Featured patents

Virtual Private Cloud That Provides Enterprise Grade Functionality and Compliance
US 08850516 B1, Sept. 30, 2014, Policy, Leonard Chung et al. / EMC Corporation (Hopkinton, US)
A method of managing files, comprising:…

Information Processing System, Information Processing Apparatus, and Information Processing Method
US 08819780 B2, Aug. 26, 2014, Authorization, Koji Inose / Canon Kabushiki Kaisha (Tokyo, JP)
An information processing system, comprising:…

System and Method for Detecting Malware by Transforming Objects and Analyzing Different Views of Objects
US 08769692 B1, July 1, 2014, Virus detection, Anthony Vaughan Bartram et al. / McAfee, Inc. (Santa Clara, US)
A method, comprising:…

Ascertaining Presentation Format Based on Device Primary Control Determination
US 08726366 B2, May 13, 2014, Stand-alone, Richard T. Lord et al. / Elwha LLC (Bellevue, US)
A system comprising:…

Managing Security Configuration Through Machine Learning, Combinatorial Optimization and Attack Graphs
US 08683546 B2, March 25, 2014, Policy, John D. Dunagan et al. / Microsoft Corporation (Redmond, US)
A system comprising: one…

Securing Communications Between Different Network Zones
US 08701180 B2, April 15, 2014, Security protocols, Masoud Aghadavoodi Jolfaei / SAP AG (Walldorf, DE)
A method of communicating a protocol request at a network zone, the method…

Apparatus for Reconfiguration of a Technical System Based on Security Analysis and a Corresponding Technical Decision Support System and Computer Program Product
US 08646085 B2, Feb. 4, 2014, Vulnerability assessment, Jonathan Cederberg et al. / Telefonaktiebolaget L M Ericsson (Publ) (Stockholm, SE
An apparatus for reconfiguring a technical system based on analysis of security…

Techniques for Modification of Access Expiration Conditions
US 08607303 B2, Dec. 10, 2013, Policy, Lloyd Leon Burch et al. / Apple Inc. (Cupertino, US)
A method comprising:…

Simultaneous Mixed Protection Modes Over a Virtualized Host Adapter
US 08561203 B2, Oct. 15, 2013, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Gerhard Banzhaf et al. / International Business Machines Corporation (Armonk, US)
A system comprising:…

Approach for Securing Distributed Deduplication Software
US 08453257 B2, May 28, 2013, By authorizing client, Avishai H. Hochberg et al. / International Business Machines Corporation (Armonk, US)
A method for securing distributed deduplication activities in a deduplicating…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.