1
Craig Weissman: Method and system for allowing access to developed applications via a multi-tenant on-demand database service. salesforce com, Zilka Kotab PC, June 1, 2010: US07730478 (234 worldwide citation)

In accordance with embodiments, there are provided mechanisms and methods for allowing access to developed applications via a multi-tenant on-demand database service, in a controlled environment. These mechanisms and methods for providing such access can enable embodiments to provide additional cont ...


2
Handong Wu, Jerome Freedman, Christopher J Ivory: Network intrusion detection and analysis system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, February 17, 2009: US07493659 (207 worldwide citation)

An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system furthe ...


3
Alexander James Hinchliffe, Fraser Peter Howard, Bobby Rai, Andrew Kemp: Updating data from a source computer to groups of destination computers. McAfee, Zilka Kotab PC, Christopher J Hamaty, January 2, 2007: US07159036 (183 worldwide citation)

A source computer 8 stores updated data that is to be distributed to a plurality of destination computers (12 to 30). The destination computers (12 to 30) are divided into groups sharing a common priority level (5, 4, 3, 2, 1). Each of these groups is then associated with a push update task to be ex ...


4
Michael C Pak, Victor Kouznetsov: Delayed-delivery quarantining of network communications having suspicious contents. McAfee, Zilka Kotab PC, Christopher J Hamaty, July 18, 2006: US07080408 (182 worldwide citation)

A system, method and computer program product are provided for network-based scanning for potentially malicious content. Incoming and/or outgoing network communications traveling over a network are monitored, preferably at a gateway. Potentially malicious content in the network communications is ide ...


5
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, December 19, 2006: US07152105 (168 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


6
David M Cole, Dennis J Hanzlik, Erik Caso: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, August 14, 2007: US07257630 (160 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


7
Ilya Minkin, Igor V Balabine, Gerhard Eschelbeck: System, method and computer program product for rule based network security policies. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Zilka Kotab PC, November 30, 2004: US06826698 (156 worldwide citation)

A system, method and computer program product are provided for affording network security features. A plurality of network objects are identified. Rule sets associated with one or more of the identified network objects are retrieved. Each rule set includes a plurality of policy rules that govern act ...


8
Lisa M Guerra, Mikael Berner, Kevin Stone, Amol Joshi, Steve Tran: System, method and computer program product for looking up business addresses and directions based on a voice dial-up session. BeVocal, Zilka Kotab PC, April 4, 2006: US07024364 (151 worldwide citation)

A system, method and computer program product for determining an address of an entity based on a user location are disclosed. An utterance representative of an entity is initially received from a user. The entity associated with the utterance is then recognized using a speech recognition process. Ne ...


9
Stoyan Kenderov: System, method, and computer program product for charging a roaming network for a chargeable event. Amdocs Software Systems, Zilka Kotab PC, September 21, 2010: US07801523 (150 worldwide citation)

A system, method, and computer program product are provided for charging a roaming network. In use, a home network identifies a chargeable event that is attributable to a roaming network. To this end, the roaming network may be charged for the chargeable event.


10
John E Fitzpatrick, Monica E Smith: System, method and computer program product for transferring unregistered callers to a registration process. BeVocal, Zilka Kotab PC, October 16, 2007: US07283963 (149 worldwide citation)

A system, method and computer program product are provided for handling unregistered callers in a voice recognition framework. Initially, it is determined whether a user is registered. If it is determined that the user is not registered, a registration process is executed. Once registered, utterance ...