Featured patents

Method and System for Assessing Cumulative Access Entitlements of an Entity in a System
US 08843994 B2, Sept. 23, 2014, Policy, Sanjay Tandon / (Newport Beach, US)
A method, performed by a computer, with regard to analyzing cumulative…

Implementing Secured, Event-Based Layered Logout From a Computer System
US 08782754 B2, July 15, 2014, Authorization, Girish Dhanakshirur / International Business Machines Corporation (Armonk, US)
A method to provide a structured logout from a user session, comprising:…

Generating and Storing Document Data
US 08869291 B2, Oct. 21, 2014, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Kevin Piazza et al. / Canon Kabushiki Kaisha (Tokyo, JP)
A method for generating and storing a markup language document within a network,…

Hybrid Analysis of Vulnerable Information Flows
US 08869287 B2, Oct. 21, 2014, Vulnerability assessment, Omer Tripp et al. / International Business Machines Corporation (Armonk, US)
A system comprising:…

Digital Data File Management Method and Recording Medium for Recording Digital Data File Management Program Thereon
US 08635704 B2, Jan. 21, 2014, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Jae-Young Kim et al. / LG Electronics Inc. (Seoul, KR)
A method for a transmission of a digital data file being performed by…

Domains Based Security for Clusters
US 08595821 B2, Nov. 26, 2013, Packet filtering, Pruthvi Panyam Nataraj et al. / International Business Machines Corporation (Armonk, US)
A method comprising:…

Methods and Apparatuses for Providing Internet-Based Proxy Services
US 08572737 B2, Oct. 29, 2013, Intrusion detection, Ian Gerald Pye et al. / Cloudflare, Inc. (San Francisco, US)
A method in a proxy server for providing Internet-based proxy services,…

Advocate for Facilitating Verification for the Online Presence of an Entity
US 08544091 B2, Sept. 24, 2013, Monitoring or Scanning of Software or Data Including Attack Prevention, Jeffrey M. Stibel / Credibility Corp. (Malibu, US)
For a verification system comprising at least one server with one or more…

Systems and Methods for Secure Transaction Management and Electronic Rights Protection
US 08533854 B2, Sept. 10, 2013, Access control, David M. Van Wie et al. / Intertrust Technologies Corporation (Sunnyvale, US)
A method comprising:…

Systems and Methods for Detecting Unknown Malware in an Executable File
US 08448243 B1, May 21, 2013, Monitoring or Scanning of Software or Data Including Attack Prevention, Anand Sankruthi / Symantec Corporation (Mountain View, US)
A computer-implemented method for detecting unknown malware in an executable…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.