1
Craig Weissman: Method and system for allowing access to developed applications via a multi-tenant on-demand database service. salesforce com, Zilka Kotab PC, June 1, 2010: US07730478 (223 worldwide citation)

In accordance with embodiments, there are provided mechanisms and methods for allowing access to developed applications via a multi-tenant on-demand database service, in a controlled environment. These mechanisms and methods for providing such access can enable embodiments to provide additional cont ...


2
Handong Wu, Jerome Freedman, Christopher J Ivory: Network intrusion detection and analysis system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, February 17, 2009: US07493659 (205 worldwide citation)

An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system furthe ...


3
Alexander James Hinchliffe, Fraser Peter Howard, Bobby Rai, Andrew Kemp: Updating data from a source computer to groups of destination computers. McAfee, Zilka Kotab PC, Christopher J Hamaty, January 2, 2007: US07159036 (181 worldwide citation)

A source computer 8 stores updated data that is to be distributed to a plurality of destination computers (12 to 30). The destination computers (12 to 30) are divided into groups sharing a common priority level (5, 4, 3, 2, 1). Each of these groups is then associated with a push update task to be ex ...


4
Michael C Pak, Victor Kouznetsov: Delayed-delivery quarantining of network communications having suspicious contents. McAfee, Zilka Kotab PC, Christopher J Hamaty, July 18, 2006: US07080408 (172 worldwide citation)

A system, method and computer program product are provided for network-based scanning for potentially malicious content. Incoming and/or outgoing network communications traveling over a network are monitored, preferably at a gateway. Potentially malicious content in the network communications is ide ...


5
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, December 19, 2006: US07152105 (164 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


6
David M Cole, Dennis J Hanzlik, Erik Caso: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, August 14, 2007: US07257630 (154 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


7
Stoyan Kenderov: System, method, and computer program product for charging a roaming network for a chargeable event. Amdocs Software Systems, Zilka Kotab PC, September 21, 2010: US07801523 (149 worldwide citation)

A system, method, and computer program product are provided for charging a roaming network. In use, a home network identifies a chargeable event that is attributable to a roaming network. To this end, the roaming network may be charged for the chargeable event.


8
Ilya Minkin, Igor V Balabine, Gerhard Eschelbeck: System, method and computer program product for rule based network security policies. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Zilka Kotab PC, November 30, 2004: US06826698 (149 worldwide citation)

A system, method and computer program product are provided for affording network security features. A plurality of network objects are identified. Rule sets associated with one or more of the identified network objects are retrieved. Each rule set includes a plurality of policy rules that govern act ...


9
John E Fitzpatrick, Monica E Smith: System, method and computer program product for transferring unregistered callers to a registration process. BeVocal, Zilka Kotab PC, October 16, 2007: US07283963 (148 worldwide citation)

A system, method and computer program product are provided for handling unregistered callers in a voice recognition framework. Initially, it is determined whether a user is registered. If it is determined that the user is not registered, a registration process is executed. Once registered, utterance ...


10
Quinton Y Zondervan, Umair A Khan, Gregory Harman, Salman Akhtar, Muhammad Raza, Muhammad Ataul Haleem Vaince: Interface for mobilizing content and transactions on multiple classes of devices. Nvidia International, Zilka Kotab PC, February 27, 2007: US07185286 (145 worldwide citation)

A graphical user interface (GUI) for visual representation and manipulation of a transaction pattern. The GUI includes a workplace view for receiving user specification of content and/or a transaction for a transaction pattern, a pattern view for manipulating properties of the pattern, a device edit ...