Featured patents

Enterprise Vulnerability Management
US 08789192 B2, July 22, 2014, Vulnerability assessment, Jason M. LaBumbard / Lockheed Martin Corporation (Bethesda, US)
A method for generating a vulnerability score associated with en-information…

Systems and Methods for Application Based Interception of SSL/VPN Traffic
US 08869262 B2, Oct. 21, 2014, Virtual Private Network or Virtual Terminal Protocol, Shashi Nanjundaswamy et al. / Citrix Systems, Inc. (Fort Lauderdale, US)
A method for an appliance to allow or deny a level of access by an application…

Information Processing Apparatus
US 08752209 B2, June 10, 2014, Limitations on number or amount of copies, Ryo Goto / Kyocera Corporation (Kyoto, JP)
An information processing apparatus comprising:…

Method for Improving Network Application Security and the System Thereof
US 08719915 B2, May 6, 2014, Proxy server or gateway, Zhou Lu et al. / ZTE Corporation (Shenzhen, Guangdong Province, CN)
A method for improving network application security, wherein the method…

Techniques to Explain Authorization Origins for Protected Resource Objects in a Resource Object Domain
US 08689324 B2, April 1, 2014, Authorization, Catherine Hitti et al. / SAS Institute, Inc. (Cary, US)
A computer-implemented method, comprising:…

Portable Computer and Charging Method Thereof
US 08667610 B2, March 4, 2014, Protection of Hardware, Cheng-Lu Lin et al. / Quanta Computer Inc. (Tao Yuan Shien, TW)
A portable computer, comprising:…

Key Distribution for Unconnected One-Time Password Tokens
US 08640214 B2, Jan. 28, 2014, Tokens, Jerome Denis et al. / Gemalto SA (Meudon, FR)
A method for distributing a symmetric key for a one-time password token, having…

System and Method for User Login to a Multimedia System Using a Remote Control
US 08595793 B2, Nov. 26, 2013, Network, Dang Van Tran et al. / Samsung Electronics Co., Ltd. (Suwon, KR)
A method of logging in one or more user profiles on a multimedia system…

Method and Apparatus for Connection-Rate Filtering
US 08533817 B2, Sept. 10, 2013, Monitoring or Scanning of Software or Data Including Attack Prevention, Frank A. Reichstein et al. / Hewlett-Packard Development Company, L.P. (Houston, US)
A method of connection-rate filtering, the method comprising:…

Extraction of Code Level Security Specification
US 08539593 B2, Sept. 17, 2013, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Lin Tan et al. / International Business Machines Corporation (Armonk, US)
A method comprising:…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.