Patents.WorldPatents.World
  • Patent Portfolios Home
  • About us
  • Contact us
0
  • Browse all
  • Litigation
  • Limestone Reports
    • Validity
    • Patentability
    • Landscape
    • Classification
  • Free Portfolios
  • Private Portfolios
  • Launch Carly – PBA
  • Login / Register
HomeLitigationCUPP Cybersecurity LLC et al v. Symantec Corporation

CUPP Cybersecurity LLC et al v. Symantec Corporation

Litigation

Description

Description

This portfolio contains the entire content of each of the patents cited in this patent litigation case. You can download the portfolio as a single complete PDF file, for ease of viewing and sharing. Below is a summary/preview of what is in the PDF file.

Patents

US8365272B2 — System and method for providing network and computer firewall protection with dynamic address isolation to a device
US8631488B2 — Systems and methods for providing security services during power management mode
US8789202B2 — Systems and methods for providing real time access monitoring of a removable media device
US9106683B2 — Systems and methods for providing security services during power management mode
US9747444B1 — System and method for providing network security to mobile devices
US9756079B2 — System and method for providing network and computer firewall protection with dynamic address isolation to a device
US9781164B2 — System and method for providing network security to mobile devices
US9843595B2 — Systems and methods for providing security services during power management mode

Classifications

H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
H04L29/1233Mapping of addresses of the same type; Address translation
H04L61/25Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation
H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
H04L63/0245Filtering by information in the payload
H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
G06F1/3209Monitoring remote activity, e.g. over telephone lines or network connections
G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
H04W12/06Authentication
H04W12/0602Pre-authentication
G06F2221/034Test or assess a computer or a system
G06F8/62Uninstallation
H04L63/0227Filtering policies
H04L63/1425Traffic logging, e.g. anomaly detection
G06F21/31User authentication
G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
H04L63/1441Countermeasures against malicious traffic
G06F11/1446Point-in-time backing up or restoration of persistent data
G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
H04L63/102Entity profiles
G06F21/562Static detection
H04L63/0263Rule management
H04L63/1416Event detection, e.g. attack signature detection
H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
H04W12/12Fraud detection or prevention
H04W12/1208Anti-malware arrangements, e.g. protecting against SMS fraud or mobile malware

Abstracts ( 3  of  8 )

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting a wake event, providing a wake signal in response to the wake event to wake a mobile device from a power management mode, and managing security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

A mobile security system connects to a mobile device and filters out attacks and malicious code. Using the mobile security system, a mobile device can be protected by greater security and possibly by the same level of security offered by a corporation, enterprise, or other entity associated with the mobile device.

Reviews (0)

Only logged in customers who have purchased this product may leave a review.

Reviews

There are no reviews yet.

$ 10.00

Patent Litigation Case:  1:18-cv-02050
Filing Date:  12/27/2018

— OR —

Add to Bookmarks
Remove from Wishlist
Files Included
  • CUPP Cybersecurity LLC et al v. Symantec Corporation

Warning: sizeof(): Parameter must be an array or an object that implements Countable in /home/customer/www/patents.world/public_html/wp-content/themes/wr-nitro/woocommerce/woorockets/single-product/style-5.php on line 185
Share this
Add to Bookmarks
Remove from Wishlist

Related Products

Quick ViewAdd to cart

Konda Technologies, Inc. v. Flex Logix Technologies, Inc.

Add to Bookmarks
Remove from Wishlist
$ 10.00
Quick ViewAdd to cart

Fluordx LLC v. Quidel Corporation

Add to Bookmarks
Remove from Wishlist
$ 0.00
Quick ViewAdd to cart

Endeavor Robotics, Inc. v. Qinetiq North America, Inc. et al

Add to Bookmarks
Remove from Wishlist
$ 0.00
Quick ViewAdd to cart

Uniloc 2017 LLC v. Google LLC

Add to Bookmarks
Remove from Wishlist
$ 0.00
Footer logo

Quickly Buy or Create Downloadable Patent Portfolios

SITE INFO

  • About
  • Contact
  • Privacy Policy
  • Terms of Service
  • License Agreement

SHOP PORTFOLIOS

  • Litigation
  • Limestone Reports
  • Free Portfolios
  • Private Portfolios
  • Launch Carly – PBA

ACCOUNT INFO

  • My Account
  • Checkout
  • Bookmarked Portfolios
©2020 Patents.World. Made with ♥ in Austin, TX and Washington, DC
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok