Featured patents

Method and System for Creating a Protected Object Namespace for a WSDL Resource Description
US 08844053 B2, Sept. 23, 2014, Access control, Heather M. Hinton et al. / International Business Machines Corporation (Armonk, US)
A method for performing access control decisions, comprising:…

Security Monitoring System and Security Monitoring Method
US 08850582 B2, Sept. 30, 2014, Intrusion detection, Satoshi Okubo et al. / Hitachi, Ltd. (Tokyo, JP)
A security monitoring system for detecting an abnormality of a control system…

Providing a Multi-Phase Lockstep Integrity Reporting Mechanism
US 08844021 B2, Sept. 23, 2014, Authorization, Willard M. Wiseman et al. / Intel Corporation (Santa Clara, US)
A processor comprising:…

Policy-Based Content Filtering
US 08813215 B2, Aug. 19, 2014, Proxy server or gateway, William J. Crawford / Fortinet, Inc. (Sunnyvale, US)
A computer-implemented method for processing application-level content of network…

Method and System of Runtime Analysis
US 08726394 B2, May 13, 2014, Vulnerability assessment, Ofer Maor et al. / Seeker Security Ltd. (Herzlia Pituach, IL)
A method for detecting at least one security vulnerability, comprising:…

System and Method for Providing Silent Sign on Across Distributed Applications
US 08701173 B2, April 15, 2014, Global, etc.), Janardhan Kakarla et al. / Charles Schwab & Co., Inc. (San Francisco, US)
In a distributed computing system a method of providing a user with access…

Apparatus and Method for Installing Software
US 08595856 B2, Nov. 26, 2013, By authorizing client, Hee-chul Han / Samsung Electronics Co., Ltd. (Suwon-si, KR)
An apparatus for installing software, the apparatus comprising:…

Information Processing Apparatus and Method for Preventing Unauthorized Cooperation of Applications
US 08566937 B2, Oct. 22, 2013, Monitoring or Scanning of Software or Data Including Attack Prevention, Hideki Matsushima et al. / Panasonic Corporation (Osaka, JP)
An information processing apparatus, comprising:…

Method and System for Detecting Malicious Behavioral Patterns in a Computer, Using Machine Learning
US 08516584 B2, Aug. 20, 2013, Intrusion detection, Dima Stopel et al. / Deutsche Telekom AG (Bonn, DE)
A method for detecting malicious behavioral patterns which are related…

Secure Game Download
US 08484696 B2, July 9, 2013, Access Control or Authentication, Pierre-Jean Beney et al. / IGT (Reno, US)
A method for operating a gaming machine comprising the steps of:…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.