Featured patents

Arrangement and Methods for Performing Malicious Data Detection and Information Leakage Prevention
US 08844028 B1, Sept. 23, 2014, Monitoring or Scanning of Software or Data Including Attack Prevention, Hung-Hao Cheng / Trend Micro Inc. (Tokyo, JP)
An integrated secured open database connectivity (ODBC) application programming…

Systems and Methods for Detecting Malicious Network Content
US 08850571 B2, Sept. 30, 2014, Monitoring or Scanning of Software or Data Including Attack Prevention, Stuart Gresley Staniford et al. / FireEye, Inc. (Milpitas, US)
A method for detecting malicious network content, comprising:…

Systems and Methods for Securing Network Communications
US 08850545 B2, Sept. 30, 2014, Global, etc.), Andreas Schmidt et al. / InterDigital Patent Holdings, Inc. (Wilmington, US)
In a system comprising a user equipment (UE), a service provider associated…

Secure Method for Controlling the Opening of Lock Devices by Means of a Communicating Object Such as a Mobile Phone
US 08793784 B2, July 29, 2014, Stand-alone, Aitor Agueda et al. / Openways SAS (Feucherolles, FR)
A secured method for controlling the opening of lock devices, characterized by…

Customization Restrictions for Multi-Layer XML Customization
US 08875306 B2, Oct. 28, 2014, By authorizing user, Christopher David Lowes / Oracle International Corporation (Redwood Shores, US)
A method for restricting the customizability of a base metadata document,…

Managing Connections in a Data Storage System
US 08769635 B2, July 1, 2014, Authorization, Prakash Varadharajan et al. / CommVault Systems, Inc. (Oceanport, US)
A system for managing connections in a data storage system, wherein the data…

Techniques for User Authentication
US 08613066 B1, Dec. 17, 2013, Usage, Dominique I. Brezinski et al. / Amazon Technologies, Inc. (Reno, US)
A computer-implemented method for user authentication, comprising:…

Method of Authentication User Using Server and Image Forming Apparatus Using the Method
US 08522325 B2, Aug. 27, 2013, Usage, Woo-yeon Jang / Samsung Electronics Co., Ltd. (Suwon-Si, KR)
A method of authenticating a user of an image forming apparatus using a first…

Method and System for Intrusion Detection
US 08490191 B2, July 16, 2013, Intrusion detection, Peer Wichmann et al. / WIBU-Systems AG (Karlsruhe, DE)
Method for protecting computer software by detecting an attack of an intruding…

Content Receiver, Content Reproducer, Content Reproducing System, Content Writing-Out Method, Viewing Expiration Time Determining Method, and Program
US 08453254 B2, May 28, 2013, Access control, Takuya Nishimura / Panasonic Corporation (Osaka, JP)
A content receiver which receives content, a viewing expiration time of which is…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.