Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Kaspersky Lab Zao
Kaspersky Lab Zao_20100114
Kaspersky Lab Zao_20131212

Kaspersky Lab Zao patents

Recent patent applications related to Kaspersky Lab Zao. Kaspersky Lab Zao is listed as an Agent/Assignee. Note: Kaspersky Lab Zao may have other listings under different names/spellings. We're not affiliated with Kaspersky Lab Zao, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "K" | Kaspersky Lab Zao-related inventors

Date Kaspersky Lab Zao patents (updated weekly) - BOOKMARK this page
01/12/17System and controlling opening of files by vulnerable applications
12/22/16System and restoring modified data
12/08/16System and antivirus checking of files based on level of trust of their digital certificates
10/06/16System and identifying a file path using tree data structure
09/22/16Coordinating joint operation of multiple hypervisors in a computer system
08/25/16System and selecting secure data entry mechanism
08/25/16System and generating application control rules
08/25/16System and detecting fraudulent online transactions
07/21/16Systems and methods for active operating system kernel protection
07/21/16System and blocking elements of application interface
06/23/16System and secure execution of script files
06/23/16System and selecting means for intercepting network transmissions
05/19/16Dynamic categorization of network resources
05/12/16System and encouraging studying by controlling student's access to a device based on results of studying
04/28/16System and protecting electronic money transactions
03/24/16System and configuring a computer system according to security policies
03/17/16System and detection of targeted attacks
02/04/16System and altering functionality of an application
02/04/16System and determining category of trustof applications performing interface overlay
02/04/16System and securing use of a portable drive with a computer network
12/24/15Encryption of user data for storage in a cloud server
12/10/15System and methods for detecting harmful files of different formats in vitual environment
12/03/15System and encryption of disk based on pre-boot compatibility testing
11/26/15Method and system for determining trusted wireless access points
11/26/15System and method controlling access to applications on a mobile device
10/22/15System and methods for updating software of templates of virtual machines
10/22/15System and methods of performing antivirus checking in a virtual environment using different antivirus checking techniques
10/15/15System and emulation of files using multiple images of the emulator state
09/24/15System and methods for detection of fraudulent online transactions
08/20/15System and methods for authorizing operations on a service using trusted devices
07/23/15System and resolving conflicts between application control rules
07/09/15System and managing access to computer resources
07/02/15System and automating installation of applications
07/02/15System and selecting a synchronous or asynchronous interprocess communication mechanism
07/02/15System and automatic control of security policies based on available software licenses
07/02/15System and methods for automatic designation of encryption policies for user devices
06/11/15System and modifying a software distribution package without recalculating digital signatures
06/11/15System and applying access rules to files transmitted between computers
06/11/15System and assessing categorization rule selectivity
06/11/15System and spam filtering using insignificant shingles
06/11/15System and reducing load on an operating system when executing antivirus operations
06/11/15System and valuating resource in a computer network for compliance with requirements for a computer system
06/11/15System and blocking elements of application interface
05/21/15System and detecting malicious software using malware trigger scenarios in a modified computer environment
05/07/15System and correcting antivirus records using antivirus server
04/30/15System and copying files between encrypted and unencrypted data storage devices
04/30/15System and preserving and subsequently restoring emulator state
04/09/15Method for function capture and maintaining parameter stack
04/02/15System and evaluating malware detection rules
03/26/15System and ensuring safety of online transactions
03/26/15System and testing and configuring application control rules
02/12/15System and controlling access to encrypted files
02/12/15System and protecting computers from software vulnerabilities
01/29/15System and methods for ensuring confidentiality of information used during authentication and authorization operations
01/01/15System and automatically configuring application control rules
01/01/15Flexible fingerprint for detection of malware
01/01/15System and detecting malicious software using malware trigger scenarios
12/25/14Portable security detection and treatment of malware
12/11/14System and spam filtering using shingles
12/11/14System and detecting malicious executable files based on similarity of their resources
10/30/14System and controlling user access to encrypted data
10/30/14System and controlling user access to encrypted data
10/02/14System and automated configuration of software installation package
10/02/14System and adaptive modification of antivirus databases
08/07/14System and automatic generation of heuristic algorithms for malicious object identification
Patent Packs
07/31/14System and correcting antivirus records to minimize false malware detections
07/24/14System and adaptive control of user actions based on user's behavior
06/26/14System and protecting cloud services from unauthorized access and malware attacks
06/26/14System and deploying preconfigured software
06/26/14System and establishing rules for filtering insignificant events for analysis of software program
06/26/14System and protecting computer resources from unauthorized access using isolated environment
06/26/14System and detection of malware using behavior model scripts of security rating rules
06/26/14System and improving the efficiency of application emulation acceleration
06/26/14System and detecting malware that interferes with the user interface
06/26/14System and detecting malware using isolated environment
06/12/14Application-specific re-adjustment of computer security settings
05/08/14System and restricting pathways to harmful hosts in computer networks
05/08/14System and cloud-based detection of computer malware
04/03/14System and performing administrative tasks on mobile devices
04/03/14System and assessing danger of software using prioritized rules
Patent Packs
04/03/14System and countering detection of emulation by malware
02/13/14System and controlling user's access to protected resources using multi-level authentication
12/19/13System and preventing spread of malware in peer-to-peer network
12/12/13Portable security secure communication
12/05/13Asynchronous filtering and processing of events for malware detection
11/28/13System and detection and treatment of malware on data storage devices
11/14/13System and optimization of security traffic monitoring
10/10/13System and filtering spam messages based on user reputation
09/19/13System and removal of malicious software from computer systems and management of treatment side-effects
09/19/13Dynamic management of resource utilization by an antivirus application
08/29/13System and detecting unknown packers and cryptors
08/29/13Automated protection against computer exploits
08/29/13System and optimization of antivirus processing of disk files
08/22/13System and optimization of security tasks by configuring security modules
06/06/13Protection against malware on web resources utilizing scripts for content scanning
05/30/13System and correcting antivirus records to minimize false malware detections
05/23/13Silent-mode signature testing in anti-malware processing
05/16/13Portable security device and methods of user authentication
02/28/13Efficient management of computer resources
02/28/13Automatic analysis of security related incidents in computer networks
01/03/13Portable security detection and treatment of malware
01/03/13System and automated solution of functionality problems in computer systems
10/25/12System and reducing security risk in computer network
10/25/12System and dynamic generation of anti-virus databases
07/05/12System and methods for launching antivirus application tasks during computer downtime
07/05/12System and detecting unknown malware
07/05/12System and optimization of execution of security tasks in local network
06/28/12Optimization of anti-malware processing by automated correction of detection rules
06/21/12System and updating antivirus cache
01/26/12Protection against malware on web resources
Social Network Patent Pack
11/24/11Systems and methods for policy-based program configuration
09/08/11System for permanent file deletion
05/26/11Silent-mode signature testing in anti-malware processing
04/07/11Asynchronous processing of events for malware detection
04/07/11Method and system for detection of previously unknown malware
11/04/10Method and system for monitoring execution performance of software program product
01/14/10System and identifying text-based spam in rasterized images
01/14/10System and identifying text-based spam in rasterized images
12/12/13Portable security secure communication
01/14/10System and identifying text-based spam in rasterized images
Patent Packs

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Kaspersky Lab Zao in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Kaspersky Lab Zao with additional patents listed. Browse our Agent directory for other possible listings. Page by