1
Vernon Hodges, Shawn O&apos Donnell: Method and system for providing automated updating and upgrading of antivirus applications using a computer network. Network Associates, Pennie & Edmonds, July 31, 2001: US06269456 (363 worldwide citation)

A method for updating antivirus files on a computer using push technology is disclosed. In a preferred embodiment, updated virus signature files or other updated antivirus information is loaded onto a central antivirus server, while local push agent software is installed on the client computer. When ...


2
Emilio Villa, Adrian Zidaritz, Michael David Varga, Gerhard Eschelbeck, Michael Kevin Jones, Mark James McArdle: Active firewall system and methodology. Network Associates, Patrick J S Inouye, Christopher J Hamaty, April 15, 2003: US06550012 (353 worldwide citation)

System and methodology providing automated or “proactive” network security (“active” firewall) are described. The system implements methodology for verifying or authenticating communications, especially between network security components thereby allowing those components to share information. In on ...


3
Vernon Hodges, Shawn O Donnell: Method and system for providing automated updating and upgrading of antivirus applications using a computer network. Network Associates, Pennie & Edmonds, March 7, 2000: US06035423 (327 worldwide citation)

A method for updating antivirus files on a computer using push technology is disclosed. In a preferred embodiment, updated virus signature files or other updated antivirus information is loaded onto a central antivirus server, while local push agent software is installed on the client computer. When ...


4
Thomas Bernhard, Terry Escamilla, William Leddy, Richard Letsinger, Crosby Marks, Steven E Smaha, Steven R Snapp: System, method and computer program product for automatic response to computer system misuse using active response modules. Network Associates, Pennie & Edmonds, August 14, 2001: US06275942 (247 worldwide citation)

A system, method and computer program product for automatic response to computer system misuse using active response modules (ARMs). ARMs are tools that allow static intrusion detection system applications the ability to dynamically increase security levels by allowing real-time responses to detecte ...


5
David W Carman, David M Balenson, Homayoon Tajalli, Stephen T Walker: System and method for controlling access to a user secret using a key recovery field. Network Associates, Cooley Godward, August 7, 2001: US06272632 (154 worldwide citation)

A system and method for data recovery is described. In one embodiment, an encrypting system encrypts a message or file using a secret key (KS) and attaches a key recovery field (KRF), including an access rule index (ARI) and KS, to the encrypted message or file. To access the encrypted message or fi ...


6
Gerhard Eschelbeck, Thomas Steiner, Mayr Johannes: System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment. Network Associates, Patrick J S Inouye, Christopher J Hamaty, April 22, 2003: US06553377 (149 worldwide citation)

A system and a process for maintaining a plurality of remote security applications using a centralized broker in a distributed computing environment are described. A centralized broker is executed on a designated system within the distributed computing environment. A console interface from the centr ...


7
Narimane Nabahi: Method and system for custom computer software installation. Network Associates, Pennie & Edmonds, December 21, 1999: US06006035 (144 worldwide citation)

A method and system for custom computer software installation using a standard rule-based installation engine is disclosed. Custom installation parameters are translated into a simplified script language file by a system administrator. An application software package is installed onto a computer usi ...


8
Steven B Lipner, David M Balenson, Carl M Ellison, Stephen T Walker: System and method for data recovery. Network Associates, November 23, 1999: US05991406 (120 worldwide citation)

A system and method for data escrow cryptography are described. An encrypting user encrypts a message using a secret storage key (KS) and attaches a data recovery field (DRF), including an access rule index (ARI) and KS, to the encrypted message. The DRF and the encrypted message are stored in a sto ...


9
Viktor Kouznetsov: Method and system for allowing computer programs easy access to features of a virus scanning engine. Network Associates, Pennie & Edmonds, February 22, 2000: US06029256 (109 worldwide citation)

A system and method for allowing computer programs to directly access various features of a virus scanning engine is disclosed. In one embodiment of the invention, the system includes a module for instantiating an object to act as an interface between the computer program and the virus scan engine, ...


10
Jonathan Edwards, Edmund White: Obtaining user responses in a virtual execution environment. Network Associates Technology, Christopher J Hamaty Esq, Blakely Sokoloff Taylor & Zafman, July 15, 2003: US06594686 (96 worldwide citation)

The invention provides for on-access scanning of archives, such as “ZIP” files, for files containing viruses or other unwanted characteristics. In particular, disclosed are various techniques for beginning a scanning operation, and then monitoring the scanning operation to determine whether it is co ...