FINJAN BLUE PATENT PORTFOLIO

United States Issued Patents

6,199,204* DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK
6,202,207* METHOD AND A MECHANISM FOR SYNCHRONIZED UPDATING OF INTEROPERATING SOFTWARE
6,314,428* METHOD AND APPARATUS FOR APPLICATION MANAGEMENT IN COMPUTER NETWORKS
6,584,569* SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
6,779,021 METHOD AND SYSTEM FOR PREDICTING AND MANAGING UNDESIRABLE ELECTRONIC MAIL
6,785,732 WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
6,826,716 TEST PROGRAMS FOR ENTERPRISE WEB APPLICATIONS
6,907,531 METHOD AND SYSTEMS FOR IDENTIFYING, FIXING, AND UPDATING SECURITY VULNERABILITIES
7,084,760 SYSTEM, METHOD, AND PROGRAM PRODUCT FOR MANAGING AN INTRUSION DETECTION SYSTEM
7,140,041 DETECTING DISSEMINATION OF MALICIOUS PROGRAMS
7,177,937* WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,237,265* SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES
7,340,776 METHOD AND SYSTEM FOR CONFIGURING AND SCHEDULING SECURITY AUDITS OF A COMPUTER NETWORK
7,346,929* METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,437,760 ANTIVIRAL NETWORK SYSTEM
7,475,427 APPARATUS, METHODS AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK
7,487,543 METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
7,490,354 VIRUS DETECTION IN A NETWORK
7,739,739 ANTIVIRAL NETWORK SYSTEM
7,770,225* METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY
7,779,474 VIRUS DETECTION IN A NETWORK
7,895,340 WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING
7,945,957 ANTIVIRAL NETWORK SYSTEM
7,996,905 METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
8,006,289 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
8,261,354 SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,381,242 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,458,793 METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
8,495,357 DATA SECURITY POLICY ENFORCEMENT
8,510,842 PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,572,750 WEB APPLICATION EXPLOIT MITIGATION IN AN INFORMATION TECHNOLOGY ENVIRONMENT
8,640,252 OBFUSCATING ENTRY OF SENSITIVE INFORMATION
8,646,086 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
8,683,599 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,694,786 VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING
8,695,098 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
8,752,182 PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS
8,782,351 PROTECTING MEMORY OF A VIRTUAL GUEST
8,788,763 PROTECTING MEMORY OF A VIRTUAL GUEST
8,793,800 STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS
8,800,047 SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT
8,910,291 BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
8,935,794 VERIFYING APPLICATION SECURITY VULNERABILITIES
8,943,599 CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,949,995 CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES
8,955,094 USER SESSION MANAGEMENT FOR WEB APPLICATIONS
8,984,642 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
9,003,480 CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE
9,032,528 BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION
9,032,529 DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,094,446 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,124,624 DETECTING VULNERABILITIES IN WEB APPLICATIONS
9,160,756 METHOD AND APPARATUS FOR PROTECTING MARKUP LANGUAGE DOCUMENT AGAINST CROSS-SITE SCRIPTING ATTACK
9,160,762 VERIFYING APPLICATION SECURITY VULNERABILITIES
9,172,717 SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,189,625 DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,231,970 SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM
9,256,511 COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,264,443 BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY
9,271,146 MOBILE PRIVACY INFORMATION PROXY
9,317,697 PROCESSING OF RESTRICTED ACCESS DATA
9,460,291 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,471,787 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,497,209 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,530,016 USING SOURCE TAINT ANALYSIS TO REDUCE FALSE POSITIVES IN AN ADVANCED PERSISTENT THREAT (APT) PROTECTION SOLUTION
9,536,085 DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT
9,544,327 PRIORITIZING SECURITY FINDINGS IN A SAST TOOL BASED ON HISTORICAL SECURITY ANALYSIS
9,679,159 MOBILE PRIVACY INFORMATION PROXY
9,762,606 IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT
9,838,412 COMPUTER SOFTWARE APPLICATION SELF-TESTING
9,876,816 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
9,882,926 DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS

International Issued Patents

GB 2333864* DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK
GB 2333865* SYNCHRONISED UPDATING OF INTEROPERATING SOFTWARE
JP 3385590* SOFTWARE UPDATE THE COMPUTER-READABLE RECORDING MEDIUM FOR USE WHEN UPDATING A COMPUTER PROGRAM THROUGH A COMPUTER NETWORK
GB 2508553 PROTECTING MEMORY OF A VIRTUAL GUEST
JP 5736090 METHOD OF THE MEMORY PROTECTION OF THE VIRTUAL GUEST, SYSTEM AND COMPUTER PROGRAM
ZL201280049932.4 A METHOD FOR PROTECTING VIRTUAL GUEST MEMORY, DEVICES AND SYSTEMS
DE 602006036331.1 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
GB 1964360 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 5030967B2 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
ZL200680047306.6 METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS
JP 4852542B2 METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
ZL20050022471.1 METHODS FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS
GB 2505623B DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS
JP 6226990B2 GUARANTEE OF SERVER-SIDE APPLICATIONS FOR SECURITY VULNERABILITIES
ZL201380047234.5 THE METHOD USED FOR SERVER AUTHENTICATION AND SECURITY SYSTEMS
ZL201310397293.7 SELF-TESTING OF COMPUTER SOFTWARE APPLICATION, METHOD AND SYSTEM THEREOF
GB 2494738B DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS
ZL 03817429.4 METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM
ZL201380007724.2 METHOD AND SYSTEM FOR OPTIMIZATION OF ACCESS TO RESTRICTED DATA
CA 2777434 VERIFYING APPLICATION SECURITY VULNERABILITIES
GB 2513798 A METHOD FOR OPTIMIZING PROCESSING OF RESTRICTED-ACCESS DATA
DE112012002718.3 DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS

Pending International Applications

DE 112012003988 PROTECTING MEMORY OF A VIRTUAL GUEST
DE 112013000473 A METHOD OF OPTIMIZING THE PROCESSING DATA WITH LIMITED ACCESS

*Indicates expired patent.

©2022 Finjan Blue, Inc.. Finjan Blue is the registered trademark of Finjan Blue, Inc.. ALL RIGHTS RESERVED.

Contact: info@finjanblue.com

Patents  -  Trademarks  -  Finjan