Featured patents

Grid Security Intrusion Detection Configuration Mechanism
US 08863278 B2, Oct. 14, 2014, Monitoring or Scanning of Software or Data Including Attack Prevention, Sebnem Jaji et al. / International Business Machines Corporation (Armonk, US)
A computer system, comprising:…

Access Control in Data Processing System
US 08875224 B2, Oct. 28, 2014, Policy, Guenter Karjoth et al. / International Business Machines Corporation (Armonk, US)
A method comprising:…

Policy-Based Selection of Remediation
US 08776170 B2, July 8, 2014, Policy, Daniel B. Bezilla et al. / Fortinet, Inc. (Sunnyvale, US)
A computer-implemented method comprising:…

Claims-Aware Role-Based Access Control
US 08776255 B2, July 8, 2014, Access control, Rakesh P. Bilaney et al. / Microsoft Corporation (Redmond, US)
A computer program product comprising one or more computer-readable storage…

Method and System for Providing Location of Target Device Using Stateless User Information
US 08689277 B2, April 1, 2014, Policy, Martin Wyville Thomson et al. / Andrew LLC (Hickory, US)
A method of providing a location of a target device to an application…

Protecting Authentication Information of User Applications When Access to a Users Email Account Is Compromised
US 08621581 B2, Dec. 31, 2013, Credential, Sanyam Goyal / Oracle International Corporation (Redwood Shores, US)
A method of processing email messages in an email server, said method comprising:…

Auditing Communications
US 08595794 B1, Nov. 26, 2013, Authorization, David Van / Xceedium, Inc. (Herndon, US)
A method, comprising:…

Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor
US 08561200 B2, Oct. 15, 2013, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Luciana Costa et al. / Telecom Italia S.p.A. (Milan, IT)
A method for controlling access of a mobile terminal to a communication network…

Systems and Methods for Defending a Shellcode Attack
US 08539578 B1, Sept. 17, 2013, Monitoring or Scanning of Software or Data Including Attack Prevention, Jerry Jing et al. / Symantec Corporation (Mountain View, US)
A computer-implemented method for defending an attack from the execution…

Method and Apparatus for Managing a User
US 08516604 B2, Aug. 20, 2013, By authorizing user, Jianping Sun / Huawei Technologies Co., Ltd. (Shenzhen, CN)
A method for managing a user, the method comprising:…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.