Featured patents

Electronic Device and Method for Detecting Power Statuses of Electronic Device
US 08839017 B2, Sept. 16, 2014, Having power source monitoring, Yu-Gang Zhang / Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd. (Shenzhen, CN
A computer-implemented method for detecting power statuses of one or more power…

Single-Use Authentication Methods for Accessing Encrypted Data
US 08745386 B2, June 3, 2014, Object protection, Stefan Thom et al. / Microsoft Corporation (Redmond, US)
A single-use authentication method for accessing encrypted data stored…

Method and Memory Device for Generating a Time Estimate
US 08751855 B2, June 10, 2014, Counting, scheduling, or event timing, Rahav Yairi et al. / SanDisk IL Ltd. (Kfar Saba, IL)
A method for generating a time estimate in a memory device, the method…

Tamper Resistant Memory Protection
US 08726042 B2, May 13, 2014, By stored data protection, Dinarte R. Morais et al. / Microsoft Corporation (Redmond, US)
A system for protecting security of memory in a computing environment, the system…

Programmable Security Platform
US 08683215 B2, March 25, 2014, Computer Program Modification Detection by Cryptography, Mark L. Buer / Broadcom Corporation (Irvine, US)
A security device having dynamically programmable security, comprising:…

Efficient Techniques for Achieving Secure Transactions Using Tamper-Resistant Tokens
US 08683204 B2, March 25, 2014, Intelligent token, Vladimir Kolesnikov / Alcatel Lucent (Paris, FR)
A system for producing a Secure Function Evaluation (SFE) transaction…

Method and Apparatus for Variable Privacy Preservation in Data Mining
US 08627070 B2, Jan. 7, 2014, Security levels, Philip Shi-Lung Yu et al. / International Business Machines Corporation (Armonk, US)
A method for preserving privacy of data records for use in a data mining…

Method and System for Extending Encrypting File System
US 08549326 B2, Oct. 1, 2013, By stored data protection, Ahmed Mohamed / Blackout, Inc. (Sammamish, US)
A method for transparently managing user access of encrypted files, comprising…

Defeating Real-Time Trojan Login Attack With Delayed Interaction With Fraudster
US 08452980 B1, May 28, 2013, Using record or token, Karl Ackerman et al. / EMC Corporation (Hopkinton, US)
A method of detecting a fraudulent login attempt across a network, the method…

Method and Apparatus for Securing Communication Over Public Network
US 08458453 B1, June 4, 2013, Particular node for directing data and applying cryptography, Rupaka Mahalingaiah / Dunti LLC (Austin, US)
A method of secure communication between two or more hosts using a public…

Patentorg has 4696 documents under Electrical Computers and Digital Processing Systems: Support Patents.

Narrow down the browsing criteria below to see more patents.

Select a subcategory
Quick navigation
New documents
  • Process for the Production of the Actinobacillus Pleuropneumoniae Toxins APXI or APXIII in a Liquid Culture Medium Under Supply of Air Enriched in Carbon Dioxide
  • Method for Manufacturing Nonvolatile Memory Device
  • Supply Chain Demand Satisfaction
  • Supply-Line Management Device
  • Storage Control Device and Method for Managing Snapshot