Featured patents

Authentication Method Employed by Portable Electronic Device, Associated Controller, Host Computer Having Storage Medium Storing Associated Computer Program, and Machine-Readable Medium Storing Associated Computer Program
US 08826377 B2, Sept. 2, 2014, Network, Wenzhong Lou et al. / Silicon Motion Inc. (Jhubei, Hsinchu County, TW)
An authentication method employed by a portable electronic device, comprising:…

Policy-Based Application Management
US 08799994 B2, Aug. 5, 2014, Policy, Zhongmin Lang et al. / Citrix Systems, Inc. (Fort Lauderdale, US)
A method of managing applications of an enterprise on a mobile device,…

Unauthorized Data Transfer Detection and Prevention
US 08806607 B2, Aug. 12, 2014, Packet filtering, Kristopher A. Pate et al. / Verizon Patent and Licensing Inc. (Basking Ridge, US)
A system comprising:…

Apparatus and Method for Enhancing Security of Data on a Host Computing Device and a Peripheral Device
US 08869273 B2, Oct. 21, 2014, Monitoring or Scanning of Software or Data Including Attack Prevention, Gita Srivastava et al. / Gigavation, Inc. (Dallas, US)
A security device for coupling between a first device, configured to act…

Method and Apparatus for Thwarting Spyware
US 08726399 B1, May 13, 2014, Prevention of Unauthorized Use of Data Including Prevention of Piracy, Privacy Violations, or Unauthorized Data Modification, Kobi O. Eshun et al.
A trusted apparatus, comprising:…

Establishing a Trusted Session From a Non-Web Client Using Adaptive Authentication
US 08701199 B1, April 15, 2014, Vulnerability assessment, Lawrence N. Friedman et al. / EMC Corporation (Hopkinton, US)
A method of launching a client application on an electronic device, the method…

Backward Researching Time Stamped Events to Find an Origin of Pestware
US 08667586 B2, March 4, 2014, Monitoring or Scanning of Software or Data Including Attack Prevention, Matthew L. Boney / Webroot Inc. (Broomfield, US)
A method for identifying an origin of suspected pestware activity on a computer…

Data Assurance
US 08656452 B2, Feb. 18, 2014, Policy, Bryan Stephenson et al. / Hewlett-Packard Development Company, L.P. (Houston, US)
A system for data assurance, comprising:…

Detecting Malware Using Stored Patterns
US 08635700 B2, Jan. 21, 2014, Virus detection, Jesse J. Lee et al. / Raytheon Company (Waltham, US)
A method comprising:…

Systems and Methods for Inhibiting Attacks With a Network
US 08631484 B2, Jan. 14, 2014, Packet filtering, Angelos D. Keromytis et al. / The Trustees of Columbia University in the City of New York (New York, US)
A method for inhibiting attacks by forwarding packets through a plurality…

Patentorg has 5375 documents under Information Security Patents.

Narrow down the browsing criteria below to see more patents.