-12-11Nec CorporationManagement system, management method, and non-transitory storage medium
US8726338B2 (en)2012-02-022014-05-13Juniper Networks, Inc.Dynamic threat protection in mobile networks
US9032520B2 (en)*2012-02-222015-05-12iScanOnline, Inc.Remote security self-assessment framework
RU2510982C2 (en)*2012-04-062014-04-10Закрытое акционерное общество "Лаборатория Касперского"User evaluation system and method for message filtering
US8931043B2 (en)2012-04-102015-01-06Mcafee Inc.System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9350644B2 (en)2012-04-132016-05-24Zscaler. Inc.Secure and lightweight traffic forwarding systems and methods to cloud based network security systems
US9118689B1 (en)*2012-04-132015-08-25Zscaler, Inc.Archiving systems and methods for cloud based systems
US9032070B1 (en)2012-05-012015-05-12Amazon Technologies, Inc.Methods and apparatus for providing inline network traffic monitoring
US9166992B1 (en)*2012-05-012015-10-20Amazon Technologies, Inc.Methods and apparatus for providing network traffic monitoring services
US8996691B1 (en)2012-05-012015-03-31Amazon Technologies, Inc.Methods and apparatus for providing out-of-band network traffic monitoring
US9495519B2 (en)*2012-05-102016-11-15International Business Machines CorporationCommunications security management
US9876742B2 (en)2012-06-292018-01-23Microsoft Technology Licensing, LlcTechniques to select and prioritize application of junk email filtering rules
US9088606B2 (en)*2012-07-052015-07-21Tenable Network Security, Inc.System and method for strategic anti-malware monitoring
US20140059141A1 (en)*2012-08-232014-02-27Linkedln CorporationElectronic messaging system utilizing social classification rules
US8918473B1 (en)*2012-10-092014-12-23Whatsapp Inc.System and method for detecting unwanted content
US9565213B2 (en)2012-10-222017-02-07Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9081975B2 (en)2012-10-222015-07-14Palantir Technologies, Inc.Sharing information between nexuses that use different classification schemes for information access control
US9406016B2 (en)*2012-10-232016-08-02Icf InternationalMethod and apparatus for monitoring network traffic
US9501761B2 (en)2012-11-052016-11-22Palantir Technologies, Inc.System and method for sharing investigation results
US8914857B2 (en)*2012-11-212014-12-16Wal-Mart Stores, Inc.Security bypass environment for circumventing a security application in a computing environment
US9241259B2 (en)2012-11-302016-01-19Websense, Inc.Method and apparatus for managing the transfer of sensitive information to mobile devices
US10572665B2 (en)2012-12-282020-02-25Fireeye, Inc.System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9367681B1 (en)2013-02-232016-06-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9176843B1 (en)2013-02-232015-11-03Fireeye, Inc.Framework for efficient security coverage of mobile software applications
US9355247B1 (en)2013-03-132016-05-31Fireeye, Inc.File extraction from memory dump for malicious content analysis
US9626509B1 (en)2013-03-132017-04-18Fireeye, Inc.Malicious content analysis with multi-version application support within single operating environment
US9104867B1 (en)2013-03-132015-08-11Fireeye, Inc.Malicious content analysis using simulated user interaction without user involvement
US9311479B1 (en)2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack
US9430646B1 (en)2013-03-142016-08-30Fireeye, Inc.Distributed systems and methods for automatically detecting unknown bots and botnets
US9965937B2 (en)2013-03-152018-05-08Palantir Technologies Inc.External malware data item clustering and analysis
US10713358B2 (en)2013-03-152020-07-14Fireeye, Inc.System and method to extract and utilize disassembly features to classify software intent
US8818892B1 (en)2013-03-152014-08-26Palantir Technologies, Inc.Prioritizing data clusters with customizable scoring strategies
US9413781B2 (en)2013-03-152016-08-09Fireeye, Inc.System and method employing structured intelligence to verify and contain threats at endpoints
US9495180B2 (en)2013-05-102016-11-15Fireeye, Inc.Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en)2013-05-132017-04-25Fireeye, Inc.Classifying sets of malicious indicators for detecting command and control communications associated with malware
US9306957B2 (en)*2013-06-142016-04-05Sap SeProactive security system for distributed computer networks
US9009825B1 (en)*2013-06-212015-04-14Trend Micro IncorporatedAnomaly detector for computer networks
US10133863B2 (en)2013-06-242018-11-20Fireeye, Inc.Zero-day discovery system
US9300686B2 (en)2013-06-282016-03-29Fireeye, Inc.System and method for detecting malicious links in electronic messages
US9348815B1 (en)2013-06-282016-05-24Digital Reasoning Systems, Inc.Systems and methods for construction, maintenance, and improvement of knowledge representations
US9852290B1 (en)2013-07-122017-12-26The Boeing CompanySystems and methods of analyzing a software component
US9280369B1 (en)2013-07-122016-03-08The Boeing CompanySystems and methods of analyzing a software component
US9336025B2 (en)2013-07-122016-05-10The Boeing CompanySystems and methods of analyzing a software component
US9396082B2 (en)2013-07-122016-07-19The Boeing CompanySystems and methods of analyzing a software component
US9335897B2 (en)2013-08-082016-05-10Palantir Technologies Inc.Long click display of a context menu
US9319419B2 (en)*2013-09-262016-04-19Wave Systems Corp.Device identification scoring
US9736179B2 (en)2013-09-302017-08-15Fireeye, Inc.System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9690936B1 (en)2013-09-302017-06-27Fireeye, Inc.Multistage system and method for analyzing obfuscated content for malware
US9294501B2 (en)2013-09-302016-03-22Fireeye, Inc.Fuzzy hash of behavioral results
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US9479521B2 (en)2013-09-302016-10-25The Boeing CompanySoftware network behavior analysis and identification system
US9628507B2 (en)2013-09-302017-04-18Fireeye, Inc.Advanced persistent threat (APT) detection center
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
WO2015060857A1 (en)2013-10-242015-04-30Mcafee, Inc.Agent assisted malicious application blocking in a network environment
US9319423B2 (en)2013-11-042016-04-19At&T Intellectual Property I, L.P.Malware and anomaly detection via activity recognition based on sensor data
US9921978B1 (en)2013-11-082018-03-20Fireeye, Inc.System and method for enhanced security of storage devices
WO2015094271A1 (en)*2013-12-192015-06-25Intel CorporationProtection system including machine learning snapshot evaluation
US10356032B2 (en)2013-12-262019-07-16Palantir Technologies Inc.System and method for detecting confidential information emails
US9756074B2 (en)2013-12-262017-09-05Fireeye, Inc.System and method for IPS and VM-based detection of suspicious objects
US9747446B1 (en)2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US9338013B2 (en)2013-12-302016-05-10Palantir Technologies Inc.Verifiable redactable audit log
US8832832B1 (en)2014-01-032014-09-09Palantir Technologies Inc.IP reputation
US9740857B2 (en)2014-01-162017-08-22Fireeye, Inc.Threat-aware microvisor
US9262635B2 (en)2014-02-052016-02-16Fireeye, Inc.Detection efficacy of virtual machine-based analysis with application specific events
US9009827B1 (en)*2014-02-202015-04-14Palantir Technologies Inc.Security sharing system
US9886581B2 (en)*2014-02-252018-02-06Accenture Global Solutions LimitedAutomated intelligence graph construction and countermeasure deployment
US9438611B2 (en)*2014-03-172016-09-06Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Managing a blocked-originator list for a messaging application
US9241010B1 (en)2014-03-202016-01-19Fireeye, Inc.System and method for network behavior detection
US10242185B1 (en)2014-03-212019-03-26Fireeye, Inc.Dynamic guest image creation and rollback
US9591015B1 (en)2014-03-282017-03-07Fireeye, Inc.System and method for offloading packet processing and static analysis operations
US9432389B1 (en)2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9223972B1 (en)2014-03-312015-12-29Fireeye, Inc.Dynamically remote tuning of a malware content detection system
US10333877B2 (en)*2014-04-292019-06-25At&T Intellectual Property I, L.P.Methods of generating signatures from groups of electronic messages and related methods and systems for identifying spam messages
CN103973489B (en)*2014-04-302016-08-24北京航天万达高科技有限公司A kind of heterogeneous device centralized monitoring system
CN103973697B (en)*2014-05-192017-03-29重庆邮电大学A kind of thing network sensing layer intrusion detection method
US9928465B2 (en)2014-05-202018-03-27Oath Inc.Machine learning and validation of account names, addresses, and/or identifiers
US9734450B2 (en)2014-06-052017-08-15Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Data loss prevention to remove false positives
US9594912B1 (en)2014-06-062017-03-14Fireeye, Inc.Return-oriented programming detection
US9438623B1 (en)2014-06-062016-09-06Fireeye, Inc.Computer exploit detection using heap spray pattern matching
US9973531B1 (en)2014-06-062018-05-15Fireeye, Inc.Shellcode detection
US11394773B2 (en)*2014-06-192022-07-19Jim Austin JosephCryptographic currency block chain based voting system
US10084813B2 (en)2014-06-242018-09-25Fireeye, Inc.Intrusion prevention and remedy system
US10805340B1 (en)*2014-06-262020-10-13Fireeye, Inc.Infection vector and malware tracking with an interactive user display
US9398028B1 (en)2014-06-262016-07-19Fireeye, Inc.System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US9619557B2 (en)2014-06-302017-04-11Palantir Technologies, Inc.Systems and methods for key phrase characterization of documents
US9535974B1 (en)2014-06-302017-01-03Palantir Technologies Inc.Systems and methods for identifying key phrase clusters within documents
CN113055369B (en)*2014-06-302023-03-21上海诺基亚贝尔股份有限公司Security in software defined networks
US10002252B2 (en)2014-07-012018-06-19Fireeye, Inc.Verification of trusted threat-aware microvisor
US9785773B2 (en)2014-07-032017-10-10Palantir Technologies Inc.Malware data item analysis
US9202249B1 (en)2014-07-032015-12-01Palantir Technologies Inc.Data item clustering and analysis
US10572496B1 (en)2014-07-032020-02-25Palantir Technologies Inc.Distributed workflow system and database with access controls for city resiliency
US9256664B2 (en)2014-07-032016-02-09Palantir Technologies Inc.System and method for news events detection and visualization
US9021260B1 (en)2014-07-032015-04-28Palantir Technologies Inc.Malware data item analysis
US9419992B2 (en)2014-08-132016-08-16Palantir Technologies Inc.Unwanted tunneling alert system
US9363280B1 (en)2014-08-222016-06-07Fireeye, Inc.System and method of detecting delivery of malware using cross-customer data
US10965711B2 (en)2014-09-142021-03-30Sophos LimitedData behavioral tracking
US10122687B2 (en)2014-09-142018-11-06Sophos LimitedFirewall techniques for colored objects on endpoints
US9967282B2 (en)*2014-09-142018-05-08Sophos LimitedLabeling computing objects for improved threat detection
US10671726B1 (en)2014-09-222020-06-02Fireeye Inc.System and method for malware analysis using thread-level event monitoring
US10027689B1 (en)2014-09-292018-07-17Fireeye, Inc.Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en)2014-09-292017-09-26Fireeye, Inc.Exploit detection of malware and malware families
US9043894B1 (en)2014-11-062015-05-26Palantir Technologies Inc.Malicious software detection in a computing system
TWI544764B (en)*2014-11-172016-08-01緯創資通股份有限公司Method for identifying spam mail and mail server using the same
US9690933B1 (en)2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US9367872B1 (en)2014-12-222016-06-14Palantir Technologies Inc.Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US10075455B2 (en)2014-12-262018-09-11Fireeye, Inc.Zero-day rotating guest image profile
US9934376B1 (en)2014-12-292018-04-03Fireeye, Inc.Malware detection appliance architecture
US9648036B2 (en)2014-12-292017-05-09Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
US9467455B2 (en)2014-12-292016-10-11Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
US9838417B1 (en)2014-12-302017-12-05Fireeye, Inc.Intelligent context aware user interaction for malware detection
US10372879B2 (en)2014-12-312019-08-06Palantir Technologies Inc.Medical claims lead summary report generation
US9264370B1 (en)2015-02-102016-02-16Centripetal Networks, Inc.Correlating packets in communications networks
US10326748B1 (en)2015-02-252019-06-18Quest Software Inc.Systems and methods for event-based authentication
US10417613B1 (en)2015-03-172019-09-17Quest Software Inc.Systems and methods of patternizing logged user-initiated events for scheduling functions
US10114966B2 (en)2015-03-192018-10-30Netskope, Inc.Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
US9578043B2 (en)2015-03-202017-02-21Ashif MawjiCalculating a trust score
US9690606B1 (en)2015-03-252017-06-27Fireeye, Inc.Selective system call monitoring
US10148693B2 (en)2015-03-252018-12-04Fireeye, Inc.Exploit detection system
US9438613B1 (en)2015-03-302016-09-06Fireeye, Inc.Dynamic content activation for automated analysis of embedded objects
US10417031B2 (en)2015-03-312019-09-17Fireeye, Inc.Selective virtualization for security threat detection
US10474813B1 (en)2015-03-312019-11-12Fireeye, Inc.Code injection technique for remediation at an endpoint of a network
US9483644B1 (en)2015-03-312016-11-01Fireeye, Inc.Methods for detecting file altering malware in VM based analysis
US9350750B1 (en)*2015-04-032016-05-24Area 1 Security, Inc.Distribution of security rules among sensor computers
US9654485B1 (en)2015-04-132017-05-16Fireeye, Inc.Analytics-based security monitoring system and method
US9866576B2 (en)2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US9594904B1 (en)2015-04-232017-03-14Fireeye, Inc.Detecting malware based on reflection
CN106295381B (en)*2015-05-192019-05-07澜起科技股份有限公司For monitoring device and internal storage to the data access of internal storage
CA2931455C (en)2015-05-272017-06-06OTC Systems Ltd.System for analyzing email for compliance with rules
US9407652B1 (en)2015-06-262016-08-02Palantir Technologies Inc.Network anomaly detection
US11113086B1 (en)2015-06-302021-09-07Fireeye, Inc.Virtual system and method for securing external network connectivity
US10642753B1 (en)2015-06-302020-05-05Fireeye, Inc.System and method for protecting a software component running in virtual machine using a virtualization layer
US10454950B1 (en)2015-06-302019-10-22Fireeye, Inc.Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10726127B1 (en)2015-06-302020-07-28Fireeye, Inc.System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10536352B1 (en)2015-08-052020-01-14Quest Software Inc.Systems and methods for tuning cross-platform data collection
US9456000B1 (en)2015-08-062016-09-27Palantir Technologies Inc.Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10715542B1 (en)2015-08-142020-07-14Fireeye, Inc.Mobile application risk analysis
US10489391B1 (en)2015-08-172019-11-26Palantir Technologies Inc.Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface
US9537880B1 (en)2015-08-192017-01-03Palantir Technologies Inc.Anomalous network monitoring, user behavior detection and database system
US10102369B2 (en)2015-08-192018-10-16Palantir Technologies Inc.Checkout system executable code monitoring, and user account compromise determination system
US10193919B2 (en)2015-08-242019-01-29Empow Cyber Security, LtdRisk-chain generation of cyber-threats
US10176321B2 (en)2015-09-222019-01-08Fireeye, Inc.Leveraging behavior-based rules for malware family classification
US10033747B1 (en)2015-09-292018-07-24Fireeye, Inc.System and method for detecting interpreter-based exploit attacks
US10210329B1 (en)2015-09-302019-02-19Fireeye, Inc.Method to detect application execution hijacking using memory protection
US10817606B1 (en)2015-09-302020-10-27Fireeye, Inc.Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825976B1 (en)2015-09-302017-11-21Fireeye, Inc.Detection and classification of exploit kits
US10706149B1 (en)2015-09-302020-07-07Fireeye, Inc.Detecting delayed activation malware using a primary controller and plural time controllers
US10601865B1 (en)2015-09-302020-03-24Fireeye, Inc.Detection of credential spearphishing attacks using email analysis
US9825989B1 (en)2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US10044745B1 (en)2015-10-122018-08-07Palantir Technologies, Inc.Systems for computer network security risk assessment including user compromise analysis associated with a network of devices
US10284575B2 (en)2015-11-102019-05-07Fireeye, Inc.Launcher for setting analysis environment variations for malware detection
US10846117B1 (en)2015-12-102020-11-24Fireeye, Inc.Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10447728B1 (en)2015-12-102019-10-15Fireeye, Inc.Technique for protecting guest processes using a layered virtualization architecture
US10108446B1 (en)2015-12-112018-10-23Fireeye, Inc.Late load technique for deploying a virtualization layer underneath a running operating system
US10021070B2 (en)*2015-12-222018-07-10Cisco Technology, Inc.Method and apparatus for federated firewall security
US9888039B2 (en)2015-12-282018-02-06Palantir Technologies Inc.Network-based permissioning system
US9916465B1 (en)2015-12-292018-03-13Palantir Technologies Inc.Systems and methods for automatic and customizable data minimization of electronic data stores
US10621338B1 (en)2015-12-302020-04-14Fireeye, Inc.Method to detect forgery and exploits using last branch recording registers
US10133866B1 (en)2015-12-302018-11-20Fireeye, Inc.System and method for triggering analysis of an object for malware in response to modification of that object
US10565378B1 (en)2015-12-302020-02-18Fireeye, Inc.Exploit of privilege detection framework
US10050998B1 (en)2015-12-302018-08-14Fireeye, Inc.Malicious message analysis system
US9824216B1 (en)2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US10581874B1 (en)2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US11552986B1 (en)2015-12-312023-01-10Fireeye Security Holdings Us LlcCyber-security framework for application of virtual features
US11729144B2 (en)2016-01-042023-08-15Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US9923931B1 (en)2016-02-052018-03-20Digital Reasoning Systems, Inc.Systems and methods for identifying violation conditions from electronic communications
US20170235792A1 (en)2016-02-172017-08-17Www.Trustscience.Com Inc.Searching for entities based on trust score and geography
US10389809B2 (en)*2016-02-292019-08-20Netapp, Inc.Systems and methods for resource management in a networked environment
US9679254B1 (en)2016-02-292017-06-13Www.Trustscience.Com Inc.Extrapolating trends in trust scores
US11405423B2 (en)2016-03-112022-08-02Netskope, Inc.Metadata-based data loss prevention (DLP) for cloud resources
US9721296B1 (en)2016-03-242017-08-01Www.Trustscience.Com Inc.Learning an entity's trust model and risk tolerance to calculate a risk score
US10785255B1 (en)2016-03-252020-09-22Fireeye, Inc.Cluster configuration within a scalable malware detection system
US10671721B1 (en)2016-03-252020-06-02Fireeye, Inc.Timeout management services
US10601863B1 (en)2016-03-252020-03-24Fireeye, Inc.System and method for managing sensor enrollment
US10616266B1 (en)2016-03-252020-04-07Fireeye, Inc.Distributed malware detection system and submission workflow thereof
US10893059B1 (en)2016-03-312021-01-12Fireeye, Inc.Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10826933B1 (en)2016-03-312020-11-03Fireeye, Inc.Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US11102238B2 (en)2016-04-222021-08-24Sophos LimitedDetecting triggering events for distributed denial of service attacks
US11277416B2 (en)2016-04-222022-03-15Sophos LimitedLabeling network flows according to source applications
US11165797B2 (en)2016-04-222021-11-02Sophos LimitedDetecting endpoint compromise based on network usage history
US10986109B2 (en)2016-04-222021-04-20Sophos LimitedLocal proxy detection
US10938781B2 (en)2016-04-222021-03-02Sophos LimitedSecure labeling of network flows
WO2017195199A1 (en)*2016-05-102017-11-16Ironscales Ltd.Method and system for detecting malicious and soliciting electronic messages
ES2728292T3 (en)2016-05-172019-10-23Nolve Dev S L Server and method to provide secure access to network-based services
US10498711B1 (en)2016-05-202019-12-03Palantir Technologies Inc.Providing a booting key to a remote system
US10270788B2 (en)2016-06-062019-04-23Netskope, Inc.Machine learning based anomaly detection
US12021831B2 (en)2016-06-102024-06-25Sophos LimitedNetwork security
US10084802B1 (en)2016-06-212018-09-25Palantir Technologies Inc.Supervisory control and data acquisition
US10169585B1 (en)2016-06-222019-01-01Fireeye, Inc.System and methods for advanced malware detection through placement of transition events
US10462173B1 (en)2016-06-302019-10-29Fireeye, Inc.Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10291637B1 (en)2016-07-052019-05-14Palantir Technologies Inc.Network anomaly detection and profiling
US11012466B2 (en)*2016-07-132021-05-18Indrasoft, Inc.Computerized system and method for providing cybersecurity detection and response functionality
US10476907B2 (en)2016-08-102019-11-12Netskope, Inc.Systems and methods of detecting and responding to a data attack on a file system
US10698927B1 (en)2016-08-302020-06-30Palantir Technologies Inc.Multiple sensor session and log information compression and correlation system
US10592678B1 (en)2016-09-092020-03-17Fireeye, Inc.Secure communications between peers using a verified virtual trusted platform module
US10331693B1 (en)*2016-09-122019-06-25Amazon Technologies, Inc.Filters and event schema for categorizing and processing streaming event data
CN106506449B (en)*2016-09-272019-12-31国家数字交换系统工程技术研究中心Unknown anomaly detection method and device and detection equipment
US10491627B1 (en)2016-09-292019-11-26Fireeye, Inc.Advanced malware detection using similarity analysis
US10887347B2 (en)2016-10-272021-01-05Radware, Ltd.Network-based perimeter defense system and method
US10284720B2 (en)*2016-11-012019-05-07Transaction Network Services, Inc.Systems and methods for automatically conducting risk assessments for telephony communications
US10795991B1 (en)2016-11-082020-10-06Fireeye, Inc.Enterprise search
US10158611B2 (en)2016-11-172018-12-18Bank Of America CorporationSystem for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash
US10587647B1 (en)2016-11-222020-03-10Fireeye, Inc.Technique for malware detection capability comparison of network security devices
US10841337B2 (en)2016-11-282020-11-17Secureworks Corp.Computer implemented system and method, and computer program product for reversibly remediating a security risk
US10728262B1 (en)2016-12-212020-07-28Palantir Technologies Inc.Context-aware network-based malicious activity warning systems
US10581879B1 (en)2016-12-222020-03-03Fireeye, Inc.Enhanced malware detection for generated objects
US10552610B1 (en)2016-12-222020-02-04Fireeye, Inc.Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10523609B1 (en)2016-12-272019-12-31Fireeye, Inc.Multi-vector malware detection and analysis
CN106886558B (en)*2016-12-282020-10-16浙江宇视科技有限公司Data processing method and server
US10721262B2 (en)2016-12-282020-07-21Palantir Technologies Inc.Resource-centric network cyber attack warning system
US10754872B2 (en)2016-12-282020-08-25Palantir Technologies Inc.Automatically executing tasks and configuring access control lists in a data transformation system
US10771483B2 (en)*2016-12-302020-09-08British Telecommunications Public Limited CompanyIdentifying an attacked computing device
US10831796B2 (en)*2017-01-152020-11-10International Business Machines CorporationTone optimization for digital content
US20180205695A1 (en)*2017-01-172018-07-19International Business Machines CorporationMessaging application selection for optimal communications
US10496467B1 (en)2017-01-182019-12-03Amazon Technologies, Inc.Monitoring software computations of arbitrary length and duration
US11070577B2 (en)2017-01-202021-07-20Mitsubishi Electric CorporationData determination device, data determination method, and data determination program
US10389593B2 (en)*2017-02-062019-08-20International Business Machines CorporationRefining of applicability rules of management activities according to missing fulfilments thereof
US10516683B2 (en)*2017-02-152019-12-24Ford Global Technologies, LlcSystems and methods for security breach detection in vehicle communication systems
CN107104944A (en)*2017-03-102017-08-29林榆坚A kind of detection method and device of network intrusions
US10180969B2 (en)2017-03-222019-01-15Www.Trustscience.Com Inc.Entity resolution and identity management in big, noisy, and/or unstructured data
US10904286B1 (en)2017-03-242021-01-26Fireeye, Inc.Detection of phishing attacks using similarity analysis
US10063519B1 (en)*2017-03-282018-08-28Verisign, Inc.Automatically optimizing web application firewall rule sets
US11429717B2 (en)2017-03-282022-08-30Nec CorporationSignature generating device, signature generating method, and non-transitory computer-readable medium storing program
US10798112B2 (en)2017-03-302020-10-06Fireeye, Inc.Attribute-controlled malware detection
US10902119B1 (en)2017-03-302021-01-26Fireeye, Inc.Data extraction system for malware analysis
US10554507B1 (en)2017-03-302020-02-04Fireeye, Inc.Multi-level control for enhanced resource and object evaluation management of malware detection system
US10791138B1 (en)2017-03-302020-09-29Fireeye, Inc.Subscription-based malware detection
IL252041B (en)2017-04-302020-09-30Verint Systems LtdSystem and method for tracking users of computer applications
IL252037B (en)2017-04-302021-12-01Verint Systems LtdSystem and method for identifying relationships between users of computer applications
US10673891B2 (en)*2017-05-302020-06-02Akamai Technologies, Inc.Systems and methods for automatically selecting an access control entity to mitigate attack traffic
US10305840B2 (en)*2017-06-162019-05-28International Business Machines CorporationMail bot and mailing list detection
US10027551B1 (en)2017-06-292018-07-17Palantir Technologies, Inc.Access controls through node-based effective policy identifiers
US10503904B1 (en)2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US10601848B1 (en)2017-06-292020-03-24Fireeye, Inc.Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10855700B1 (en)2017-06-292020-12-01Fireeye, Inc.Post-intrusion detection of cyber-attacks during lateral movement within networks
US10893068B1 (en)2017-06-302021-01-12Fireeye, Inc.Ransomware file modification prevention technique
US10419478B2 (en)*2017-07-052019-09-17Area 1 Security, Inc.Identifying malicious messages based on received message data of the sender
US10574696B2 (en)*2017-07-182020-02-25Revbits, LLCSystem and method for detecting phishing e-mails
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US10834113B2 (en)2017-07-252020-11-10Netskope, Inc.Compact logging of network traffic events
US11063973B2 (en)*2017-08-182021-07-13Visa International Service AssociationRemote configuration of security gateways
US10708297B2 (en)2017-08-252020-07-07Ecrime Management Strategies, Inc.Security system for detection and mitigation of malicious communications
US10963465B1 (en)2017-08-252021-03-30Palantir Technologies Inc.Rapid importation of data including temporally tracked object recognition
US10984427B1 (en)2017-09-132021-04-20Palantir Technologies Inc.Approaches for analyzing entity relationships
US10747872B1 (en)2017-09-272020-08-18Fireeye, Inc.System and method for preventing malware evasion
US10805346B2 (en)2017-10-012020-10-13Fireeye, Inc.Phishing attack detection
GB201716170D0 (en)2017-10-042017-11-15Palantir Technologies IncControlling user creation of data resources on a data processing platform
US10079832B1 (en)2017-10-182018-09-18Palantir Technologies Inc.Controlling user creation of data resources on a data processing platform
US10549202B2 (en)*2017-10-252020-02-04Sony Interactive Entertainment LLCBlockchain gaming system
US11108809B2 (en)2017-10-272021-08-31Fireeye, Inc.System and method for analyzing binary code for malware classification using artificial neural network techniques
US10735470B2 (en)2017-11-062020-08-04Secureworks Corp.Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10594713B2 (en)2017-11-102020-03-17Secureworks Corp.Systems and methods for secure propagation of statistical models within threat intelligence communities
US10250401B1 (en)2017-11-292019-04-02Palantir Technologies Inc.Systems and methods for providing category-sensitive chat channels
US11133925B2 (en)2017-12-072021-09-28Palantir Technologies Inc.Selective access to encrypted logs
CN108345522B (en)*2017-12-152019-03-29清华大学For carrying out the methods, devices and systems of safety detection to central processor CPU
US10142349B1 (en)2018-02-222018-11-27Palantir Technologies Inc.Verifying network-based permissioning rights
US11240275B1 (en)2017-12-282022-02-01Fireeye Security Holdings Us LlcPlatform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11005860B1 (en)2017-12-282021-05-11Fireeye, Inc.Method and system for efficient cybersecurity analysis of endpoint events
US11271955B2 (en)2017-12-282022-03-08Fireeye Security Holdings Us LlcPlatform and method for retroactive reclassification employing a cybersecurity-based global data store
RU186198U1 (en)*2018-03-072019-01-11Общество с ограниченной ответственностью "ЦИТ" Host Level Intrusion Detector
US10826931B1 (en)2018-03-292020-11-03Fireeye, Inc.System and method for predicting and mitigating cybersecurity system misconfigurations
US11558401B1 (en)2018-03-302023-01-17Fireeye Security Holdings Us LlcMulti-vector malware detection data sharing system for improved detection
US11003773B1 (en)2018-03-302021-05-11Fireeye, Inc.System and method for automatically generating malware detection rule recommendations
US10956477B1 (en)2018-03-302021-03-23Fireeye, Inc.System and method for detecting malicious scripts through natural language processing modeling
US10878051B1 (en)2018-03-302020-12-29Palantir Technologies Inc.Mapping device identifiers
EP4290400A3 (en)2018-04-032024-03-06Palantir Technologies Inc.Controlling access to computer resources
US10949400B2 (en)2018-05-092021-03-16Palantir Technologies Inc.Systems and methods for tamper-resistant activity logging
WO2019224907A1 (en)*2018-05-222019-11-28三菱電機株式会社Unauthorized email determination device, unauthorized email determination method and unauthorized email determination program
US11249965B2 (en)2018-05-242022-02-15Paypal, Inc.Efficient random string processing
US11244063B2 (en)2018-06-112022-02-08Palantir Technologies Inc.Row-level and column-level policy service
US10785238B2 (en)2018-06-122020-09-22Secureworks Corp.Systems and methods for threat discovery across distinct organizations
US11003718B2 (en)2018-06-122021-05-11Secureworks Corp.Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US11075930B1 (en)2018-06-272021-07-27Fireeye, Inc.System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11314859B1 (en)2018-06-272022-04-26FireEye Security Holdings, Inc.Cyber-security system and method for detecting escalation of privileges within an access token
US11228491B1 (en)2018-06-282022-01-18Fireeye Security Holdings Us LlcSystem and method for distributed cluster configuration monitoring and management
CN110417558B (en)*2018-06-282022-12-09腾讯科技(深圳)有限公司Signature verification method and device, storage medium and electronic device
US11316900B1 (en)2018-06-292022-04-26FireEye Security Holdings Inc.System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US10990759B1 (en)*2018-07-312021-04-27Amazon Technologies, Inc.Deviation-based framework
US10951645B2 (en)2018-08-282021-03-16Marlabs Innovations Private LimitedSystem and method for prevention of threat
US11552962B2 (en)2018-08-312023-01-10Sophos LimitedComputer assisted identification of intermediate level threats
US11182473B1 (en)2018-09-132021-11-23Fireeye Security Holdings Us LlcSystem and method for mitigating cyberattacks against processor operability by a guest process
RU2718215C2 (en)2018-09-142020-03-31Общество С Ограниченной Ответственностью "Яндекс"Data processing system and method for detecting jam in data processing system
RU2731321C2 (en)2018-09-142020-09-01Общество С Ограниченной Ответственностью "Яндекс"Method for determining a potential fault of a storage device
US11763004B1 (en)2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection
RU2697648C2 (en)*2018-10-052019-08-15Общество с ограниченной ответственностью "Алгоритм"Traffic classification system
US10834142B2 (en)*2018-10-092020-11-10International Business Machines CorporationArtificial intelligence assisted rule generation
RU2721235C2 (en)2018-10-092020-05-18Общество С Ограниченной Ответственностью "Яндекс"Method and system for routing and execution of transactions
RU2711348C1 (en)2018-10-152020-01-16Общество С Ограниченной Ответственностью "Яндекс"Method and system for processing requests in a distributed database
CN110020956B (en)2018-11-262022-11-22创新先进技术有限公司Cross-block-chain interaction method and system, computer equipment and storage medium
RU2714373C1 (en)2018-12-132020-02-14Общество С Ограниченной Ответственностью "Яндекс"Method and system for scheduling execution of input/output operations
US11522898B1 (en)*2018-12-172022-12-06Wells Fargo Bank, N.A.Autonomous configuration modeling and management
US11087179B2 (en)2018-12-192021-08-10Netskope, Inc.Multi-label classification of text documents
US12074887B1 (en)2018-12-212024-08-27Musarubra Us LlcSystem and method for selectively processing content after identification and removal of malicious content
RU2749649C2 (en)2018-12-212021-06-16Общество С Ограниченной Ответственностью "Яндекс"Method and system for scheduling processing of i/o operations
US11368475B1 (en)2018-12-212022-06-21Fireeye Security Holdings Us LlcSystem and method for scanning remote services to locate stored objects with malware
JP2020108070A (en)2018-12-282020-07-09株式会社東芝 Communication control device and communication control system
RU2720951C1 (en)2018-12-292020-05-15Общество С Ограниченной Ответственностью "Яндекс"Method and distributed computer system for data processing
DE102019200565A1 (en)*2019-01-172020-07-23Robert Bosch Gmbh Device and method for classifying data, in particular for a controller area network or an automotive Ethernet network.
RU2746042C1 (en)*2019-02-062021-04-06Общество С Ограниченной Ответственностью "Яндекс"Method and the system for message transmission
US10868887B2 (en)2019-02-082020-12-15Palantir Technologies Inc.Systems and methods for isolating applications associated with multiple tenants within a computing platform
US11539531B2 (en)*2019-02-242022-12-27Ondefend Holdings, LlcSystem and apparatus for providing authenticable electronic communication
US10986150B2 (en)2019-03-012021-04-20Netskope, Inc.Load balancing in a dynamic scalable services mesh
US11258811B2 (en)2019-03-252022-02-22Saudi Arabian Oil CompanyEmail attack detection and forensics
US20240214341A1 (en)*2019-04-172024-06-27Click Therapeutics, Inc.Messaging selection systems in networked environments
US11310268B2 (en)2019-05-062022-04-19Secureworks Corp.Systems and methods using computer vision and machine learning for detection of malicious actions
US11418524B2 (en)2019-05-072022-08-16SecureworksCorp.Systems and methods of hierarchical behavior activity modeling and detection for systems-level security
US11258806B1 (en)2019-06-242022-02-22Mandiant, Inc.System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en)2019-06-272023-01-17Mandiant, Inc.Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en)2019-06-282022-07-19Fireeye Security Holdings Us LlcSystem and method for supporting cross-platform data verification
US11704441B2 (en)2019-09-032023-07-18Palantir Technologies Inc.Charter-based access controls for managing computer resources
EP3796165A1 (en)2019-09-182021-03-24Palantir Technologies Inc.Systems and methods for autoscaling instance groups of computing platforms
US11886585B1 (en)2019-09-272024-01-30Musarubra Us LlcSystem and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en)2019-09-302023-04-25Mandiant, Inc.System and method for surfacing cyber-security threats with a self-learning recommendation engine
US11381589B2 (en)2019-10-112022-07-05Secureworks Corp.Systems and methods for distributed extended common vulnerabilities and exposures data management
US11522877B2 (en)2019-12-162022-12-06Secureworks Corp.Systems and methods for identifying malicious actors or activities
US11418542B2 (en)2020-01-232022-08-16Forcepoint LlcIdentification of unknown traffic based on transport layer security extensions
US11316823B2 (en)2020-08-272022-04-26Centripetal Networks, Inc.Methods and systems for efficient virtualization of inline transparent computer networking devices
US11588834B2 (en)2020-09-032023-02-21Secureworks Corp.Systems and methods for identifying attack patterns or suspicious activity in client networks
US11362996B2 (en)2020-10-272022-06-14Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US11316741B1 (en)2020-11-232022-04-26Netskope, Inc.Multi-environment networking management system
WO2022115508A1 (en)*2020-11-242022-06-02Vinod KhoslaMethods for managing spam communication and devices thereof
US11528294B2 (en)2021-02-182022-12-13SecureworksCorp.Systems and methods for automated threat detection
US11222112B1 (en)2021-02-242022-01-11Netskope, Inc.Signatureless detection of malicious MS office documents containing advanced threats in macros
US11336698B1 (en)2021-04-222022-05-17Netskope, Inc.Synthetic request injection for cloud policy enforcement
US11997127B2 (en)2021-05-072024-05-28Netskope, Inc.Policy based vulnerability identification, correlation, remediation, and mitigation
US11671430B2 (en)2021-05-262023-06-06Netskope, Inc.Secure communication session using encryption protocols and digitally segregated secure tunnels
US11475158B1 (en)2021-07-262022-10-18Netskope, Inc.Customized deep learning classifier for detecting organization sensitive data in images on premises
US11392705B1 (en)2021-07-292022-07-19Netskope, Inc.Disk encryption key management for booting of a device
US12135789B2 (en)2021-08-042024-11-05Secureworks Corp.Systems and methods of attack type and likelihood prediction
US12034751B2 (en)2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US11528279B1 (en)2021-11-122022-12-13Netskope, Inc.Automatic user directory synchronization and troubleshooting
US11553008B1 (en)2021-12-302023-01-10Netskope, Inc.Electronic agent scribe and communication protections
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US12423170B2 (en)2022-01-192025-09-23Secureworks Corp.Systems and methods for generating a system log parser
ES2993418T3 (en)2022-03-252024-12-30Zoe Life Tech AgMethod and network component for protecting networked infrastructures
US12204870B2 (en)2022-03-312025-01-21Sophos LimitedNatural language analysis of a command line using a machine learning model to generate a natural language description of the command line
US12265526B2 (en)2022-03-312025-04-01Sophos LimitedMethods and apparatus for natural language interface for constructing complex database queries
US12130923B2 (en)2022-03-312024-10-29Sophos LimitedMethods and apparatus for augmenting training data using large language models
US12003666B2 (en)*2022-06-232024-06-04Zoom Video Communications, Inc.Blocking unwanted communications over telephony and messaging services
US12160542B2 (en)*2022-06-232024-12-03Zoom Video Communications, Inc.Blocking unwanted communications via text modalities
US12015623B2 (en)2022-06-242024-06-18Secureworks Corp.Systems and methods for consensus driven threat intelligence
US20240089284A1 (en)*2022-09-122024-03-14Battle Energy Alliance, LLC.Cyber resilient trade-off evaluation systems for operational technology environments, including related methods and computer readable media
US12166782B2 (en)2022-12-052024-12-10Netskope, Inc.Policy-based IP address allocation
US11847486B1 (en)2023-01-312023-12-19Netskope, Inc.Capacity resolver for point of presence (POP) systems
US12399759B2 (en)*2023-05-182025-08-26Wells Fargo Bank, N.A.Data enhancements for remote procedure call frameworks
US12243294B1 (en)2023-08-162025-03-04Netskope, Inc.Image fingerprinting conversion between different image fingerprinting models
US12315231B2 (en)2023-08-162025-05-27Netskope, Inc.Image classification and accelerated classification training using deep learning image fingerprinting models and indexed embeddings
US12238177B1 (en)2024-01-262025-02-25Netskope, Inc.Mid-link forensic system for remote application environment
US12197590B1 (en)2024-01-292025-01-14Netskope, Inc.Hierarchical risk scoring for SaaS applications
US12316647B1 (en)2024-01-312025-05-27Netskope, Inc.Video data loss prevention (vDLP)
US12166776B1 (en)2024-01-312024-12-10Netskope, Inc.Middle-ware artificial intelligence (AI) engine
US12244637B1 (en)2024-02-092025-03-04Netskope, Inc.Machine learning powered cloud sandbox for malware detection
US12266209B1 (en)2024-02-262025-04-01Netskope, Inc.Image classifier automated testing and outlier detection
US20250310369A1 (en)*2024-03-282025-10-02Volvo Car CorporationThreat analysis and risk assessment system
US12255877B1 (en)2024-05-102025-03-18Netskope, Inc.Cloud packet tap
US12273392B1 (en)2024-05-212025-04-08Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a forward proxy
US12284222B1 (en)2024-05-212025-04-22Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a reverse proxy
US12278845B1 (en)2024-05-212025-04-15Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using API notifications
US12282545B1 (en)2024-05-212025-04-22Netskope, Inc.Efficient training data generation for training machine learning models for security and privacy inspection of bidirectional generative artificial intelligence traffic
US12245036B1 (en)2024-07-102025-03-04Netskope, Inc.Global secure SIM clientless SASE architecture for cellular devices
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12361680B1 (en)2024-08-152025-07-15Netskope, Inc.Webpage categorization based on image classification of webpage screen capture
US12367424B1 (en)*2024-08-282025-07-22Crowdstrike, Inc.Data prefiltering for large scale data classification

Citations (96)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US138416A (en)*1873-04-29Improvement in atomizer-bulbs
US4289930A (en)*1978-11-301981-09-15The General Electric Company LimitedElectronic apparatus for the display of information received over a line
US4384325A (en)*1980-06-231983-05-17Sperry CorporationApparatus and method for searching a data base using variable search criteria
US4386416A (en)*1980-06-021983-05-31Mostek CorporationData compression, encryption, and in-line transmission system
US4532588A (en)*1982-11-091985-07-30International Business Machines CorporationElectronic document distribution network with uniform data stream
US4713780A (en)*1985-04-151987-12-15Express Communications, Inc.Electronic mail
US4754428A (en)*1985-04-151988-06-28Express Communications, Inc.Apparatus and method of distributing documents to remote terminals with different formats
US4837798A (en)*1986-06-021989-06-06American Telephone And Telegraph CompanyCommunication system having unified messaging
US4853961A (en)*1987-12-181989-08-01Pitney Bowes Inc.Reliable document authentication system
US4864573A (en)*1986-09-251989-09-05Robert Bosch GmbhApparatus for reproducing a pcm modulated signal, comprising a muting circuit
US4951196A (en)*1988-05-041990-08-21Supply Tech, Inc.Method and apparatus for electronic data interchange
US4975950A (en)*1988-11-031990-12-04Lentz Stephen ASystem and method of protecting integrity of computer data and software
US4979210A (en)*1987-07-081990-12-18Matsushita Electric Industrial Co., Ltd.Method and apparatus for protection of signal copy
US5008814A (en)*1988-08-151991-04-16Network Equipment Technologies, Inc.Method and apparatus for updating system software for a plurality of data processing units in a communication network
US5020059A (en)*1989-03-311991-05-28At&T Bell LaboratoriesReconfigurable signal processor
US5051886A (en)*1987-06-151991-09-24Hitachi, Ltd.System for character stream search using finite state automaton technique
US5054096A (en)*1988-10-241991-10-01Empire Blue Cross/Blue ShieldMethod and apparatus for converting documents into electronic data for transaction processing
US5105184A (en)*1989-11-091992-04-14Noorali PiraniMethods for displaying and integrating commercial advertisements with computer software
US5119465A (en)*1989-06-191992-06-02Digital Equipment CorporationSystem for selectively converting plurality of source data structures through corresponding source intermediate structures, and target intermediate structures into selected target structure
US5144659A (en)*1989-04-191992-09-01Richard P. JonesComputer file protection system
US5144557A (en)*1990-08-131992-09-01International Business Machines CorporationMethod and system for document distribution by reference to a first group and particular document to a second group of user in a data processing system
US5144660A (en)*1988-08-311992-09-01Rose Anthony MSecuring a computer against undesired write operations to or read operations from a mass storage device
US5167011A (en)*1989-02-151992-11-24W. H. MorrisMethod for coodinating information storage and retrieval
US5210825A (en)*1990-04-261993-05-11Teknekron Communications Systems, Inc.Method and an apparatus for displaying graphical data received from a remote computer by a local computer
US5210824A (en)*1989-03-031993-05-11Xerox CorporationEncoding-format-desensitized methods and means for interchanging electronic document as appearances
US5235642A (en)*1992-07-211993-08-10Digital Equipment CorporationAccess control subsystem and method for distributed computer system using locally cached authentication credentials
US5239466A (en)*1990-10-041993-08-24Motorola, Inc.System for selectively routing and merging independent annotations to a document at remote locations
US5247661A (en)*1990-09-101993-09-21International Business Machines CorporationMethod and apparatus for automated document distribution in a data processing system
US5276869A (en)*1990-09-101994-01-04International Business Machines CorporationSystem for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5283887A (en)*1990-12-191994-02-01Bull Hn Information Systems Inc.Automatic document format conversion in an electronic mail system based upon user preference
US5293250A (en)*1991-03-141994-03-08Hitachi, Ltd.A system for notifying a destination terminal that electronic mail has reached a host computer
US5313521A (en)*1992-04-151994-05-17Fujitsu LimitedKey distribution protocol for file transfer in the local area network
US5319776A (en)*1990-04-191994-06-07Hilgraeve CorporationIn transit detection of computer virus with safeguard
US5355472A (en)*1990-04-101994-10-11International Business Machines CorporationSystem for substituting tags for non-editable data sets in hypertext documents and updating web files containing links between data sets corresponding to changes made to the tags
US5367621A (en)*1991-09-061994-11-22International Business Machines CorporationData processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated
US5696822A (en)*1995-09-281997-12-09Symantec CorporationPolymorphic virus detection module
US5826013A (en)*1995-09-281998-10-20Symantec CorporationPolymorphic virus detection module
US6006329A (en)*1997-08-111999-12-21Symantec CorporationDetection of computer viruses spanning multiple data streams
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6035423A (en)*1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6094731A (en)*1997-11-242000-07-25Symantec CorporationAntivirus accelerator for computer networks
US6161130A (en)*1998-06-232000-12-12Microsoft CorporationTechnique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set
US6199102B1 (en)*1997-08-262001-03-06Christopher Alan CobbMethod and system for filtering electronic messages
US6275942B1 (en)*1998-05-202001-08-14Network Associates, Inc.System, method and computer program product for automatic response to computer system misuse using active response modules
US20020035683A1 (en)*2000-09-072002-03-21Kaashoek Marinus FransArchitecture to thwart denial of service attacks
US6393465B2 (en)*1997-11-252002-05-21Nixmail CorporationJunk electronic mail detector and eliminator
US6442686B1 (en)*1998-07-022002-08-27Networks Associates Technology, Inc.System and methodology for messaging server-based management and enforcement of crypto policies
US20030023875A1 (en)*2001-07-262003-01-30Hursey Neil JohnDetecting e-mail propagated malware
US20030023692A1 (en)*2001-07-272003-01-30Fujitsu LimitedElectronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded
US20030051168A1 (en)*2001-08-102003-03-13King James E.Virus detection
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6539430B1 (en)*1997-03-252003-03-25Symantec CorporationSystem and method for filtering data received by a computer system
US6546493B1 (en)*2001-11-302003-04-08Networks Associates Technology, Inc.System, method and computer program product for risk assessment scanning based on detected anomalous events
US6546416B1 (en)*1998-12-092003-04-08Infoseek CorporationMethod and system for selectively blocking delivery of bulk electronic mail
US6550012B1 (en)*1998-12-112003-04-15Network Associates, Inc.Active firewall system and methodology
US20030088792A1 (en)*2001-04-132003-05-08Nokia, Inc.System and method for providing exploit protection with message tracking
US20030095555A1 (en)*2001-11-162003-05-22Mcnamara JustinSystem for the validation and routing of messages
US20030140137A1 (en)*2001-12-212003-07-24Networks Associates Technology, IncEnterprise Network analyzer architecture framework
US20030154399A1 (en)*2002-02-082003-08-14Nir ZukMulti-method gateway-based network security systems and methods
US20030158905A1 (en)*2002-02-192003-08-21Postini CorporationE-mail management services
US20030187996A1 (en)*2001-11-162003-10-02Cardina Donald M.Methods and systems for routing messages through a communications network based on message content
US20030212791A1 (en)*2002-04-232003-11-13Pickup Robert BarkleyMethod and system for authorising electronic mail
US6650890B1 (en)*2000-09-292003-11-18Postini, Inc.Value-added electronic messaging services and transparent implementation thereof using intermediate server
US6654787B1 (en)*1998-12-312003-11-25Brightmail, IncorporatedMethod and apparatus for filtering e-mail
US6675153B1 (en)*1999-07-062004-01-06Zix CorporationTransaction authorization system
US20040015554A1 (en)*2002-07-162004-01-22Brian WilsonActive e-mail filter with challenge-response
US6687687B1 (en)*2000-07-262004-02-03Zix Scm, Inc.Dynamic indexing information retrieval or filtering system
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US6711127B1 (en)*1998-07-312004-03-23General Dynamics Government Systems CorporationSystem for intrusion detection and vulnerability analysis in a telecommunications signaling network
US6725377B1 (en)*1999-03-122004-04-20Networks Associates Technology, Inc.Method and system for updating anti-intrusion software
US6732157B1 (en)*2002-12-132004-05-04Networks Associates Technology, Inc.Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
US6732101B1 (en)*2000-06-152004-05-04Zix CorporationSecure message forwarding system detecting user's preferences including security preferences
US20040088570A1 (en)*2001-12-212004-05-06Roberts Guy William WelchPredictive malware scanning of internet data
US6735703B1 (en)*2000-05-082004-05-11Networks Associates Technology, Inc.Multi-platform sequence-based anomaly detection wrapper
US6738462B1 (en)*2000-07-192004-05-18Avaya Technology Corp.Unified communications automated personal name addressing
US6742128B1 (en)*2002-08-282004-05-25Networks Associates TechnologyThreat assessment orchestrator system and method
US20040111531A1 (en)*2002-12-062004-06-10Stuart StanifordMethod and system for reducing the rate of infection of a communications network by a software worm
US6757830B1 (en)*2000-10-032004-06-29Networks Associates Technology, Inc.Detecting unwanted properties in received email messages
US20040139334A1 (en)*2001-01-132004-07-15Wiseman Simon RobertComputer system protection
US20040139160A1 (en)*2003-01-092004-07-15Microsoft CorporationFramework to enable integration of anti-spam technologies
US6768991B2 (en)*2001-05-152004-07-27Networks Associates Technology, Inc.Searching for sequences of character data
US6769016B2 (en)*2001-07-262004-07-27Networks Associates Technology, Inc.Intelligent SPAM detection system using an updateable neural analysis engine
US6792546B1 (en)*1999-01-152004-09-14Cisco Technology, Inc.Intrusion detection signature analysis using regular expressions and logical operators
US20040203589A1 (en)*2002-07-112004-10-14Wang Jiwei R.Method and system for controlling messages in a communication network
US6892237B1 (en)*2000-03-282005-05-10Cisco Technology, Inc.Method and apparatus for high-speed parsing of network messages
US6928556B2 (en)*2001-08-302005-08-09International Business Machines CorporationMethod and apparatus in a data processing system for managing situations from correlated events
US6941467B2 (en)*2002-03-082005-09-06Ciphertrust, Inc.Systems and methods for adaptive message interrogation through multiple queues
US7076527B2 (en)*2001-06-142006-07-11Apple Computer, Inc.Method and apparatus for filtering email
US7209954B1 (en)*2001-07-262007-04-24Mcafee, Inc.System and method for intelligent SPAM detection using statistical analysis
US7219131B2 (en)*2003-01-162007-05-15Ironport Systems, Inc.Electronic message delivery using an alternate source approach
US7254608B2 (en)*2002-10-312007-08-07Sun Microsystems, Inc.Managing distribution of content using mobile agents in peer-topeer networks
US20070203997A1 (en)*2003-06-122007-08-30Microsoft CorporationCategorizing electronic messages based on trust between electronic messaging entities
US7278159B2 (en)*2000-09-072007-10-02Mazu Networks, Inc.Coordinated thwarting of denial of service attacks

Family Cites Families (337)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB8825096D0 (en)*1988-10-261988-11-30W A Technology LtdCurrent amplifier
CA1321656C (en)1988-12-221993-08-24Chander KasirajMethod for restricting delivery and receipt of electronic message
GB8918553D0 (en)1989-08-151989-09-27Digital Equipment IntMessage control system
JPH03117940A (en)1989-09-251991-05-20Internatl Business Mach Corp <Ibm>Method of managing electronic mail
US5495610A (en)1989-11-301996-02-27Seer Technologies, Inc.Software distribution system to build and distribute a software release
US5187011A (en)*1989-12-041993-02-16Exxon Research And Engineering CompanyComposition comprising encapsulated substrate with thermoplastic polymer overcoating
US5822527A (en)1990-05-041998-10-13Digital Equipment CorporationMethod and apparatus for information stream filtration using tagged information access and action registration
JP3161725B2 (en)1990-11-212001-04-25株式会社日立製作所 Workstations and collaborative information processing systems
US5424724A (en)1991-03-271995-06-13International Business Machines CorporationMethod and apparatus for enhanced electronic mail distribution
US5513323A (en)1991-06-141996-04-30International Business Machines CorporationMethod and apparatus for multistage document format transformation in a data processing system
US5577209A (en)1991-07-111996-11-19Itt CorporationApparatus and method for providing multi-level security for communication among computers and terminals on a network
US5379340A (en)1991-08-021995-01-03Betterprize LimitedText communication system
US5485409A (en)1992-04-301996-01-16International Business Machines CorporationAutomated penetration analysis system and method
GB2271002B (en)1992-09-261995-12-06Digital Equipment IntData processing system
US5418908A (en)1992-10-151995-05-23International Business Machines CorporationSystem for automatically establishing a link between an electronic mail item and a remotely stored reference through a place mark inserted into the item
JP3553987B2 (en)1992-11-132004-08-11株式会社日立製作所 Client server system
US5675733A (en)1992-11-301997-10-07International Business Machines CorporationStatistical analysis and display of reception status of electronic messages
JPH08504326A (en)1992-12-151996-05-14コモンウェルス サイエンティフィック アンド インダストリアル リサーチ オーガナイゼーション DNA molecule encoding an inducible plant promoter and tomato ADH2 enzyme
US5544320A (en)1993-01-081996-08-06Konrad; Allan M.Remote information service access system based on a client-server-service model
US5406557A (en)1993-02-011995-04-11National Semiconductor CorporationInterenterprise electronic mail hub
US5479411A (en)1993-03-101995-12-26At&T Corp.Multi-media integrated message arrangement
US5404231A (en)1993-05-241995-04-04Audiofax, Inc.Sender-based facsimile store and forward facility
FR2706652B1 (en)*1993-06-091995-08-18Alsthom Cge Alcatel Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device.
JPH0764788A (en)1993-06-141995-03-10Mitsubishi Electric Corp Microcomputer
JPH0737087A (en)1993-07-191995-02-07Matsushita Electric Ind Co Ltd Image processing device
JPH0779298A (en)1993-09-081995-03-20Hitachi Ltd Facsimile server system
US5657461A (en)1993-10-041997-08-12Xerox CorporationUser interface for defining and automatically transmitting data according to preferred communication channels
US5513126A (en)1993-10-041996-04-30Xerox CorporationNetwork having selectively accessible recipient prioritized communication channel profiles
US5414833A (en)1993-10-271995-05-09International Business Machines CorporationNetwork security system and method using a parallel finite state machine adaptive active monitor and responder
US5605668A (en)1993-10-291997-02-25Queensland Nickel Pyt. Ltd.Solvent extraction of cobalt from cobalt sulfate solution
US5771354A (en)1993-11-041998-06-23Crawford; Christopher M.Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
US5606668A (en)1993-12-151997-02-25Checkpoint Software Technologies Ltd.System for securing inbound and outbound data packet flow in a computer network
US5509074A (en)1994-01-271996-04-16At&T Corp.Method of protecting electronically published materials using cryptographic protocols
US5557742A (en)1994-03-071996-09-17Haystack Labs, Inc.Method and system for detecting intrusion into and misuse of a data processing system
JP3222684B2 (en)1994-04-202001-10-29株式会社東芝 Semiconductor storage device
US5541993A (en)1994-05-101996-07-30Fan; EricStructure and method for secure image transmission
US5675507A (en)1995-04-281997-10-07Bobo, Ii; Charles R.Message storage and delivery system
US5511122A (en)1994-06-031996-04-23The United States Of America As Represented By The Secretary Of The NavyIntermediate network authentication
US5416842A (en)1994-06-101995-05-16Sun Microsystems, Inc.Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5535276A (en)1994-11-091996-07-09Bell Atlantic Network Services, Inc.Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5606666A (en)*1994-07-191997-02-25International Business Machines CorporationMethod and apparatus for distributing control messages between interconnected processing elements by mapping control messages of a shared memory addressable by the receiving processing element
US5481312A (en)1994-09-121996-01-02At&T Corp.Method of and apparatus for the transmission of high and low priority segments of a video bitstream over packet networks
US5740231A (en)1994-09-161998-04-14Octel Communications CorporationNetwork-based multimedia communications and directory system and method of operation
US5933478A (en)1994-09-281999-08-03Hitachi, Ltd.Data transfer system and handheld terminal device used therefor
US5805719A (en)1994-11-281998-09-08SmarttouchTokenless identification of individuals
US5758257A (en)1994-11-291998-05-26Herz; FrederickSystem and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5619648A (en)1994-11-301997-04-08Lucent Technologies Inc.Message filtering techniques
US5608874A (en)1994-12-021997-03-04Autoentry Online, Inc.System and method for automatic data file format translation and transmission having advanced features
US5550984A (en)1994-12-071996-08-27Matsushita Electric Corporation Of AmericaSecurity system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5530852A (en)1994-12-201996-06-25Sun Microsystems, Inc.Method for extracting profiles and topics from a first file written in a first markup language and generating files in different markup languages containing the profiles and topics for use in accessing data described by the profiles and topics
US5694616A (en)1994-12-301997-12-02International Business Machines CorporationMethod and system for prioritization of email items by selectively associating priority attribute with at least one and fewer than all of the recipients
US5638487A (en)1994-12-301997-06-10Purespeech, Inc.Automatic speech recognition
US5878230A (en)1995-01-051999-03-02International Business Machines CorporationSystem for email messages wherein the sender designates whether the recipient replies or forwards to addresses also designated by the sender
DE19505741A1 (en)*1995-02-201996-08-22Schaeffler Waelzlager Kg Arrangement to avoid starting noises with cam adjusters
US5710883A (en)1995-03-101998-01-20Stanford UniversityHypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
US5790793A (en)1995-04-041998-08-04Higley; ThomasMethod and system to create, transmit, receive and process information, including an address to further information
US5677955A (en)1995-04-071997-10-14Financial Services Technology ConsortiumElectronic funds transfer instruments
DE69628882T2 (en)1995-04-252004-05-27Canon K.K. Data transmission device and method
GB2316588B (en)1995-05-082000-05-31Compuserve IncRules based electronic message management system
JP3338585B2 (en)1995-05-162002-10-28富士通株式会社 Apparatus and method for converting presentation data
US5632011A (en)1995-05-221997-05-20Sterling Commerce, Inc.Electronic mail management system for operation on a host computer system
US5812776A (en)1995-06-071998-09-22Open Market, Inc.Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a redirect command by server
US5708780A (en)1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5742759A (en)1995-08-181998-04-21Sun Microsystems, Inc.Method and system for facilitating access control to system resources in a distributed computer system
EP0762337A3 (en)1995-09-082000-01-19Francotyp-Postalia Aktiengesellschaft & Co.Method and device for enhancing manipulation-proof of critical data
US5572643A (en)1995-10-191996-11-05Judson; David H.Web browser with dynamic display of information objects during linking
US5948062A (en)1995-10-271999-09-07Emc CorporationNetwork file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access
US5826029A (en)1995-10-311998-10-20International Business Machines CorporationSecured gateway interface
US5793763A (en)1995-11-031998-08-11Cisco Technology, Inc.Security system for network address translation systems
US5923846A (en)1995-11-061999-07-13Microsoft CorporationMethod of uploading a message containing a file reference to a server and downloading a file from the server using the file reference
US5764906A (en)1995-11-071998-06-09Netword LlcUniversal electronic resource denotation, request and delivery system
JPH09153050A (en)1995-11-291997-06-10Hitachi Ltd Document information collecting method and document information collecting device
US5937164A (en)1995-12-071999-08-10Hyperlock Technologies, Inc.Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media within a platform independent networking system
US5892825A (en)1996-05-151999-04-06Hyperlock Technologies IncMethod of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media
US5758343A (en)1995-12-081998-05-26Ncr CorporationApparatus and method for integrating multiple delegate directory service agents
US5745574A (en)1995-12-151998-04-28Entegrity Solutions CorporationSecurity infrastructure for electronic transactions
US5706442A (en)1995-12-201998-01-06Block Financial CorporationSystem for on-line financial services using distributed objects
US5903723A (en)1995-12-211999-05-11Intel CorporationMethod and apparatus for transmitting electronic mail attachments with attachment references
US5781901A (en)1995-12-211998-07-14Intel CorporationTransmitting electronic mail attachment over a network using a e-mail page
US5602918A (en)1995-12-221997-02-11Virtual Open Network Environment Corp.Application level security system and method
US5796951A (en)1995-12-221998-08-18Intel CorporationSystem for displaying information relating to a computer network including association devices with tasks performable on those devices
JP2000503154A (en)1996-01-112000-03-14エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5801700A (en)1996-01-191998-09-01Silicon Graphics IncorporatedSystem and method for an iconic drag and drop interface for electronic file transfer
US5826014A (en)1996-02-061998-10-20Network Engineering SoftwareFirewall system for protecting network elements connected to a public network
US5963915A (en)1996-02-211999-10-05Infoseek CorporationSecure, convenient and efficient system and method of performing trans-internet purchase transactions
US5751956A (en)1996-02-211998-05-12Infoseek CorporationMethod and apparatus for redirection of server external hyper-link references
US5855020A (en)1996-02-211998-12-29Infoseek CorporationWeb scan process
US5862325A (en)1996-02-291999-01-19Intermind CorporationComputer-based communication system and method using metadata defining a control structure
US5606874A (en)*1996-03-181997-03-04Kurt Gutmann Jewelry, Inc.Detachable jewelry ornamentation
US5673322A (en)1996-03-221997-09-30Bell Communications Research, Inc.System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US5850442A (en)1996-03-261998-12-15Entegrity Solutions CorporationSecure world wide electronic commerce over an open network
US5826022A (en)1996-04-051998-10-20Sun Microsystems, Inc.Method and apparatus for receiving electronic mail
US5727156A (en)1996-04-101998-03-10Hotoffice Technologies, Inc.Internet-based automatic publishing system
US5845084A (en)1996-04-181998-12-01Microsoft CorporationAutomatic data display formatting with a networking application
US5778372A (en)1996-04-181998-07-07Microsoft CorporationRemote retrieval and display management of electronic document with incorporated images
US5864852A (en)1996-04-261999-01-26Netscape Communications CorporationProxy server caching mechanism that provides a file directory structure and a mapping mechanism within the file directory structure
US5793972A (en)1996-05-031998-08-11Westminster International Computers Inc.System and method providing an interactive response to direct mail by creating personalized web page based on URL provided on mail piece
US5742769A (en)1996-05-061998-04-21Banyan Systems, Inc.Directory with options for access to and display of email addresses
US5884033A (en)1996-05-151999-03-16Spyglass, Inc.Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US5768528A (en)1996-05-241998-06-16V-Cast, Inc.Client-server system for delivery of online information
US5822526A (en)1996-06-031998-10-13Microsoft CorporationSystem and method for maintaining and administering email address names in a network
US5918013A (en)1996-06-031999-06-29Webtv Networks, Inc.Method of transcoding documents in a network environment using a proxy server
US5812398A (en)1996-06-101998-09-22Sun Microsystems, Inc.Method and system for escrowed backup of hotelled world wide web sites
US6108688A (en)1996-06-122000-08-22Sun Microsystems, Inc.System for reminding a sender of an email if recipient of the email does not respond by a selected time set by the sender
US6373950B1 (en)1996-06-172002-04-16Hewlett-Packard CompanySystem, method and article of manufacture for transmitting messages within messages utilizing an extensible, flexible architecture
US5781857A (en)1996-06-281998-07-14Motorola, Inc.Method of establishing an email monitor responsive to a wireless communications system user
US5790789A (en)1996-08-021998-08-04Suarez; LarryMethod and architecture for the creation, control and deployment of services within a distributed computer environment
US6072942A (en)1996-09-182000-06-06Secure Computing CorporationSystem and method of electronic mail filtering using interconnected nodes
JPH10111727A (en)1996-10-031998-04-28Toshiba Corp Information equipment having telephone function and method for realizing security of the information equipment
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6012144A (en)1996-10-082000-01-04Pickett; Thomas E.Transaction security method and apparatus
US5930479A (en)1996-10-211999-07-27At&T CorpCommunications addressing system
US6502191B1 (en)1997-02-142002-12-31Tumbleweed Communications Corp.Method and system for binary data firewall delivery
US6192407B1 (en)1996-10-242001-02-20Tumbleweed Communications Corp.Private, trackable URLs for directed document delivery
US6385655B1 (en)1996-10-242002-05-07Tumbleweed Communications Corp.Method and apparatus for delivering documents over an electronic network
US6119137A (en)1997-01-302000-09-12Tumbleweed Communications Corp.Distributed dynamic document conversion server
TW400487B (en)1996-10-242000-08-01Tumbleweed Software CorpElectronic document delivery system
US5790790A (en)1996-10-241998-08-04Tumbleweed Software CorporationElectronic document delivery system in which notification of said electronic document is sent to a recipient thereof
AU5094398A (en)1996-10-301998-05-22Theodor Holm NelsonMany-to-many payment system for network content materials
US6453345B2 (en)1996-11-062002-09-17Datadirect Networks, Inc.Network security and surveillance system
US6167520A (en)1996-11-082000-12-26Finjan Software, Inc.System and method for protecting a client during runtime from hostile downloadables
US5991881A (en)*1996-11-081999-11-23Harris CorporationNetwork surveillance system
US5796948A (en)1996-11-121998-08-18Cohen; Elliot D.Offensive message interceptor for computers
US5796942A (en)1996-11-211998-08-18Computer Associates International, Inc.Method and apparatus for automated network-wide surveillance and security breach intervention
JPH10164124A (en)1996-12-041998-06-19Canon Inc Communication device
US5968119A (en)1996-12-091999-10-19Wall Data IncorporatedMethod of accessing information of an SNA host computer from a client computer using a specific terminal emulation
US6285991B1 (en)1996-12-132001-09-04Visa International Service AssociationSecure interactive electronic account statement delivery system
JP2000507791A (en)1996-12-162000-06-20サムスン エレクトロニクス カンパニー リミテッド Method and apparatus for transmitting an e-mail message in a local network
US5911776A (en)1996-12-181999-06-15Unisys CorporationAutomatic format conversion system and publishing methodology for multi-user network
US6061722A (en)1996-12-232000-05-09T E Network, Inc.Assessing network performance without interference with normal network operations
US5898836A (en)1997-01-141999-04-27Netmind Services, Inc.Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures
US5978799A (en)1997-01-301999-11-02Hirsch; G. ScottSearch engine including query database, user profile database, information templates and email facility
US5896499A (en)1997-02-211999-04-20International Business Machines CorporationEmbedded security processor
TW396308B (en)1997-04-012000-07-01Tumbleweed Software CorpDocument delivery system
US6061448A (en)1997-04-012000-05-09Tumbleweed Communications Corp.Method and system for dynamic server document encryption
US6273590B1 (en)*1998-07-302001-08-14Stingray Lighting, Inc.Dual reflector lighting system
US6108786A (en)1997-04-252000-08-22Intel CorporationMonitor network bindings for computer security
US5958005A (en)1997-07-171999-09-28Bell Atlantic Network Services, Inc.Electronic mail security
US7127741B2 (en)1998-11-032006-10-24Tumbleweed Communications Corp.Method and system for e-mail message transmission
US7117358B2 (en)1997-07-242006-10-03Tumbleweed Communications Corp.Method and system for filtering communication
DE69841210D1 (en)1997-07-242009-11-12Axway Inc Email Firewall
US7162738B2 (en)1998-11-032007-01-09Tumbleweed Communications Corp.E-mail firewall with stored key encryption/decryption
US6119230A (en)1997-10-012000-09-12Novell, Inc.Distributed dynamic security capabilities
EP0907120A3 (en)1997-10-022004-03-24Tumbleweed Software CorporationMethod amd apparatus for delivering documents over an electronic network
US6393568B1 (en)1997-10-232002-05-21Entrust Technologies LimitedEncryption and decryption system and method with content analysis provision
US6003027A (en)1997-11-211999-12-14International Business Machines CorporationSystem and method for determining confidence levels for the results of a categorization system
US5860068A (en)1997-12-041999-01-12Petabyte CorporationMethod and system for custom manufacture and delivery of a data product
US6202157B1 (en)1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US6023723A (en)1997-12-222000-02-08Accepted Marketing, Inc.Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US6052709A (en)1997-12-232000-04-18Bright Light Technologies, Inc.Apparatus and method for controlling delivery of unsolicited electronic mail
US6279133B1 (en)*1997-12-312001-08-21Kawasaki Steel CorporationMethod and apparatus for significantly improving the reliability of multilevel memory architecture
US6088804A (en)1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US5999932A (en)1998-01-131999-12-07Bright Light Technologies, Inc.System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing
CA2228687A1 (en)1998-02-041999-08-04Brett HowardSecured virtual private networks
US6279113B1 (en)1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6092114A (en)1998-04-172000-07-18Siemens Information And Communication Networks, Inc.Method and system for determining the location for performing file-format conversions of electronics message attachments
US6145083A (en)1998-04-232000-11-07Siemens Information And Communication Networks, Inc.Methods and system for providing data and telephony security
US6104500A (en)1998-04-292000-08-15Bcl, Computer Inc.Networked fax routing via email
US6298445B1 (en)1998-04-302001-10-02Netect, Ltd.Computer security
JP3017712B2 (en)1998-05-152000-03-13松下電送システム株式会社 Internet facsimile
US6058482A (en)1998-05-222000-05-02Sun Microsystems, Inc.Apparatus, method and system for providing network security for executable code in computer and communications networks
US6330589B1 (en)1998-05-262001-12-11Microsoft CorporationSystem and method for using a client database to manage conversation threads generated from email or news messages
US6289214B1 (en)1998-05-292001-09-11Ericsson Inc.Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email
US6347374B1 (en)1998-06-052002-02-12Intrusion.Com, Inc.Event detection
AU4568299A (en)1998-06-152000-01-05Dmw Worldwide, Inc.Method and apparatus for assessing the security of a computer system
US6317829B1 (en)1998-06-192001-11-13Entrust Technologies LimitedPublic key cryptography based security system to facilitate secure roaming of users
US6185689B1 (en)1998-06-242001-02-06Richard S. Carson & Assoc., Inc.Method for network self security assessment
US6141778A (en)1998-06-292000-10-31Mci Communications CorporationMethod and apparatus for automating security functions in a computer system
US6324656B1 (en)*1998-06-302001-11-27Cisco Technology, Inc.System and method for rules-driven multi-phase network vulnerability assessment
US6269447B1 (en)1998-07-212001-07-31Raytheon CompanyInformation security analysis system
US6151675A (en)1998-07-232000-11-21Tumbleweed Software CorporationMethod and apparatus for effecting secure document format conversion
US6223213B1 (en)1998-07-312001-04-24Webtv Networks, Inc.Browser-based email system with user interface for audio/video capture
US6304973B1 (en)1998-08-062001-10-16Cryptek Secure Communications, LlcMulti-level security network system
US6442588B1 (en)1998-08-202002-08-27At&T Corp.Method of administering a dynamic filtering firewall
US6324569B1 (en)1998-09-232001-11-27John W. L. OgilvieSelf-removing email verified or designated as such by a message distributor for the convenience of a recipient
US6460141B1 (en)1998-10-282002-10-01Rsa Security Inc.Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
JP2000148276A (en)1998-11-052000-05-26Fujitsu Ltd Security monitoring device, security monitoring method, and security monitoring program recording medium
US6260043B1 (en)1998-11-062001-07-10Microsoft CorporationAutomatic file format converter
US6321338B1 (en)1998-11-092001-11-20Sri InternationalNetwork surveillance
US6249807B1 (en)1998-11-172001-06-19Kana Communications, Inc.Method and apparatus for performing enterprise email management
US6282565B1 (en)1998-11-172001-08-28Kana Communications, Inc.Method and apparatus for performing enterprise email management
US6272532B1 (en)1998-12-022001-08-07Harold F. FeinleibElectronic reminder system with universal email input
US6370648B1 (en)1998-12-082002-04-09Visa International Service AssociationComputer network intrusion detection
DE19857182A1 (en)*1998-12-112000-06-15Alcatel Sa Telecommunications network with virus protection in signaling channels
US6249575B1 (en)1998-12-112001-06-19Securelogix CorporationTelephony security system
US6574737B1 (en)1998-12-232003-06-03Symantec CorporationSystem for penetrating computer or computer network
US6118856A (en)1998-12-282000-09-12Nortel Networks CorporationMethod and apparatus for automatically forwarding an email message or portion thereof to a remote device
US6301668B1 (en)1998-12-292001-10-09Cisco Technology, Inc.Method and system for adaptive network security using network vulnerability assessment
WO2000042748A1 (en)1999-01-142000-07-20Tumbleweed Communications Corp.Web-based delivery of secure e-mail messages
US20010012286A1 (en)*1999-01-292001-08-09Emmanuel L. HunaMethod and apparatus for computer alert of device independent messages
JP2001028006A (en)*1999-07-152001-01-30Kdd Corp Automatic information filtering method and apparatus
US20030023695A1 (en)1999-02-262003-01-30Atabok Japan, Inc.Modifying an electronic mail system to produce a secure delivery system
US6405318B1 (en)1999-03-122002-06-11Psionic Software, Inc.Intrusion detection system
US6681331B1 (en)1999-05-112004-01-20Cylant, Inc.Dynamic software system intrusion detection
US6988199B2 (en)2000-07-072006-01-17Message SecureSecure and reliable document delivery
US6578025B1 (en)1999-06-112003-06-10Abuzz Technologies, Inc.Method and apparatus for distributing information to users
US6910135B1 (en)1999-07-072005-06-21Verizon Corporate Services Group Inc.Method and apparatus for an intruder detection reporting and response system
US6430604B1 (en)*1999-08-032002-08-06International Business Machines CorporationTechnique for enabling messaging systems to use alternative message delivery mechanisms
US6725381B1 (en)1999-08-312004-04-20Tumbleweed Communications Corp.Solicited authentication of a specific user
US6324647B1 (en)1999-08-312001-11-27Michel K. Bowman-AmuahSystem, method and article of manufacture for security management in a development architecture framework
US6304898B1 (en)1999-10-132001-10-16Datahouse, Inc.Method and system for creating and sending graphical email
US7363361B2 (en)2000-08-182008-04-22Akamai Technologies, Inc.Secure content delivery system
US6321267B1 (en)1999-11-232001-11-20Escom CorporationMethod and apparatus for filtering junk email
US6363489B1 (en)*1999-11-292002-03-26Forescout Technologies Inc.Method for automatic intrusion detection and deflection in a network
US6775657B1 (en)1999-12-222004-08-10Cisco Technology, Inc.Multilayered intrusion detection system and method
US6343290B1 (en)1999-12-222002-01-29Celeritas Technologies, L.L.C.Geographic network management system
AU2293601A (en)1999-12-302001-07-16Tumbleweed Communications Corp.Sender-controlled post delivery handling of digitally delivered documents
IL134066A (en)2000-01-162004-07-25Eluv Holdings LtdKey encrypted e-mail system
US20020016910A1 (en)2000-02-112002-02-07Wright Robert P.Method for secure distribution of documents over electronic networks
US7159237B2 (en)2000-03-162007-01-02Counterpane Internet Security, Inc.Method and system for dynamic network intrusion monitoring, detection and response
US6826609B1 (en)2000-03-312004-11-30Tumbleweed Communications Corp.Policy enforcement in a secure data file delivery system
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US7089428B2 (en)2000-04-282006-08-08Internet Security Systems, Inc.Method and system for managing computer security information
US6742124B1 (en)2000-05-082004-05-25Networks Associates Technology, Inc.Sequence-based anomaly detection using a distance matrix
AU2001263503A1 (en)2000-05-162001-11-26America Online, Inc.E-mail sender identification
CA2409106A1 (en)*2000-05-172001-11-22New York UniversityMethod and system for data classification in the presence of a temporal non-stationarity
US20030159070A1 (en)2001-05-282003-08-21Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
JP2002056176A (en)2000-06-012002-02-20Asgent Inc Security policy construction method and apparatus, and method and apparatus for supporting security policy construction
US6892178B1 (en)2000-06-022005-05-10Open Ratings Inc.Method and system for ascribing a reputation to an entity from the perspective of another entity
US6895385B1 (en)2000-06-022005-05-17Open RatingsMethod and system for ascribing a reputation to an entity as a rater of other entities
US6892179B1 (en)2000-06-022005-05-10Open Ratings Inc.System and method for ascribing a reputation to an entity
US20020023140A1 (en)2000-06-082002-02-21Hile John K.Electronic document delivery system
US20030061506A1 (en)2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US7328349B2 (en)2001-12-142008-02-05Bbn Technologies Corp.Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
US20020046041A1 (en)2000-06-232002-04-18Ken LangAutomated reputation/trust service
US7032031B2 (en)*2000-06-232006-04-18Cloudshield Technologies, Inc.Edge adapter apparatus and method
WO2002003653A2 (en)2000-06-302002-01-10British Telecommunications Public Limited CompanyPacket data communications
US8661539B2 (en)2000-07-102014-02-25Oracle International CorporationIntrusion threat detection
US6772196B1 (en)2000-07-272004-08-03Propel Software Corp.Electronic mail filtering system and methods
US6880156B1 (en)2000-07-272005-04-12Hewlett-Packard Development Company. L.P.Demand responsive method and apparatus to automatically activate spare servers
WO2002013489A2 (en)2000-08-082002-02-14Tumbleweed Communications Corp.Recipient-specified automated processing in a secure data file delivery system
AU2001281218A1 (en)2000-08-082002-02-18Tumbleweed Communications Corp.Recipient-specified automated processing in a secure data file delivery system
EP1312193A2 (en)2000-08-162003-05-21Filestream, Inc.End-to-end secure file transfer method and system
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US6968461B1 (en)*2000-10-032005-11-22Networks Associates Technology, Inc.Providing break points in a malware scanning operation
US20030097439A1 (en)2000-10-232003-05-22Strayer William TimothySystems and methods for identifying anomalies in network data streams
US20020078382A1 (en)2000-11-292002-06-20Ali SheikhScalable system for monitoring network system and components and methodology therefore
DE60124295T8 (en)2000-11-302007-12-06Lancope, Inc. RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK
CA2327211A1 (en)2000-12-012002-06-01Nortel Networks LimitedManagement of log archival and reporting for data network security systems
DE60112805T2 (en)*2000-12-192006-02-23Shell Internationale Research Maatschappij B.V. PROCESS FOR PRODUCTION OF SPINDLE OILS, LIGHT MACHINE OILS AND MIDDLE MACHINE OILS
MXPA03006024A (en)2001-01-022005-02-14Trusecure CorpObject-oriented method, system and medium for risk management by creating inter-dependency between objects, criteria and metrics.
US7168093B2 (en)2001-01-252007-01-23Solutionary, Inc.Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US7092992B1 (en)2001-02-012006-08-15Mailshell.Com, Inc.Web page filtering including substitution of user-entered email address
US6983380B2 (en)2001-02-062006-01-03Networks Associates Technology, Inc.Automatically generating valid behavior specifications for intrusion detection
US7281267B2 (en)2001-02-202007-10-09Mcafee, Inc.Software audit system
US20020120853A1 (en)2001-02-272002-08-29Networks Associates Technology, Inc.Scripted distributed denial-of-service (DDoS) attack discrimination using turing tests
US20020143963A1 (en)2001-03-152002-10-03International Business Machines CorporationWeb server intrusion detection method and apparatus
US7882555B2 (en)*2001-03-162011-02-01Kavado, Inc.Application layer security method and system
US7313822B2 (en)2001-03-162007-12-25Protegrity CorporationApplication-layer security method and system
US20020133365A1 (en)2001-03-192002-09-19William GreySystem and method for aggregating reputational information
US7287280B2 (en)2002-02-122007-10-23Goldman Sachs & Co.Automated security management
US20020138759A1 (en)2001-03-262002-09-26International Business Machines CorporationSystem and method for secure delivery of a parcel or document
US20020147734A1 (en)2001-04-062002-10-10Shoup Randall ScottArchiving method and system
CN1509438A (en)2001-04-132004-06-30��˹��ŵ��System and method for providing utilization protection for a network
US7603709B2 (en)2001-05-032009-10-13Computer Associates Think, Inc.Method and apparatus for predicting and preventing attacks in communications networks
US7769845B2 (en)2001-05-042010-08-03Whale Communications LtdMethod and system for terminating an authentication session upon user sign-off
US20030055931A1 (en)2001-09-182003-03-20Cravo De Almeida MarcioManaging a remote device
CA2386491A1 (en)2001-05-162002-11-16Kasten Chase Applied Research LimitedSystem for secure electronic information transmission
US7325252B2 (en)2001-05-182008-01-29Achilles Guard Inc.Network security testing
US20030028803A1 (en)2001-05-182003-02-06Bunker Nelson WaldoNetwork vulnerability assessment system and method
US20020178227A1 (en)2001-05-252002-11-28International Business Machines CorporationRouting instant messages using configurable, pluggable delivery managers
US7458094B2 (en)2001-06-062008-11-25Science Applications International CorporationIntrusion prevention system
US7350234B2 (en)2001-06-112008-03-25Research Triangle InstituteIntrusion tolerant communication networks and associated methods
US7254712B2 (en)*2001-06-122007-08-07Research In Motion LimitedSystem and method for compressing secure e-mail for exchange with a mobile data communication device
WO2002101516A2 (en)2001-06-132002-12-19Intruvert Networks, Inc.Method and apparatus for distributed network security
DE60135449D1 (en)2001-06-142008-10-02Ibm Intrusion detection in data processing systems
FR2826543B1 (en)*2001-06-222003-09-12Framatome Connectors Int PROCESS FOR MANUFACTURING LARGE SERIES OF PLATES FOR HOLDING CONNECTION PIN OF ELECTRICAL COMPONENTS
EP1271283B1 (en)2001-06-292007-05-23Stonesoft CorporationAn intrusion detection method and system
US20030005326A1 (en)2001-06-292003-01-02Todd FlemmingMethod and system for implementing a security application services provider
US7356689B2 (en)2001-07-092008-04-08Lucent Technologies Inc.Method and apparatus for tracing packets in a communications network
US6928549B2 (en)2001-07-092005-08-09International Business Machines CorporationDynamic intrusion detection for computer systems
US7380279B2 (en)2001-07-162008-05-27Lenel Systems International, Inc.System for integrating security and access for facilities and information systems
US6783791B2 (en)*2001-08-012004-08-31The Procter & Gamble Co.Coffee compositions comprising processed coffee grounds
US7243374B2 (en)2001-08-082007-07-10Microsoft CorporationRapid application security threat analysis
US7657935B2 (en)2001-08-162010-02-02The Trustees Of Columbia University In The City Of New YorkSystem and methods for detecting malicious email transmission
US7278160B2 (en)2001-08-162007-10-02International Business Machines CorporationPresentation of correlated events as situation classes
US20030051163A1 (en)2001-09-132003-03-13Olivier BidaudDistributed network architecture security system
US7100208B2 (en)*2001-09-252006-08-29Siemens Communications, Inc.Method and apparatus for source-based message authorization and rejection
US20030065943A1 (en)2001-09-282003-04-03Christoph GeisMethod and apparatus for recognizing and reacting to denial of service attacks on a computerized network
US6907430B2 (en)2001-10-042005-06-14Booz-Allen Hamilton, Inc.Method and system for assessing attacks on computer networks using Bayesian networks
US8261059B2 (en)2001-10-252012-09-04Verizon Business Global LlcSecure file transfer and secure file transfer protocol
US7444679B2 (en)2001-10-312008-10-28Hewlett-Packard Development Company, L.P.Network, method and computer readable medium for distributing security updates to select nodes on a network
US20030135749A1 (en)2001-10-312003-07-17Gales George S.System and method of defining the security vulnerabilities of a computer system
US20030084323A1 (en)2001-10-312003-05-01Gales George S.Network intrusion detection system and method
JP2003150748A (en)2001-11-092003-05-23Asgent Inc Risk assessment method
US20030093695A1 (en)2001-11-132003-05-15Santanu DuttaSecure handling of stored-value data objects
US7315944B2 (en)2001-11-132008-01-01Ericsson Inc.Secure handling of stored-value data objects
US20030126464A1 (en)2001-12-042003-07-03Mcdaniel Patrick D.Method and system for determining and enforcing security policy in a communication session
US20030110392A1 (en)2001-12-062003-06-12Aucsmith David W.Detecting intrusions
KR100427449B1 (en)2001-12-142004-04-14한국전자통신연구원Intrusion detection method using adaptive rule estimation in nids
US7400729B2 (en)2001-12-282008-07-15Intel CorporationSecure delivery of encrypted digital content
CA2472268A1 (en)2001-12-312003-07-17Citadel Security Software Inc.Automated computer vulnerability resolution system
JP4152108B2 (en)2002-01-182008-09-17株式会社コムスクエア Vulnerability monitoring method and system
US7222366B2 (en)2002-01-282007-05-22International Business Machines CorporationIntrusion event filtering
US7076803B2 (en)2002-01-282006-07-11International Business Machines CorporationIntegrated intrusion detection services
US7268899B2 (en)2002-01-312007-09-11Hewlett-Packard Development Company, L.P.Secure system for delivery of a fax to a remote user
US20030149887A1 (en)2002-02-012003-08-07Satyendra YadavApplication-specific network intrusion detection
US7174566B2 (en)2002-02-012007-02-06Intel CorporationIntegrated network intrusion detection
US7073074B2 (en)2002-02-132006-07-04Microsoft CorporationSystem and method for storing events to enhance intrusion detection
KR100468232B1 (en)2002-02-192005-01-26한국전자통신연구원Network-based Attack Tracing System and Method Using Distributed Agent and Manager Systems
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US7096498B2 (en)2002-03-082006-08-22Cipher Trust, Inc.Systems and methods for message threat management
US7694128B2 (en)2002-03-082010-04-06Mcafee, Inc.Systems and methods for secure communication delivery
US20060015942A1 (en)2002-03-082006-01-19Ciphertrust, Inc.Systems and methods for classification of messaging entities
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US7458098B2 (en)2002-03-082008-11-25Secure Computing CorporationSystems and methods for enhancing electronic communication security
US20030233328A1 (en)2002-04-232003-12-18Scott David A.Method and system for securely communicating data in a communications network
JP3831696B2 (en)2002-09-202006-10-11株式会社日立製作所 Network management apparatus and network management method
US7200658B2 (en)2002-11-122007-04-03Movielink, LlcNetwork geo-location system
US7467206B2 (en)2002-12-232008-12-16Microsoft CorporationReputation system for web services
US20040128355A1 (en)*2002-12-252004-07-01Kuo-Jen ChaoCommunity-based message classification and self-amending system for a messaging system
US8266215B2 (en)2003-02-202012-09-11Sonicwall, Inc.Using distinguishing properties to classify messages
WO2004081734A2 (en)2003-03-072004-09-23Propel Software CorporationMethod for filtering e-mail messages
US20040177120A1 (en)2003-03-072004-09-09Kirsch Steven T.Method for filtering e-mail messages
US7676546B2 (en)2003-03-252010-03-09Verisign, Inc.Control and management of electronic messaging
GB0307913D0 (en)*2003-04-052003-05-14Hewlett Packard Development CoManagement of peer-to-peer network using reputation services
US7051077B2 (en)2003-06-302006-05-23Mx Logic, Inc.Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US7769594B2 (en)2003-09-052010-08-03France TelecomEvaluation of reputation of an entity by a primary evaluation centre
US20050102366A1 (en)2003-11-072005-05-12Kirsch Steven T.E-mail filter employing adaptive ruleset
US7644127B2 (en)2004-03-092010-01-05Gozoom.Com, Inc.Email analysis using fuzzy matching of text
US8918466B2 (en)2004-03-092014-12-23Tonny YuSystem for email processing and analysis
JP4829223B2 (en)2004-05-252011-12-07グーグル インコーポレイテッド Electronic message source reputation information system
KR100628623B1 (en)2004-08-022006-09-26포스데이타 주식회사 Spam mail blocking system and method for real time spam mail recognition and blocking
US7660865B2 (en)2004-08-122010-02-09Microsoft CorporationSpam filtering with probabilistic secure hashes
US7933985B2 (en)*2004-08-132011-04-26Sipera Systems, Inc.System and method for detecting and preventing denial of service attacks in a communications system
US8010460B2 (en)2004-09-022011-08-30Linkedin CorporationMethod and system for reputation evaluation of online users in a social networking scheme
US20060095404A1 (en)2004-10-292006-05-04The Go Daddy Group, IncPresenting search engine results based on domain name related reputation
US20060123083A1 (en)2004-12-032006-06-08Xerox CorporationAdaptive spam message detector
US7610344B2 (en)2004-12-132009-10-27Microsoft CorporationSender reputations for spam prevention
US20060230039A1 (en)*2005-01-252006-10-12Markmonitor, Inc.Online identity tracking
CA2600344A1 (en)*2005-03-022006-09-08Markmonitor Inc.Distribution of trust data
US7822620B2 (en)2005-05-032010-10-26Mcafee, Inc.Determining website reputations using automatic testing
US20060277259A1 (en)2005-06-072006-12-07Microsoft CorporationDistributed sender reputations
JP2006350870A (en)2005-06-172006-12-28Nippon Telegr & Teleph Corp <Ntt> Reputation information creation method, reputation information management device, reception device, communication system, reputation information management program
KR100651841B1 (en)2005-07-192006-12-01엘지전자 주식회사 Blocking method
US20080005223A1 (en)2006-06-282008-01-03Microsoft CorporationReputation data for entities and data processing
US20090125980A1 (en)2007-11-092009-05-14Secure Computing CorporationNetwork rating

Patent Citations (100)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US138416A (en)*1873-04-29Improvement in atomizer-bulbs
US4289930A (en)*1978-11-301981-09-15The General Electric Company LimitedElectronic apparatus for the display of information received over a line
US4386416A (en)*1980-06-021983-05-31Mostek CorporationData compression, encryption, and in-line transmission system
US4384325A (en)*1980-06-231983-05-17Sperry CorporationApparatus and method for searching a data base using variable search criteria
US4532588A (en)*1982-11-091985-07-30International Business Machines CorporationElectronic document distribution network with uniform data stream
US4754428A (en)*1985-04-151988-06-28Express Communications, Inc.Apparatus and method of distributing documents to remote terminals with different formats
US4713780A (en)*1985-04-151987-12-15Express Communications, Inc.Electronic mail
US4837798A (en)*1986-06-021989-06-06American Telephone And Telegraph CompanyCommunication system having unified messaging
US4864573A (en)*1986-09-251989-09-05Robert Bosch GmbhApparatus for reproducing a pcm modulated signal, comprising a muting circuit
US5051886A (en)*1987-06-151991-09-24Hitachi, Ltd.System for character stream search using finite state automaton technique
US4979210A (en)*1987-07-081990-12-18Matsushita Electric Industrial Co., Ltd.Method and apparatus for protection of signal copy
US4853961A (en)*1987-12-181989-08-01Pitney Bowes Inc.Reliable document authentication system
US4951196A (en)*1988-05-041990-08-21Supply Tech, Inc.Method and apparatus for electronic data interchange
US5008814A (en)*1988-08-151991-04-16Network Equipment Technologies, Inc.Method and apparatus for updating system software for a plurality of data processing units in a communication network
US5144660A (en)*1988-08-311992-09-01Rose Anthony MSecuring a computer against undesired write operations to or read operations from a mass storage device
US5054096A (en)*1988-10-241991-10-01Empire Blue Cross/Blue ShieldMethod and apparatus for converting documents into electronic data for transaction processing
US4975950A (en)*1988-11-031990-12-04Lentz Stephen ASystem and method of protecting integrity of computer data and software
US5167011A (en)*1989-02-151992-11-24W. H. MorrisMethod for coodinating information storage and retrieval
US5210824A (en)*1989-03-031993-05-11Xerox CorporationEncoding-format-desensitized methods and means for interchanging electronic document as appearances
US5020059A (en)*1989-03-311991-05-28At&T Bell LaboratoriesReconfigurable signal processor
US5144659A (en)*1989-04-191992-09-01Richard P. JonesComputer file protection system
US5119465A (en)*1989-06-191992-06-02Digital Equipment CorporationSystem for selectively converting plurality of source data structures through corresponding source intermediate structures, and target intermediate structures into selected target structure
US5105184B1 (en)*1989-11-091997-06-17Noorali PiraniMethods for displaying and integrating commercial advertisements with computer software
US5105184A (en)*1989-11-091992-04-14Noorali PiraniMethods for displaying and integrating commercial advertisements with computer software
US5355472A (en)*1990-04-101994-10-11International Business Machines CorporationSystem for substituting tags for non-editable data sets in hypertext documents and updating web files containing links between data sets corresponding to changes made to the tags
US5319776A (en)*1990-04-191994-06-07Hilgraeve CorporationIn transit detection of computer virus with safeguard
US5210825A (en)*1990-04-261993-05-11Teknekron Communications Systems, Inc.Method and an apparatus for displaying graphical data received from a remote computer by a local computer
US5144557A (en)*1990-08-131992-09-01International Business Machines CorporationMethod and system for document distribution by reference to a first group and particular document to a second group of user in a data processing system
US5276869A (en)*1990-09-101994-01-04International Business Machines CorporationSystem for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document
US5247661A (en)*1990-09-101993-09-21International Business Machines CorporationMethod and apparatus for automated document distribution in a data processing system
US5239466A (en)*1990-10-041993-08-24Motorola, Inc.System for selectively routing and merging independent annotations to a document at remote locations
US5283887A (en)*1990-12-191994-02-01Bull Hn Information Systems Inc.Automatic document format conversion in an electronic mail system based upon user preference
US5293250A (en)*1991-03-141994-03-08Hitachi, Ltd.A system for notifying a destination terminal that electronic mail has reached a host computer
US5367621A (en)*1991-09-061994-11-22International Business Machines CorporationData processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated
US5313521A (en)*1992-04-151994-05-17Fujitsu LimitedKey distribution protocol for file transfer in the local area network
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5235642A (en)*1992-07-211993-08-10Digital Equipment CorporationAccess control subsystem and method for distributed computer system using locally cached authentication credentials
US5696822A (en)*1995-09-281997-12-09Symantec CorporationPolymorphic virus detection module
US5826013A (en)*1995-09-281998-10-20Symantec CorporationPolymorphic virus detection module
US6539430B1 (en)*1997-03-252003-03-25Symantec CorporationSystem and method for filtering data received by a computer system
US6006329A (en)*1997-08-111999-12-21Symantec CorporationDetection of computer viruses spanning multiple data streams
US6199102B1 (en)*1997-08-262001-03-06Christopher Alan CobbMethod and system for filtering electronic messages
US6094731A (en)*1997-11-242000-07-25Symantec CorporationAntivirus accelerator for computer networks
US6393465B2 (en)*1997-11-252002-05-21Nixmail CorporationJunk electronic mail detector and eliminator
US6035423A (en)*1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6269456B1 (en)*1997-12-312001-07-31Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6275942B1 (en)*1998-05-202001-08-14Network Associates, Inc.System, method and computer program product for automatic response to computer system misuse using active response modules
US6161130A (en)*1998-06-232000-12-12Microsoft CorporationTechnique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set
US6442686B1 (en)*1998-07-022002-08-27Networks Associates Technology, Inc.System and methodology for messaging server-based management and enforcement of crypto policies
US6711127B1 (en)*1998-07-312004-03-23General Dynamics Government Systems CorporationSystem for intrusion detection and vulnerability analysis in a telecommunications signaling network
US6546416B1 (en)*1998-12-092003-04-08Infoseek CorporationMethod and system for selectively blocking delivery of bulk electronic mail
US6550012B1 (en)*1998-12-112003-04-15Network Associates, Inc.Active firewall system and methodology
US6654787B1 (en)*1998-12-312003-11-25Brightmail, IncorporatedMethod and apparatus for filtering e-mail
US6792546B1 (en)*1999-01-152004-09-14Cisco Technology, Inc.Intrusion detection signature analysis using regular expressions and logical operators
US6725377B1 (en)*1999-03-122004-04-20Networks Associates Technology, Inc.Method and system for updating anti-intrusion software
US6675153B1 (en)*1999-07-062004-01-06Zix CorporationTransaction authorization system
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US6892237B1 (en)*2000-03-282005-05-10Cisco Technology, Inc.Method and apparatus for high-speed parsing of network messages
US6735703B1 (en)*2000-05-082004-05-11Networks Associates Technology, Inc.Multi-platform sequence-based anomaly detection wrapper
US6732101B1 (en)*2000-06-152004-05-04Zix CorporationSecure message forwarding system detecting user's preferences including security preferences
US6738462B1 (en)*2000-07-192004-05-18Avaya Technology Corp.Unified communications automated personal name addressing
US6687687B1 (en)*2000-07-262004-02-03Zix Scm, Inc.Dynamic indexing information retrieval or filtering system
US7278159B2 (en)*2000-09-072007-10-02Mazu Networks, Inc.Coordinated thwarting of denial of service attacks
US20020035683A1 (en)*2000-09-072002-03-21Kaashoek Marinus FransArchitecture to thwart denial of service attacks
US20040058673A1 (en)*2000-09-292004-03-25Postini, Inc.Value-added electronic messaging services and transparent implementation thereof using intermediate server
US6650890B1 (en)*2000-09-292003-11-18Postini, Inc.Value-added electronic messaging services and transparent implementation thereof using intermediate server
US6757830B1 (en)*2000-10-032004-06-29Networks Associates Technology, Inc.Detecting unwanted properties in received email messages
US20040139334A1 (en)*2001-01-132004-07-15Wiseman Simon RobertComputer system protection
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20030088792A1 (en)*2001-04-132003-05-08Nokia, Inc.System and method for providing exploit protection with message tracking
US6768991B2 (en)*2001-05-152004-07-27Networks Associates Technology, Inc.Searching for sequences of character data
US7076527B2 (en)*2001-06-142006-07-11Apple Computer, Inc.Method and apparatus for filtering email
US6769016B2 (en)*2001-07-262004-07-27Networks Associates Technology, Inc.Intelligent SPAM detection system using an updateable neural analysis engine
US7209954B1 (en)*2001-07-262007-04-24Mcafee, Inc.System and method for intelligent SPAM detection using statistical analysis
US20030023875A1 (en)*2001-07-262003-01-30Hursey Neil JohnDetecting e-mail propagated malware
US20030023692A1 (en)*2001-07-272003-01-30Fujitsu LimitedElectronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded
US20030051168A1 (en)*2001-08-102003-03-13King James E.Virus detection
US6928556B2 (en)*2001-08-302005-08-09International Business Machines CorporationMethod and apparatus in a data processing system for managing situations from correlated events
US20030095555A1 (en)*2001-11-162003-05-22Mcnamara JustinSystem for the validation and routing of messages
US20030187996A1 (en)*2001-11-162003-10-02Cardina Donald M.Methods and systems for routing messages through a communications network based on message content
US6546493B1 (en)*2001-11-302003-04-08Networks Associates Technology, Inc.System, method and computer program product for risk assessment scanning based on detected anomalous events
US20030140137A1 (en)*2001-12-212003-07-24Networks Associates Technology, IncEnterprise Network analyzer architecture framework
US6754705B2 (en)*2001-12-212004-06-22Networks Associates Technology, Inc.Enterprise network analyzer architecture framework
US20040088570A1 (en)*2001-12-212004-05-06Roberts Guy William WelchPredictive malware scanning of internet data
US20030154399A1 (en)*2002-02-082003-08-14Nir ZukMulti-method gateway-based network security systems and methods
US20030158905A1 (en)*2002-02-192003-08-21Postini CorporationE-mail management services
US6941467B2 (en)*2002-03-082005-09-06Ciphertrust, Inc.Systems and methods for adaptive message interrogation through multiple queues
US20030212791A1 (en)*2002-04-232003-11-13Pickup Robert BarkleyMethod and system for authorising electronic mail
US20040203589A1 (en)*2002-07-112004-10-14Wang Jiwei R.Method and system for controlling messages in a communication network
US20040015554A1 (en)*2002-07-162004-01-22Brian WilsonActive e-mail filter with challenge-response
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US6742128B1 (en)*2002-08-282004-05-25Networks Associates TechnologyThreat assessment orchestrator system and method
US7254608B2 (en)*2002-10-312007-08-07Sun Microsystems, Inc.Managing distribution of content using mobile agents in peer-topeer networks
US20040111531A1 (en)*2002-12-062004-06-10Stuart StanifordMethod and system for reducing the rate of infection of a communications network by a software worm
US6732157B1 (en)*2002-12-132004-05-04Networks Associates Technology, Inc.Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
US20040139160A1 (en)*2003-01-092004-07-15Microsoft CorporationFramework to enable integration of anti-spam technologies
US7219131B2 (en)*2003-01-162007-05-15Ironport Systems, Inc.Electronic message delivery using an alternate source approach
US20070203997A1 (en)*2003-06-122007-08-30Microsoft CorporationCategorizing electronic messages based on trust between electronic messaging entities

Cited By (476)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9189621B2 (en)1996-11-082015-11-17Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9444844B2 (en)1996-11-082016-09-13Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9141786B2 (en)1996-11-082015-09-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US8272060B2 (en)2000-06-192012-09-18Stragent, LlcHash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
US8042181B2 (en)2002-03-082011-10-18Mcafee, Inc.Systems and methods for message threat management
US8069481B2 (en)2002-03-082011-11-29Mcafee, Inc.Systems and methods for message threat management
US7458098B2 (en)2002-03-082008-11-25Secure Computing CorporationSystems and methods for enhancing electronic communication security
US8549611B2 (en)2002-03-082013-10-01Mcafee, Inc.Systems and methods for classification of messaging entities
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US7089590B2 (en)2002-03-082006-08-08Ciphertrust, Inc.Systems and methods for adaptive message interrogation through multiple queues
US7096498B2 (en)2002-03-082006-08-22Cipher Trust, Inc.Systems and methods for message threat management
US8578480B2 (en)2002-03-082013-11-05Mcafee, Inc.Systems and methods for identifying potentially malicious messages
US7124438B2 (en)2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US8631495B2 (en)2002-03-082014-01-14Mcafee, Inc.Systems and methods for message threat management
US7779466B2 (en)2002-03-082010-08-17Mcafee, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US7870203B2 (en)2002-03-082011-01-11Mcafee, Inc.Methods and systems for exposing messaging reputation to an end user
US7213260B2 (en)2002-03-082007-05-01Secure Computing CorporationSystems and methods for upstream threat pushback
US6941467B2 (en)2002-03-082005-09-06Ciphertrust, Inc.Systems and methods for adaptive message interrogation through multiple queues
US7903549B2 (en)2002-03-082011-03-08Secure Computing CorporationContent-based policy compliance systems and methods
US7225466B2 (en)2002-03-082007-05-29Secure Computing CorporationSystems and methods for message threat management
US7694128B2 (en)2002-03-082010-04-06Mcafee, Inc.Systems and methods for secure communication delivery
US8132250B2 (en)2002-03-082012-03-06Mcafee, Inc.Message profiling systems and methods
US8042149B2 (en)2002-03-082011-10-18Mcafee, Inc.Systems and methods for message threat management
US7519994B2 (en)2002-03-082009-04-14Secure Computing CorporationSystems and methods for adaptive message interrogation through multiple queues
US7693947B2 (en)2002-03-082010-04-06Mcafee, Inc.Systems and methods for graphically displaying messaging traffic
US20030172301A1 (en)*2002-03-082003-09-11Paul JudgeSystems and methods for adaptive message interrogation through multiple queues
US7219131B2 (en)2003-01-162007-05-15Ironport Systems, Inc.Electronic message delivery using an alternate source approach
US20040199595A1 (en)*2003-01-162004-10-07Scott BanisterElectronic message delivery using a virtual gateway approach
US9037660B2 (en)2003-05-092015-05-19Google Inc.Managing electronic messages
US20080256212A1 (en)*2003-05-222008-10-16International Business Machines CorporationApparatus for Managing Email Messages
US7596607B2 (en)2003-05-222009-09-29International Business Machines CorporationApparatus for managing email messages
US7454467B2 (en)*2003-05-222008-11-18International Business Machines CorporationMethod for managing email messages
US20040258044A1 (en)*2003-05-222004-12-23International Business Machines CorporationMethod and apparatus for managing email messages
US9576271B2 (en)2003-06-242017-02-21Google Inc.System and method for community centric resource sharing based on a publishing subscription model
US8776210B2 (en)*2003-07-222014-07-08Sonicwall, Inc.Statistical message classifier
US10044656B2 (en)2003-07-222018-08-07Sonicwall Inc.Statistical message classifier
US9386046B2 (en)2003-07-222016-07-05Dell Software Inc.Statistical message classifier
US20120101967A1 (en)*2003-07-222012-04-26Sonicwall, Inc.Statistical message classifier
US20050080857A1 (en)*2003-10-092005-04-14Kirsch Steven T.Method and system for categorizing and processing e-mails
US20050144279A1 (en)*2003-12-312005-06-30Wexelblat David E.Transactional white-listing for electronic communications
US7222158B2 (en)*2003-12-312007-05-22Aol LlcThird party provided transactional white-listing for filtering electronic communications
US7653695B2 (en)2004-02-172010-01-26Ironport Systems, Inc.Collecting, aggregating, and managing information relating to electronic messages
US7895448B1 (en)*2004-02-182011-02-22Symantec CorporationRisk profiling
US20050204050A1 (en)*2004-03-102005-09-15Patrick TurleyMethod and system for controlling network access
US8543710B2 (en)*2004-03-102013-09-24Rpx CorporationMethod and system for controlling network access
US20050216587A1 (en)*2004-03-252005-09-29International Business Machines CorporationEstablishing trust in an email client
US8042182B2 (en)*2004-03-302011-10-18Telecom Italia S.P.A.Method and system for network intrusion detection, related network and computer program product
US20070214504A1 (en)*2004-03-302007-09-13Paolo Milani ComparettiMethod And System For Network Intrusion Detection, Related Network And Computer Program Product
US7870608B2 (en)2004-05-022011-01-11Markmonitor, Inc.Early detection and monitoring of online fraud
US20070294762A1 (en)*2004-05-022007-12-20Markmonitor, Inc.Enhanced responses to online fraud
US9684888B2 (en)2004-05-022017-06-20Camelot Uk Bidco LimitedOnline fraud solution
US9203648B2 (en)2004-05-022015-12-01Thomson Reuters Global ResourcesOnline fraud solution
US8769671B2 (en)2004-05-022014-07-01Markmonitor Inc.Online fraud solution
US9026507B2 (en)2004-05-022015-05-05Thomson Reuters Global ResourcesMethods and systems for analyzing data related to possible online fraud
US8041769B2 (en)2004-05-022011-10-18Markmonitor Inc.Generating phish messages
US9356947B2 (en)2004-05-022016-05-31Thomson Reuters Global ResourcesMethods and systems for analyzing data related to possible online fraud
US7913302B2 (en)*2004-05-022011-03-22Markmonitor, Inc.Advanced responses to online fraud
US7992204B2 (en)2004-05-022011-08-02Markmonitor, Inc.Enhanced responses to online fraud
US7756930B2 (en)2004-05-282010-07-13Ironport Systems, Inc.Techniques for determining the reputation of a message sender
WO2005119484A3 (en)*2004-05-292007-04-05Ironport Systems IncMethod and apparatus for managing connections and electronic messages
US7917588B2 (en)2004-05-292011-03-29Ironport Systems, Inc.Managing delivery of electronic messages using bounce profiles
US8166310B2 (en)2004-05-292012-04-24Ironport Systems, Inc.Method and apparatus for providing temporary access to a network device
US7873695B2 (en)2004-05-292011-01-18Ironport Systems, Inc.Managing connections and messages at a server by associating different actions for both different senders and different recipients
US20050265319A1 (en)*2004-05-292005-12-01Clegg Paul JMethod and apparatus for destination domain-based bounce profiles
US7870200B2 (en)2004-05-292011-01-11Ironport Systems, Inc.Monitoring the flow of messages received at a server
US7849142B2 (en)2004-05-292010-12-07Ironport Systems, Inc.Managing connections, messages, and directory harvest attacks at a server
US7941491B2 (en)2004-06-042011-05-10Messagemind, Inc.System and method for dynamic adaptive user-based prioritization and display of electronic messages
US20110178962A1 (en)*2004-06-042011-07-21Messagemind, Inc.System and method for dynamic adaptive user-based prioritization and display of electronic messages
US7748038B2 (en)2004-06-162010-06-29Ironport Systems, Inc.Method and apparatus for managing computer virus outbreaks
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US20060015941A1 (en)*2004-07-132006-01-19Mckenna John JMethods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
US8458793B2 (en)2004-07-132013-06-04International Business Machines CorporationMethods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
US8180834B2 (en)2004-10-072012-05-15Computer Associates Think, Inc.System, method, and computer program product for filtering messages and training a classification module
US8635690B2 (en)2004-11-052014-01-21Mcafee, Inc.Reputation based message processing
US7810158B2 (en)*2004-12-162010-10-05At&T Intellectual Property I, L.P.Methods and systems for deceptively trapping electronic worms
US20060137012A1 (en)*2004-12-162006-06-22Aaron Jeffrey AMethods and systems for deceptively trapping electronic worms
WO2006103843A1 (en)2005-03-282006-10-05Konami Digital Entertainment Co., Ltd.Message character string output system, control method thereof, and information storage medium
US8028028B2 (en)2005-03-282011-09-27Konami Digital Entertainment Co., Ltd.Message character string output system, control method thereof, and information storage medium
US20090271482A1 (en)*2005-03-282009-10-29Konami Digital Entertainment Co., Ltd.Message Character String Output System, Control Method Thereof, and Information Storage Medium
EP1865457A4 (en)*2005-03-282008-10-15Konami Digital EntertainmentMessage character string output system, control method thereof, and information storage medium
US7937480B2 (en)2005-06-022011-05-03Mcafee, Inc.Aggregation of reputation data
US20080126951A1 (en)*2005-06-032008-05-29C-Mail Corp.System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends
US8161122B2 (en)2005-06-032012-04-17Messagemind, Inc.System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends
US7636734B2 (en)*2005-06-232009-12-22Microsoft CorporationMethod for probabilistic analysis of most frequently occurring electronic message addresses within personal store (.PST) files to determine owner with confidence factor based on relative weight and set of user-specified factors
US20060294090A1 (en)*2005-06-232006-12-28Microsoft CorporationProbabilistic analysis of personal store (.PST) files to determine owner with confidence factor
US7895651B2 (en)2005-07-292011-02-22Bit 9, Inc.Content tracking in a network security system
US8984636B2 (en)2005-07-292015-03-17Bit9, Inc.Content extractor and analysis system
US8272058B2 (en)2005-07-292012-09-18Bit 9, Inc.Centralized timed analysis in a network security system
US20100142512A1 (en)*2005-08-102010-06-10Nokia Siemens Networks Gmbh & Co. KgMethod and arrangement for automatically updating a white list
WO2007017408A1 (en)*2005-08-102007-02-15Nokia Siemens Networks Gmbh & Co. KgMethod and system for the automatic update of a white list
US20070271220A1 (en)*2006-05-192007-11-22Chbag, Inc.System, method and apparatus for filtering web content
US10560494B2 (en)2006-06-302020-02-11Centurylink Intellectual Property LlcManaging voice over internet protocol (VoIP) communications
US8570872B2 (en)2006-06-302013-10-29Centurylink Intellectual Property LlcSystem and method for selecting network ingress and egress
US9094257B2 (en)2006-06-302015-07-28Centurylink Intellectual Property LlcSystem and method for selecting a content delivery network
US8717911B2 (en)2006-06-302014-05-06Centurylink Intellectual Property LlcSystem and method for collecting network performance information
US9118583B2 (en)2006-06-302015-08-25Centurylink Intellectual Property LlcSystem and method for re-routing calls
US9154634B2 (en)2006-06-302015-10-06Centurylink Intellectual Property LlcSystem and method for managing network communications
US9838440B2 (en)2006-06-302017-12-05Centurylink Intellectual Property LlcManaging voice over internet protocol (VoIP) communications
US8184549B2 (en)2006-06-302012-05-22Embarq Holdings Company, LLPSystem and method for selecting network egress
US8976665B2 (en)2006-06-302015-03-10Centurylink Intellectual Property LlcSystem and method for re-routing calls
US9054915B2 (en)2006-06-302015-06-09Centurylink Intellectual Property LlcSystem and method for adjusting CODEC speed in a transmission path during call set-up due to reduced transmission performance
US10230788B2 (en)2006-06-302019-03-12Centurylink Intellectual Property LlcSystem and method for selecting a content delivery network
US9749399B2 (en)2006-06-302017-08-29Centurylink Intellectual Property LlcSystem and method for selecting a content delivery network
US8000318B2 (en)2006-06-302011-08-16Embarq Holdings Company, LlcSystem and method for call routing based on transmission performance of a packet network
US7948909B2 (en)2006-06-302011-05-24Embarq Holdings Company, LlcSystem and method for resetting counters counting network performance information at network communications devices on a packet network
US8488447B2 (en)2006-06-302013-07-16Centurylink Intellectual Property LlcSystem and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US8477614B2 (en)2006-06-302013-07-02Centurylink Intellectual Property LlcSystem and method for routing calls if potential call paths are impaired or congested
US7765294B2 (en)2006-06-302010-07-27Embarq Holdings Company, LlcSystem and method for managing subscriber usage of a communications network
US9549004B2 (en)2006-06-302017-01-17Centurylink Intellectual Property LlcSystem and method for re-routing calls
US9225609B2 (en)2006-08-222015-12-29Centurylink Intellectual Property LlcSystem and method for remotely controlling network operators
US8619600B2 (en)2006-08-222013-12-31Centurylink Intellectual Property LlcSystem and method for establishing calls over a call path having best path metrics
US8238253B2 (en)2006-08-222012-08-07Embarq Holdings Company, LlcSystem and method for monitoring interlayer devices and optimizing network performance
US8224255B2 (en)2006-08-222012-07-17Embarq Holdings Company, LlcSystem and method for managing radio frequency windows
US8223654B2 (en)2006-08-222012-07-17Embarq Holdings Company, LlcApplication-specific integrated circuit for monitoring and optimizing interlayer network performance
US9832090B2 (en)2006-08-222017-11-28Centurylink Intellectual Property LlcSystem, method for compiling network performancing information for communications with customer premise equipment
US8274905B2 (en)2006-08-222012-09-25Embarq Holdings Company, LlcSystem and method for displaying a graph representative of network performance over a time period
US8125897B2 (en)2006-08-222012-02-28Embarq Holdings Company LpSystem and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8307065B2 (en)2006-08-222012-11-06Centurylink Intellectual Property LlcSystem and method for remotely controlling network operators
US8358580B2 (en)2006-08-222013-01-22Centurylink Intellectual Property LlcSystem and method for adjusting the window size of a TCP packet through network elements
US8374090B2 (en)2006-08-222013-02-12Centurylink Intellectual Property LlcSystem and method for routing data on a packet network
US8407765B2 (en)2006-08-222013-03-26Centurylink Intellectual Property LlcSystem and method for restricting access to network performance information tables
US9621361B2 (en)2006-08-222017-04-11Centurylink Intellectual Property LlcPin-hole firewall for communicating data packets on a packet network
US8223655B2 (en)2006-08-222012-07-17Embarq Holdings Company, LlcSystem and method for provisioning resources of a packet network based on collected network performance information
US8130793B2 (en)2006-08-222012-03-06Embarq Holdings Company, LlcSystem and method for enabling reciprocal billing for different types of communications over a packet network
US8472326B2 (en)2006-08-222013-06-25Centurylink Intellectual Property LlcSystem and method for monitoring interlayer devices and optimizing network performance
US8107366B2 (en)2006-08-222012-01-31Embarq Holdings Company, LPSystem and method for using centralized network performance tables to manage network communications
US9042370B2 (en)2006-08-222015-05-26Centurylink Intellectual Property LlcSystem and method for establishing calls over a call path having best path metrics
US8488495B2 (en)2006-08-222013-07-16Centurylink Intellectual Property LlcSystem and method for routing communications between packet networks based on real time pricing
US9602265B2 (en)2006-08-222017-03-21Centurylink Intellectual Property LlcSystem and method for handling communications requests
US8509082B2 (en)2006-08-222013-08-13Centurylink Intellectual Property LlcSystem and method for load balancing network resources using a connection admission control engine
US8102770B2 (en)2006-08-222012-01-24Embarq Holdings Company, LPSystem and method for monitoring and optimizing network performance with vector performance tables and engines
US9054986B2 (en)2006-08-222015-06-09Centurylink Intellectual Property LlcSystem and method for enabling communications over a number of packet networks
US10075351B2 (en)2006-08-222018-09-11Centurylink Intellectual Property LlcSystem and method for improving network performance
US8520603B2 (en)2006-08-222013-08-27Centurylink Intellectual Property LlcSystem and method for monitoring and optimizing network performance to a wireless device
US8228791B2 (en)2006-08-222012-07-24Embarq Holdings Company, LlcSystem and method for routing communications between packet networks based on intercarrier agreements
US8531954B2 (en)2006-08-222013-09-10Centurylink Intellectual Property LlcSystem and method for handling reservation requests with a connection admission control engine
US10469385B2 (en)2006-08-222019-11-05Centurylink Intellectual Property LlcSystem and method for improving network performance using a connection admission control engine
US8537695B2 (en)2006-08-222013-09-17Centurylink Intellectual Property LlcSystem and method for establishing a call being received by a trunk on a packet network
US8213366B2 (en)2006-08-222012-07-03Embarq Holdings Company, LlcSystem and method for monitoring and optimizing network performance to a wireless device
US9992348B2 (en)2006-08-222018-06-05Century Link Intellectual Property LLCSystem and method for establishing a call on a packet network
US8199653B2 (en)2006-08-222012-06-12Embarq Holdings Company, LlcSystem and method for communicating network performance information over a packet network
US8549405B2 (en)2006-08-222013-10-01Centurylink Intellectual Property LlcSystem and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US8098579B2 (en)2006-08-222012-01-17Embarq Holdings Company, LPSystem and method for adjusting the window size of a TCP packet through remote network elements
US8194555B2 (en)2006-08-222012-06-05Embarq Holdings Company, LlcSystem and method for using distributed network performance information tables to manage network communications
US9094261B2 (en)2006-08-222015-07-28Centurylink Intellectual Property LlcSystem and method for establishing a call being received by a trunk on a packet network
US9661514B2 (en)2006-08-222017-05-23Centurylink Intellectual Property LlcSystem and method for adjusting communication parameters
US9112734B2 (en)2006-08-222015-08-18Centurylink Intellectual Property LlcSystem and method for generating a graphical user interface representative of network performance
US9813320B2 (en)2006-08-222017-11-07Centurylink Intellectual Property LlcSystem and method for generating a graphical user interface representative of network performance
US8576722B2 (en)2006-08-222013-11-05Centurylink Intellectual Property LlcSystem and method for modifying connectivity fault management packets
US9479341B2 (en)2006-08-222016-10-25Centurylink Intellectual Property LlcSystem and method for initiating diagnostics on a packet network node
US9660917B2 (en)2006-08-222017-05-23Centurylink Intellectual Property LlcSystem and method for remotely controlling network operators
US7808918B2 (en)2006-08-222010-10-05Embarq Holdings Company, LlcSystem and method for dynamically shaping network traffic
US7843831B2 (en)2006-08-222010-11-30Embarq Holdings Company LlcSystem and method for routing data on a packet network
US7889660B2 (en)2006-08-222011-02-15Embarq Holdings Company, LlcSystem and method for synchronizing counters on an asynchronous packet communications network
US9712445B2 (en)2006-08-222017-07-18Centurylink Intellectual Property LlcSystem and method for routing data on a packet network
US9253661B2 (en)2006-08-222016-02-02Centurylink Intellectual Property LlcSystem and method for modifying connectivity fault management packets
US9806972B2 (en)2006-08-222017-10-31Centurylink Intellectual Property LlcSystem and method for monitoring and altering performance of a packet network
US8619596B2 (en)2006-08-222013-12-31Centurylink Intellectual Property LlcSystem and method for using centralized network performance tables to manage network communications
US9014204B2 (en)2006-08-222015-04-21Centurylink Intellectual Property LlcSystem and method for managing network communications
US8064391B2 (en)2006-08-222011-11-22Embarq Holdings Company, LlcSystem and method for monitoring and optimizing network performance to a wireless device
US8619820B2 (en)2006-08-222013-12-31Centurylink Intellectual Property LlcSystem and method for enabling communications over a number of packet networks
US9241277B2 (en)2006-08-222016-01-19Centurylink Intellectual Property LlcSystem and method for monitoring and optimizing network performance to a wireless device
US8811160B2 (en)2006-08-222014-08-19Centurylink Intellectual Property LlcSystem and method for routing data on a packet network
US8040811B2 (en)2006-08-222011-10-18Embarq Holdings Company, LlcSystem and method for collecting and managing network performance information
US9241271B2 (en)2006-08-222016-01-19Centurylink Intellectual Property LlcSystem and method for restricting access to network performance information
US9240906B2 (en)2006-08-222016-01-19Centurylink Intellectual Property LlcSystem and method for monitoring and altering performance of a packet network
US9225646B2 (en)2006-08-222015-12-29Centurylink Intellectual Property LlcSystem and method for improving network performance using a connection admission control engine
US8670313B2 (en)2006-08-222014-03-11Centurylink Intellectual Property LlcSystem and method for adjusting the window size of a TCP packet through network elements
US8144587B2 (en)2006-08-222012-03-27Embarq Holdings Company, LlcSystem and method for load balancing network resources using a connection admission control engine
US7940735B2 (en)2006-08-222011-05-10Embarq Holdings Company, LlcSystem and method for selecting an access point
US8687614B2 (en)2006-08-222014-04-01Centurylink Intellectual Property LlcSystem and method for adjusting radio frequency parameters
US8144586B2 (en)2006-08-222012-03-27Embarq Holdings Company, LlcSystem and method for controlling network bandwidth with a connection admission control engine
US9929923B2 (en)2006-08-222018-03-27Centurylink Intellectual Property LlcSystem and method for provisioning resources of a packet network based on collected network performance information
US10298476B2 (en)2006-08-222019-05-21Centurylink Intellectual Property LlcSystem and method for tracking application resource usage
US8743700B2 (en)2006-08-222014-06-03Centurylink Intellectual Property LlcSystem and method for provisioning resources of a packet network based on collected network performance information
US8743703B2 (en)2006-08-222014-06-03Centurylink Intellectual Property LlcSystem and method for tracking application resource usage
US8750158B2 (en)2006-08-222014-06-10Centurylink Intellectual Property LlcSystem and method for differentiated billing
US8015294B2 (en)2006-08-222011-09-06Embarq Holdings Company, LPPin-hole firewall for communicating data packets on a packet network
US8289965B2 (en)2006-10-192012-10-16Embarq Holdings Company, LlcSystem and method for establishing a communications session with an end-user based on the state of a network connection
US8194643B2 (en)2006-10-192012-06-05Embarq Holdings Company, LlcSystem and method for monitoring the connection of an end-user to a remote network
US9521150B2 (en)2006-10-252016-12-13Centurylink Intellectual Property LlcSystem and method for automatically regulating messages between networks
US8189468B2 (en)*2006-10-252012-05-29Embarq Holdings, Company, LLCSystem and method for regulating messages between networks
US8042161B1 (en)*2006-11-222011-10-18Symantec CorporationAutomatic sharing of whitelist data
US7949716B2 (en)2007-01-242011-05-24Mcafee, Inc.Correlation and analysis of entity attributes
US8179798B2 (en)2007-01-242012-05-15Mcafee, Inc.Reputation based connection throttling
US20120240228A1 (en)*2007-01-242012-09-20Mcafee, Inc.Multi-dimensional reputation scoring
US9009321B2 (en)*2007-01-242015-04-14Mcafee, Inc.Multi-dimensional reputation scoring
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US7779156B2 (en)2007-01-242010-08-17Mcafee, Inc.Reputation based load balancing
US8578051B2 (en)2007-01-242013-11-05Mcafee, Inc.Reputation based load balancing
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US8762537B2 (en)2007-01-242014-06-24Mcafee, Inc.Multi-dimensional reputation scoring
US9544272B2 (en)2007-01-242017-01-10Intel CorporationDetecting image spam
US10050917B2 (en)2007-01-242018-08-14Mcafee, LlcMulti-dimensional reputation scoring
US20080263664A1 (en)*2007-04-172008-10-23Mckenna John JMethod of integrating a security operations policy into a threat management vector
US8111692B2 (en)2007-05-312012-02-07Embarq Holdings Company LlcSystem and method for modifying network traffic
US9992303B2 (en)2007-06-292018-06-05Amazon Technologies, Inc.Request routing utilizing client location information
US9021127B2 (en)2007-06-292015-04-28Amazon Technologies, Inc.Updating routing information based on client location
US9021129B2 (en)2007-06-292015-04-28Amazon Technologies, Inc.Request routing utilizing client location information
US10027582B2 (en)2007-06-292018-07-17Amazon Technologies, Inc.Updating routing information based on client location
US8214895B2 (en)*2007-09-262012-07-03Microsoft CorporationWhitelist and blacklist identification data
US20090083852A1 (en)*2007-09-262009-03-26Microsoft CorporationWhitelist and Blacklist Identification Data
US8621559B2 (en)2007-11-062013-12-31Mcafee, Inc.Adjusting filter or classification control settings
US8185930B2 (en)2007-11-062012-05-22Mcafee, Inc.Adjusting filter or classification control settings
US8045458B2 (en)2007-11-082011-10-25Mcafee, Inc.Prioritizing network traffic
US8160975B2 (en)2008-01-252012-04-17Mcafee, Inc.Granular support vector machine with random granularity
US11451472B2 (en)2008-03-312022-09-20Amazon Technologies, Inc.Request routing based on class
US9894168B2 (en)2008-03-312018-02-13Amazon Technologies, Inc.Locality based content distribution
US11909639B2 (en)2008-03-312024-02-20Amazon Technologies, Inc.Request routing based on class
US9571389B2 (en)2008-03-312017-02-14Amazon Technologies, Inc.Request routing based on class
US10771552B2 (en)2008-03-312020-09-08Amazon Technologies, Inc.Content management
US10158729B2 (en)2008-03-312018-12-18Amazon Technologies, Inc.Locality based content distribution
US9026616B2 (en)2008-03-312015-05-05Amazon Technologies, Inc.Content delivery reconciliation
US9888089B2 (en)2008-03-312018-02-06Amazon Technologies, Inc.Client side cache management
US10797995B2 (en)2008-03-312020-10-06Amazon Technologies, Inc.Request routing based on class
US9544394B2 (en)2008-03-312017-01-10Amazon Technologies, Inc.Network resource identification
US9887915B2 (en)2008-03-312018-02-06Amazon Technologies, Inc.Request routing based on class
US10157135B2 (en)2008-03-312018-12-18Amazon Technologies, Inc.Cache optimization
US8930544B2 (en)2008-03-312015-01-06Amazon Technologies, Inc.Network resource identification
US8533293B1 (en)2008-03-312013-09-10Amazon Technologies, Inc.Client side cache management
US11194719B2 (en)2008-03-312021-12-07Amazon Technologies, Inc.Cache optimization
US9479476B2 (en)2008-03-312016-10-25Amazon Technologies, Inc.Processing of DNS queries
US10645149B2 (en)2008-03-312020-05-05Amazon Technologies, Inc.Content delivery reconciliation
US10305797B2 (en)2008-03-312019-05-28Amazon Technologies, Inc.Request routing based on class
US9621660B2 (en)2008-03-312017-04-11Amazon Technologies, Inc.Locality based content distribution
US10530874B2 (en)2008-03-312020-01-07Amazon Technologies, Inc.Locality based content distribution
US11245770B2 (en)2008-03-312022-02-08Amazon Technologies, Inc.Locality based content distribution
US8639817B2 (en)2008-03-312014-01-28Amazon Technologies, Inc.Content management
US9009286B2 (en)2008-03-312015-04-14Amazon Technologies, Inc.Locality based content distribution
US9407699B2 (en)2008-03-312016-08-02Amazon Technologies, Inc.Content management
US10511567B2 (en)2008-03-312019-12-17Amazon Technologies, Inc.Network resource identification
US9954934B2 (en)2008-03-312018-04-24Amazon Technologies, Inc.Content delivery reconciliation
US8601090B1 (en)2008-03-312013-12-03Amazon Technologies, Inc.Network resource identification
US9208097B2 (en)2008-03-312015-12-08Amazon Technologies, Inc.Cache optimization
US8756325B2 (en)2008-03-312014-06-17Amazon Technologies, Inc.Content management
US10554748B2 (en)2008-03-312020-02-04Amazon Technologies, Inc.Content management
US9210235B2 (en)2008-03-312015-12-08Amazon Technologies, Inc.Client side cache management
US9332078B2 (en)2008-03-312016-05-03Amazon Technologies, Inc.Locality based content distribution
US8713156B2 (en)2008-03-312014-04-29Amazon Technologies, Inc.Request routing based on class
US8606996B2 (en)2008-03-312013-12-10Amazon Technologies, Inc.Cache optimization
US8606910B2 (en)2008-04-042013-12-10Mcafee, Inc.Prioritizing network traffic
US8589503B2 (en)2008-04-042013-11-19Mcafee, Inc.Prioritizing network traffic
US8068425B2 (en)2008-04-092011-11-29Embarq Holdings Company, LlcSystem and method for using network performance information to determine improved measures of path states
US8879391B2 (en)2008-04-092014-11-04Centurylink Intellectual Property LlcSystem and method for using network derivations to determine path states
US20090288169A1 (en)*2008-05-162009-11-19Yellowpages.Com LlcSystems and Methods to Control Web Scraping
US9385928B2 (en)2008-05-162016-07-05Yellowpages.Com LlcSystems and methods to control web scraping
US8595847B2 (en)*2008-05-162013-11-26Yellowpages.Com LlcSystems and methods to control web scraping
US20100011071A1 (en)*2008-06-302010-01-14Elena ZhelevaSystems and methods for reporter-based filtering of electronic communications and messages
US8825769B2 (en)2008-06-302014-09-02Aol Inc.Systems and methods for reporter-based filtering of electronic communications and messages
US9021128B2 (en)2008-06-302015-04-28Amazon Technologies, Inc.Request routing using network computing components
US9608957B2 (en)2008-06-302017-03-28Amazon Technologies, Inc.Request routing using network computing components
US9485269B2 (en)2008-06-302016-11-01Aol Inc.Systems and methods for reporter-based filtering of electronic communications and messages
US9912740B2 (en)2008-06-302018-03-06Amazon Technologies, Inc.Latency measurement in resource requests
US9355245B2 (en)2008-06-302016-05-31Aol Inc.Systems and methods for reporter-based filtering of electronic communications and messages
WO2010002892A1 (en)*2008-06-302010-01-07Aol LlcSystems and methods for reporter-based filtering of electronic communications and messages
US9088460B2 (en)2008-09-292015-07-21Amazon Technologies, Inc.Managing resource consolidation configurations
US9160641B2 (en)2008-09-292015-10-13Amazon Technologies, Inc.Monitoring domain allocation performance
US9210099B2 (en)2008-09-292015-12-08Amazon Technologies, Inc.Optimizing resource configurations
US8549531B2 (en)2008-09-292013-10-01Amazon Technologies, Inc.Optimizing resource configurations
US8762526B2 (en)2008-09-292014-06-24Amazon Technologies, Inc.Optimizing content management
US10462025B2 (en)2008-09-292019-10-29Amazon Technologies, Inc.Monitoring performance and operation of data exchanges
US8843625B2 (en)2008-09-292014-09-23Amazon Technologies, Inc.Managing network data display
US9734472B2 (en)2008-11-172017-08-15Amazon Technologies, Inc.Request routing utilizing cost information
US11115500B2 (en)2008-11-172021-09-07Amazon Technologies, Inc.Request routing utilizing client location information
US9787599B2 (en)2008-11-172017-10-10Amazon Technologies, Inc.Managing content delivery network service providers
US9444759B2 (en)2008-11-172016-09-13Amazon Technologies, Inc.Service provider registration by a content broker
US9985927B2 (en)2008-11-172018-05-29Amazon Technologies, Inc.Managing content delivery network service providers by a content broker
US9451046B2 (en)2008-11-172016-09-20Amazon Technologies, Inc.Managing CDN registration by a storage provider
US9251112B2 (en)2008-11-172016-02-02Amazon Technologies, Inc.Managing content delivery network service providers
US8732309B1 (en)2008-11-172014-05-20Amazon Technologies, Inc.Request routing utilizing cost information
US8583776B2 (en)2008-11-172013-11-12Amazon Technologies, Inc.Managing content delivery network service providers
US11283715B2 (en)2008-11-172022-03-22Amazon Technologies, Inc.Updating routing information based on client location
US11811657B2 (en)2008-11-172023-11-07Amazon Technologies, Inc.Updating routing information based on client location
US10116584B2 (en)2008-11-172018-10-30Amazon Technologies, Inc.Managing content delivery network service providers
US9515949B2 (en)2008-11-172016-12-06Amazon Technologies, Inc.Managing content delivery network service providers
US8495220B2 (en)2008-11-172013-07-23Amazon Technologies, Inc.Managing CDN registration by a storage provider
US10523783B2 (en)2008-11-172019-12-31Amazon Technologies, Inc.Request routing utilizing client location information
US8521880B1 (en)2008-11-172013-08-27Amazon Technologies, Inc.Managing content delivery network service providers
US8788671B2 (en)2008-11-172014-07-22Amazon Technologies, Inc.Managing content delivery network service providers by a content broker
US9590946B2 (en)2008-11-172017-03-07Amazon Technologies, Inc.Managing content delivery network service providers
US10742550B2 (en)2008-11-172020-08-11Amazon Technologies, Inc.Updating routing information based on client location
US8510448B2 (en)2008-11-172013-08-13Amazon Technologies, Inc.Service provider registration by a content broker
US8667127B2 (en)2009-03-242014-03-04Amazon Technologies, Inc.Monitoring web site content
US20100250762A1 (en)*2009-03-252010-09-30The Quantum Group, Inc.Method and system for regulating entry of data into a protected system
US9258269B1 (en)*2009-03-252016-02-09Symantec CorporationMethods and systems for managing delivery of email to local recipients using local reputations
US9390133B2 (en)*2009-03-252016-07-12The Quantum Group, Inc.Method and system for regulating entry of data into a protected system
US9083675B2 (en)2009-03-272015-07-14Amazon Technologies, Inc.Translation of resource identifiers using popularity information upon client request
US10574787B2 (en)2009-03-272020-02-25Amazon Technologies, Inc.Translation of resource identifiers using popularity information upon client request
US10491534B2 (en)2009-03-272019-11-26Amazon Technologies, Inc.Managing resources and entries in tracking information in resource cache components
US8521885B1 (en)2009-03-272013-08-27Amazon Technologies, Inc.Dynamically translating resource identifiers for request routing using popularity information
US8521851B1 (en)2009-03-272013-08-27Amazon Technologies, Inc.DNS query processing using resource identifiers specifying an application broker
US8996664B2 (en)2009-03-272015-03-31Amazon Technologies, Inc.Translation of resource identifiers using popularity information upon client request
US8756341B1 (en)2009-03-272014-06-17Amazon Technologies, Inc.Request routing utilizing popularity information
US8688837B1 (en)2009-03-272014-04-01Amazon Technologies, Inc.Dynamically translating resource identifiers for request routing using popularity information
US9237114B2 (en)2009-03-272016-01-12Amazon Technologies, Inc.Managing resources in resource cache components
US10601767B2 (en)2009-03-272020-03-24Amazon Technologies, Inc.DNS query processing based on application information
US9191458B2 (en)2009-03-272015-11-17Amazon Technologies, Inc.Request routing using a popularity identifier at a DNS nameserver
US10264062B2 (en)2009-03-272019-04-16Amazon Technologies, Inc.Request routing using a popularity identifier to identify a cache component
US10230819B2 (en)2009-03-272019-03-12Amazon Technologies, Inc.Translation of resource identifiers using popularity information upon client request
US10521348B2 (en)2009-06-162019-12-31Amazon Technologies, Inc.Managing resources using resource expiration data
US9176894B2 (en)2009-06-162015-11-03Amazon Technologies, Inc.Managing resources using resource expiration data
US8782236B1 (en)2009-06-162014-07-15Amazon Technologies, Inc.Managing resources using resource expiration data
US10162753B2 (en)2009-06-162018-12-25Amazon Technologies, Inc.Managing resources using resource expiration data
US10783077B2 (en)2009-06-162020-09-22Amazon Technologies, Inc.Managing resources using resource expiration data
US8543702B1 (en)2009-06-162013-09-24Amazon Technologies, Inc.Managing resources using resource expiration data
US10785037B2 (en)2009-09-042020-09-22Amazon Technologies, Inc.Managing secure content in a content delivery network
US9130756B2 (en)2009-09-042015-09-08Amazon Technologies, Inc.Managing secure content in a content delivery network
US10135620B2 (en)2009-09-042018-11-20Amazon Technologis, Inc.Managing secure content in a content delivery network
US9712325B2 (en)2009-09-042017-07-18Amazon Technologies, Inc.Managing secure content in a content delivery network
US10218584B2 (en)2009-10-022019-02-26Amazon Technologies, Inc.Forward-based resource delivery network management techniques
US9893957B2 (en)2009-10-022018-02-13Amazon Technologies, Inc.Forward-based resource delivery network management techniques
US9246776B2 (en)2009-10-022016-01-26Amazon Technologies, Inc.Forward-based resource delivery network management techniques
US20110138002A1 (en)*2009-12-042011-06-09Electronic And Telecommunications Research InstituteInteractivity test apparatus and method for blocking ip application spam
US8971328B2 (en)2009-12-172015-03-03Amazon Technologies, Inc.Distributed routing architecture
US8902897B2 (en)2009-12-172014-12-02Amazon Technologies, Inc.Distributed routing architecture
US11205037B2 (en)2010-01-282021-12-21Amazon Technologies, Inc.Content distribution network
US9495338B1 (en)2010-01-282016-11-15Amazon Technologies, Inc.Content distribution network
US10506029B2 (en)2010-01-282019-12-10Amazon Technologies, Inc.Content distribution network
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US11341475B2 (en)2010-03-032022-05-24Cisco Technology, IncSystem and method of notifying mobile devices to complete transactions after additional agent verification
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11832099B2 (en)2010-03-032023-11-28Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US8621638B2 (en)2010-05-142013-12-31Mcafee, Inc.Systems and methods for classification of messaging entities
US10116623B2 (en)2010-06-252018-10-30Salesforce.Com, Inc.Methods and systems for providing a token-based application firewall correlation
US10091165B2 (en)*2010-06-252018-10-02Salesforce.Com, Inc.Methods and systems for providing context-based outbound processing application firewalls
US20160308830A1 (en)*2010-06-252016-10-20Salesforce.Com, Inc.Methods And Systems For Providing Context-Based Outbound Processing Application Firewalls
US9185012B2 (en)2010-09-282015-11-10Amazon Technologies, Inc.Latency measurement in resource requests
US11108729B2 (en)2010-09-282021-08-31Amazon Technologies, Inc.Managing request routing information utilizing client identifiers
US9497259B1 (en)2010-09-282016-11-15Amazon Technologies, Inc.Point of presence management in request routing
US8468247B1 (en)2010-09-282013-06-18Amazon Technologies, Inc.Point of presence management in request routing
US8577992B1 (en)2010-09-282013-11-05Amazon Technologies, Inc.Request routing management based on network components
US10015237B2 (en)2010-09-282018-07-03Amazon Technologies, Inc.Point of presence management in request routing
US11632420B2 (en)2010-09-282023-04-18Amazon Technologies, Inc.Point of presence management in request routing
US9407681B1 (en)2010-09-282016-08-02Amazon Technologies, Inc.Latency measurement in resource requests
US9787775B1 (en)2010-09-282017-10-10Amazon Technologies, Inc.Point of presence management in request routing
US11336712B2 (en)2010-09-282022-05-17Amazon Technologies, Inc.Point of presence management in request routing
US10079742B1 (en)2010-09-282018-09-18Amazon Technologies, Inc.Latency measurement in resource requests
US9253065B2 (en)2010-09-282016-02-02Amazon Technologies, Inc.Latency measurement in resource requests
US8676918B2 (en)2010-09-282014-03-18Amazon Technologies, Inc.Point of presence management in request routing
US8819283B2 (en)2010-09-282014-08-26Amazon Technologies, Inc.Request routing in a networked environment
US10097398B1 (en)2010-09-282018-10-09Amazon Technologies, Inc.Point of presence management in request routing
US8924528B1 (en)2010-09-282014-12-30Amazon Technologies, Inc.Latency measurement in resource requests
US8930513B1 (en)2010-09-282015-01-06Amazon Technologies, Inc.Latency measurement in resource requests
US9712484B1 (en)2010-09-282017-07-18Amazon Technologies, Inc.Managing request routing information utilizing client identifiers
US10958501B1 (en)2010-09-282021-03-23Amazon Technologies, Inc.Request routing information based on client IP groupings
US9191338B2 (en)2010-09-282015-11-17Amazon Technologies, Inc.Request routing in a networked environment
US10931738B2 (en)2010-09-282021-02-23Amazon Technologies, Inc.Point of presence management in request routing
US8938526B1 (en)2010-09-282015-01-20Amazon Technologies, Inc.Request routing management based on network components
US9800539B2 (en)2010-09-282017-10-24Amazon Technologies, Inc.Request routing management based on network components
US10778554B2 (en)2010-09-282020-09-15Amazon Technologies, Inc.Latency measurement in resource requests
US9003035B1 (en)2010-09-282015-04-07Amazon Technologies, Inc.Point of presence management in request routing
US9160703B2 (en)2010-09-282015-10-13Amazon Technologies, Inc.Request routing management based on network components
US9106701B2 (en)2010-09-282015-08-11Amazon Technologies, Inc.Request routing management based on network components
US9794216B2 (en)2010-09-282017-10-17Amazon Technologies, Inc.Request routing in a networked environment
US10225322B2 (en)2010-09-282019-03-05Amazon Technologies, Inc.Point of presence management in request routing
US9003040B2 (en)2010-11-222015-04-07Amazon Technologies, Inc.Request routing processing
US10951725B2 (en)2010-11-222021-03-16Amazon Technologies, Inc.Request routing processing
US9930131B2 (en)2010-11-222018-03-27Amazon Technologies, Inc.Request routing processing
US8452874B2 (en)2010-11-222013-05-28Amazon Technologies, Inc.Request routing processing
US8626950B1 (en)2010-12-032014-01-07Amazon Technologies, Inc.Request routing processing
US9391949B1 (en)2010-12-032016-07-12Amazon Technologies, Inc.Request routing processing
US11604667B2 (en)2011-04-272023-03-14Amazon Technologies, Inc.Optimized deployment based upon customer locality
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US9628554B2 (en)2012-02-102017-04-18Amazon Technologies, Inc.Dynamic content delivery
US10021179B1 (en)2012-02-212018-07-10Amazon Technologies, Inc.Local resource delivery network
US9172674B1 (en)2012-03-212015-10-27Amazon Technologies, Inc.Managing request routing information utilizing performance information
US9083743B1 (en)2012-03-212015-07-14Amazon Technologies, Inc.Managing request routing information utilizing performance information
US10623408B1 (en)2012-04-022020-04-14Amazon Technologies, Inc.Context sensitive object management
US11729294B2 (en)2012-06-112023-08-15Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
US12273428B2 (en)2012-06-112025-04-08Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
US10225362B2 (en)2012-06-112019-03-05Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
US9154551B1 (en)2012-06-112015-10-06Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
US11303717B2 (en)2012-06-112022-04-12Amazon Technologies, Inc.Processing DNS queries to identify pre-processing information
WO2013187989A1 (en)*2012-06-122013-12-19International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US8972510B2 (en)2012-06-122015-03-03International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US8938511B2 (en)2012-06-122015-01-20International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
GB2515974A (en)*2012-06-122015-01-07IbmMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US20140068021A1 (en)*2012-08-282014-03-06Alexey ArsenievConfiguring client services
US9525659B1 (en)2012-09-042016-12-20Amazon Technologies, Inc.Request routing utilizing point of presence load information
US9135048B2 (en)2012-09-202015-09-15Amazon Technologies, Inc.Automated profiling of resource usage
US10015241B2 (en)2012-09-202018-07-03Amazon Technologies, Inc.Automated profiling of resource usage
US9323577B2 (en)2012-09-202016-04-26Amazon Technologies, Inc.Automated profiling of resource usage
US10542079B2 (en)2012-09-202020-01-21Amazon Technologies, Inc.Automated profiling of resource usage
US10645056B2 (en)2012-12-192020-05-05Amazon Technologies, Inc.Source-dependent address resolution
US10205698B1 (en)2012-12-192019-02-12Amazon Technologies, Inc.Source-dependent address resolution
US9929959B2 (en)2013-06-042018-03-27Amazon Technologies, Inc.Managing network computing components utilizing request routing
US9294391B1 (en)2013-06-042016-03-22Amazon Technologies, Inc.Managing network computing components utilizing request routing
US10374955B2 (en)2013-06-042019-08-06Amazon Technologies, Inc.Managing network computing components utilizing request routing
US11863417B2 (en)2014-12-182024-01-02Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US11381487B2 (en)2014-12-182022-07-05Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10728133B2 (en)2014-12-182020-07-28Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10097448B1 (en)2014-12-182018-10-09Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10033627B1 (en)2014-12-182018-07-24Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US12309048B2 (en)2014-12-182025-05-20Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10091096B1 (en)2014-12-182018-10-02Amazon Technologies, Inc.Routing mode and point-of-presence selection service
US10171252B2 (en)2015-01-162019-01-01Mitsubishi Electric CorporationData determination apparatus, data determination method, and computer readable medium
US10225326B1 (en)2015-03-232019-03-05Amazon Technologies, Inc.Point of presence based data uploading
US11297140B2 (en)2015-03-232022-04-05Amazon Technologies, Inc.Point of presence based data uploading
US9887931B1 (en)2015-03-302018-02-06Amazon Technologies, Inc.Traffic surge management for points of presence
US10469355B2 (en)2015-03-302019-11-05Amazon Technologies, Inc.Traffic surge management for points of presence
US9819567B1 (en)2015-03-302017-11-14Amazon Technologies, Inc.Traffic surge management for points of presence
US9887932B1 (en)2015-03-302018-02-06Amazon Technologies, Inc.Traffic surge management for points of presence
US10180993B2 (en)2015-05-132019-01-15Amazon Technologies, Inc.Routing based request correlation
US10691752B2 (en)2015-05-132020-06-23Amazon Technologies, Inc.Routing based request correlation
US11461402B2 (en)2015-05-132022-10-04Amazon Technologies, Inc.Routing based request correlation
US9832141B1 (en)2015-05-132017-11-28Amazon Technologies, Inc.Routing based request correlation
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US10616179B1 (en)2015-06-252020-04-07Amazon Technologies, Inc.Selective routing of domain name system (DNS) requests
US10097566B1 (en)2015-07-312018-10-09Amazon Technologies, Inc.Identifying targets of network attacks
US9794281B1 (en)2015-09-242017-10-17Amazon Technologies, Inc.Identifying sources of network attacks
US9774619B1 (en)2015-09-242017-09-26Amazon Technologies, Inc.Mitigating network attacks
US10200402B2 (en)2015-09-242019-02-05Amazon Technologies, Inc.Mitigating network attacks
US9742795B1 (en)2015-09-242017-08-22Amazon Technologies, Inc.Mitigating network attacks
US11134134B2 (en)2015-11-102021-09-28Amazon Technologies, Inc.Routing for origin-facing points of presence
US10270878B1 (en)2015-11-102019-04-23Amazon Technologies, Inc.Routing for origin-facing points of presence
US10049051B1 (en)2015-12-112018-08-14Amazon Technologies, Inc.Reserved cache space in content delivery networks
US10257307B1 (en)2015-12-112019-04-09Amazon Technologies, Inc.Reserved cache space in content delivery networks
US10348639B2 (en)2015-12-182019-07-09Amazon Technologies, Inc.Use of virtual endpoints to improve data transmission rates
US11089033B2 (en)2016-04-262021-08-10Mitsubishi Electric CorporationIntrusion detection device, intrusion detection method, and computer readable medium
US10666756B2 (en)2016-06-062020-05-26Amazon Technologies, Inc.Request management for hierarchical cache
US11463550B2 (en)2016-06-062022-10-04Amazon Technologies, Inc.Request management for hierarchical cache
US10075551B1 (en)2016-06-062018-09-11Amazon Technologies, Inc.Request management for hierarchical cache
US12432205B2 (en)2016-06-292025-09-30Cisco Technology, Inc.Systems and methods for endpoint management
US10009344B2 (en)*2016-06-292018-06-26Duo Security, Inc.Systems and methods for endpoint management classification
US11019057B2 (en)2016-06-292021-05-25Duo Security, Inc.Systems and methods for endpoint management
US10110694B1 (en)2016-06-292018-10-23Amazon Technologies, Inc.Adaptive transfer rate for retrieving content from a server
US11831642B2 (en)2016-06-292023-11-28Cisco Technology, Inc.Systems and methods for endpoint management
US11457088B2 (en)2016-06-292022-09-27Amazon Technologies, Inc.Adaptive transfer rate for retrieving content from a server
US10594692B2 (en)2016-06-292020-03-17Duo Security, Inc.Systems and methods for endpoint management classification
US9992086B1 (en)2016-08-232018-06-05Amazon Technologies, Inc.External health checking of virtual private cloud network environments
US10516590B2 (en)2016-08-232019-12-24Amazon Technologies, Inc.External health checking of virtual private cloud network environments
US10469442B2 (en)2016-08-242019-11-05Amazon Technologies, Inc.Adaptive resolution of domain name requests in virtual private cloud network environments
US10033691B1 (en)2016-08-242018-07-24Amazon Technologies, Inc.Adaptive resolution of domain name requests in virtual private cloud network environments
US11330008B2 (en)2016-10-052022-05-10Amazon Technologies, Inc.Network addresses with encoded DNS-level information
US10505961B2 (en)2016-10-052019-12-10Amazon Technologies, Inc.Digitally signed network address
US10616250B2 (en)2016-10-052020-04-07Amazon Technologies, Inc.Network addresses with encoded DNS-level information
US10469513B2 (en)2016-10-052019-11-05Amazon Technologies, Inc.Encrypted network addresses
US10999073B2 (en)*2016-12-012021-05-04Utopia Planning Co., Ltd.Secure network communication method
US10831549B1 (en)2016-12-272020-11-10Amazon Technologies, Inc.Multi-region request-driven code execution system
US11762703B2 (en)2016-12-272023-09-19Amazon Technologies, Inc.Multi-region request-driven code execution system
US10372499B1 (en)2016-12-272019-08-06Amazon Technologies, Inc.Efficient region selection system for executing request-driven code
US11665165B2 (en)*2017-01-232023-05-30Mitsubishi Electric CorporationWhitelist generator, whitelist evaluator, whitelist generator/evaluator, whitelist generation method, whitelist evaluation method, and whitelist generation/evaluation method
US20210112062A1 (en)*2017-01-232021-04-15Mitsubishi Electric CorporationWhitelist generator, whitelist evaluator, whitelist generator/evaluator, whitelist generation method, whitelist evaluation method, and whitelist generation/evaluation method
US12052310B2 (en)2017-01-302024-07-30Amazon Technologies, Inc.Origin server cloaking using virtual private cloud network environments
US10938884B1 (en)2017-01-302021-03-02Amazon Technologies, Inc.Origin server cloaking using virtual private cloud network environments
US10503613B1 (en)2017-04-212019-12-10Amazon Technologies, Inc.Efficient serving of resources during server unavailability
US10977361B2 (en)2017-05-162021-04-13Beyondtrust Software, Inc.Systems and methods for controlling privileged operations
US11075987B1 (en)2017-06-122021-07-27Amazon Technologies, Inc.Load estimating content delivery network
US10447648B2 (en)2017-06-192019-10-15Amazon Technologies, Inc.Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP
US11290418B2 (en)2017-09-252022-03-29Amazon Technologies, Inc.Hybrid content request routing system
US10621341B2 (en)2017-10-302020-04-14Bank Of America CorporationCross platform user event record aggregation system
US10721246B2 (en)2017-10-302020-07-21Bank Of America CorporationSystem for across rail silo system integration and logic repository
US10728256B2 (en)2017-10-302020-07-28Bank Of America CorporationCross channel authentication elevation via logic repository
US10733293B2 (en)2017-10-302020-08-04Bank Of America CorporationCross platform user event record aggregation system
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US11711371B2 (en)2018-01-122023-07-25Sanctuary Networks LLCSystem and method for trustworthy internet whitelists
WO2019140280A1 (en)*2018-01-122019-07-18Brian GirardiSystem and method for trustworthy internet whitelists
WO2019152945A1 (en)*2018-02-022019-08-08Findo, Inc.Method of using machine learning to predict problematic actions within an organization
US11288616B2 (en)2018-02-022022-03-29Yva.Ai, Inc.Method of using machine learning to predict problematic actions within an organization
US10592578B1 (en)2018-03-072020-03-17Amazon Technologies, Inc.Predictive content push-enabled content delivery network
US11362986B2 (en)2018-11-162022-06-14Amazon Technologies, Inc.Resolution of domain name requests in heterogeneous network environments
US10862852B1 (en)2018-11-162020-12-08Amazon Technologies, Inc.Resolution of domain name requests in heterogeneous network environments
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
US11025747B1 (en)2018-12-122021-06-01Amazon Technologies, Inc.Content request pattern-based routing system
US11943371B2 (en)2019-04-262024-03-26Beyond Trust Software, Inc.Root-level application selective configuration
US11528149B2 (en)2019-04-262022-12-13Beyondtrust Software, Inc.Root-level application selective configuration
WO2021016276A1 (en)*2019-07-222021-01-28Whitestar Communications Inc.Systems and methods of distributed backup and recovery on a private network
US11068195B2 (en)2019-07-222021-07-20Whitestar Communications, Inc.Systems and methods of distributed backup and recovery on a private network
US20240223616A1 (en)*2019-11-082024-07-04Open Text Holdings, Inc.Systems and methods of information security monitoring with third-party indicators of compromise
US11757816B1 (en)*2019-11-112023-09-12Trend Micro IncorporatedSystems and methods for detecting scam emails
US12107970B2 (en)2020-05-262024-10-01Motorola Solutions, Inc.Method of establishing a future 2-way authentication between a client application and an application server
US11297105B2 (en)2020-07-222022-04-05International Business Machines CorporationDynamically determining a trust level of an end-to-end link
US20230367875A1 (en)*2021-01-222023-11-16Huawei Technologies Co., Ltd.Method for processing traffic in protection device, and protection device

Also Published As

Publication numberPublication date
US8069481B2 (en)2011-11-29
EP2562976A1 (en)2013-02-27
EP2562976B1 (en)2017-09-27
US20030172292A1 (en)2003-09-11
JP4688420B2 (en)2011-05-25
US20060265747A1 (en)2006-11-23
EP2562986B1 (en)2018-05-16
JP2005520230A (en)2005-07-07
US7213260B2 (en)2007-05-01
AU2009203095B2 (en)2012-07-12
US7096498B2 (en)2006-08-22
US20070300286A1 (en)2007-12-27
EP2562975A1 (en)2013-02-27
EP2562987A1 (en)2013-02-27
US20060253447A1 (en)2006-11-09
US8042181B2 (en)2011-10-18
US8042149B2 (en)2011-10-18
US8631495B2 (en)2014-01-14
US20060174341A1 (en)2006-08-03
US20030172294A1 (en)2003-09-11
EP2562986A1 (en)2013-02-27
AU2009203095A1 (en)2009-08-20
US7225466B2 (en)2007-05-29
US20120204265A1 (en)2012-08-09

Similar Documents

PublicationPublication DateTitle
US7779466B2 (en)Systems and methods for anomaly detection in patterns of monitored communications
US7458098B2 (en)Systems and methods for enhancing electronic communication security
US6941467B2 (en)Systems and methods for adaptive message interrogation through multiple queues
US20030172291A1 (en)Systems and methods for automated whitelisting in monitored communications
US7694128B2 (en)Systems and methods for secure communication delivery
EP1488316B1 (en)Systems and methods for enhancing electronic communication security
US7693947B2 (en)Systems and methods for graphically displaying messaging traffic
US20220239676A1 (en)Cyber-safety threat detection system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CIPHERTRUST, INC., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JUDGE, PAUL;RAJAN, GURU;REEL/FRAME:013761/0856

Effective date:20030207

ASAssignment

Owner name:CITICORP USA, INC. AS ADMINISTRATIVE AGENT,NEW YOR

Free format text:SECURITY AGREEMENT;ASSIGNORS:SECURE COMPUTING CORPORATION;CIPHERTRUST, INC.;REEL/FRAME:018247/0359

Effective date:20060831

Owner name:CITICORP USA, INC. AS ADMINISTRATIVE AGENT, NEW YO

Free format text:SECURITY AGREEMENT;ASSIGNORS:SECURE COMPUTING CORPORATION;CIPHERTRUST, INC.;REEL/FRAME:018247/0359

Effective date:20060831

ASAssignment

Owner name:SECURE COMPUTING CORPORATION,MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIPHERTRUST, INC.;REEL/FRAME:018771/0221

Effective date:20070112

Owner name:SECURE COMPUTING CORPORATION, MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CIPHERTRUST, INC.;REEL/FRAME:018771/0221

Effective date:20070112

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp