| 11627145 |
Determining a reputation of data using a data visa including information indicating a reputation |
Michael Schneider, David Oxley, Ramon Peypoch |
2023-04-11 |
| 10462156 |
Determining a reputation of data using a data visa |
Michael Schneider, David Oxley, Ramon Peypoch |
2019-10-29 |
| 9929991 |
Just-in-time, email embedded URL reputation determination |
Nicholas Liebmann, Martin Stecher, Michael G. Bishop, Simon Hunt |
2018-03-27 |
| 9833709 |
Game console system, method and computer program product with anti-malware/spyware and parental control capabilities |
Mostyn J. Beechey, Henry C. Stern |
2017-12-05 |
| 9628513 |
Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites |
George L. Heron, Christopher S. Bolin |
2017-04-18 |
| 9467410 |
Just-in-time, email embedded URL reputation determination |
Nicholas Liebmann, Martin Stecher, Mike Bishop, Simon Hunt |
2016-10-11 |
| 9037668 |
Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites |
George L. Heron, Christopher S. Bolin |
2015-05-19 |
| 9002771 |
System, method, and computer program product for applying a rule to associated events |
Michael G. Bishop |
2015-04-07 |
| 8888585 |
Game console system, method and computer program product with anti-malware/spyware and parental control capabilities |
Mostyn J. Beechey, Henry C. Stern |
2014-11-18 |
| 8856931 |
Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites |
George L. Heron, Christopher S. Bolin |
2014-10-07 |
| 8656502 |
Controlling use of a computer program installed on a computer |
Mark David Harris |
2014-02-18 |
| 8601067 |
Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites |
George L. Heron, Christopher S. Bolin |
2013-12-03 |
| 8341105 |
System, method, and computer program product for applying a rule to associated events |
Michael G. Bishop |
2012-12-25 |
| 8196206 |
Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites |
George L. Heron, Christopher S. Bolin |
2012-06-05 |
| 8069480 |
Method and system for defining a safe storage area for use in recovering a computer system |
Lee Codel Lawson Tarbotton, Daniel Joseph Wolff |
2011-11-29 |
| 7810091 |
Mechanism to check the malicious alteration of malware scanner |
Mark David Harris |
2010-10-05 |
| 7640361 |
Systems and methods for converting infected electronic files to a safe format |
Jeffrey Martin Green, Chris Bolin |
2009-12-29 |
| 7401359 |
Generating malware definition data for mobile computing devices |
Neil A. Cowie |
2008-07-15 |
| 7263561 |
Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient |
Jeffrey Martin Green, Chris Bolin |
2007-08-28 |
| 7086050 |
Updating computer files |
Christopher Barton, Kristian John Pine |
2006-08-01 |
| 7013330 |
Downloading a computer file from a source computer to a target computer |
Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Graham A. Makinson, Nicholas Paul Kelly |
2006-03-14 |
| 6938161 |
Test driver selection |
James Malcolm Vignoles, Barrett Tuttle |
2005-08-30 |
| 6898712 |
Test driver ordering |
James Malcolm Vignoles, Barrett Tuttle |
2005-05-24 |
| 6851058 |
Priority-based virus scanning with priorities based at least in part on heuristic prediction of scanning risk |
— |
2005-02-01 |