At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,996,858 |
Systems and methods for utilizing IMS data security mechanisms in a
circuit switched network Aspects of the present invention provide a mechanism to utilize IMS media security mechanisms in a CS network and, thereby, provide end-to-end media security in... |
US-8,996,804 |
Optimizing and enhancing performance for parity based storage A mechanism is provided for optimizing and enhancing performance for parity based storage, particularly redundant array of independent disk (RAID) storage. The... |
US-8,996,722 |
Softrouter feature server A network architecture includes one or more feature servers and control servers in a control plane that is logically separate from a data plane that includes... |
US-8,996,706 |
Method for policy and charging rules function (PCRF) informing centralized
deployment functional architecture... A system and method for performing quality of service control on a user equipment are provided in the present invention. The method includes: after establishing... |
US-8,996,705 |
Optimization of enhanced network links A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a... |
US-8,996,665 |
Takeover processes in security network integrated with premise security
system An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a... |
US-8,996,411 |
System and method for enabling integrated channels in an IP marketplace A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables... |
US-8,996,002 |
Apparatus and methods for provisioning subscriber identity data in a
wireless network Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access... |
US-8,995,958 |
System and method for limiting mobile device functionality The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile... |
US-8,995,665 |
Role based encryption without key management system A role based security infrastructure for data encryption that does not require a key management system is provided. For each defined role, a unique key pair is... |
US-8,995,349 |
Communication control method, mobile communication system and mobile
terminal apparatus The present invention is designated to reduce the deterioration of transmission characteristics upon data transmission, even when soft buffer memory for... |
US-8,995,274 |
Methods and systems for controlling traffic on a communication network Mechanisms for controlling traffic on a communication network are described. The mechanisms can be implemented, for example, using signaling messages. For... |
US-8,995,137 |
Modular mass storage system and method therefor A modular mass storage system and method that enables cableless mounting of ATA and/or similar high speed interface-based mass storage devices in a computer... |
US-8,994,933 |
Apparatus and method for characterizing a replica tape An apparatus and method are provided for characterizing a replica tape which has been embossed, compressed or cast on a surface of a material to be measured to... |
US-8,994,532 |
Data center equipment location and monitoring system A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and... |
US-8,994,505 |
Methods and apparatuses to secure data transmission in RFID systems Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system against eavesdropping, using multiple communication... |
US-8,992,238 |
Mounting system having a mounting plate with mounting studs and electrical
contacts A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to... |
US-8,991,706 |
Security element for document of value A security element is provided for a document of value. The security element includes an array of apertures through at least a portion of the document of value,... |
US-8,990,960 |
Method for near field communication operation, a device and a system
thereto A method, a user terminal and a system for performing a NFC operation by a NFC equipped user terminal. According to a method a common application residing in a... |
US-8,990,958 |
Systems and methods for content management in an on demand environment The technology disclosed relates to hosting legacy data sources in a cloud environment. In particular, it relates to providing users with flyweight access to... |
US-8,990,948 |
Systems and methods for orchestrating runtime operational integrity Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration... |
US-8,990,947 |
Analytics engine Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution,... |
US-8,990,935 |
Activity signatures and activity replay detection Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating activity signatures and detecting activity... |
US-8,990,921 |
Apparatus for processing with a secure system manager Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of... |
US-8,990,920 |
Creating a virtual private network (VPN) for a single app on an
internet-enabled device or system An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or "app") has its own VPN... |
US-8,990,912 |
Authentication of data communications Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device... |
US-8,990,906 |
Methods and systems for replacing shared secrets over networks A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a... |
US-8,990,904 |
Web-based security proxy for computing system environment scanning Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data... |
US-8,990,896 |
Extensible mechanism for securing objects using claims An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more... |
US-8,990,891 |
Provisioning layer two network access for mobile devices In general, techniques are described for provisioning layer two access in computer networks. A network device located in a public network comprising an... |
US-8,990,887 |
Secure mechanisms to enable mobile device communication with a security
panel A method of arming or disarming a building security system includes transferring an electronic security credential file from an authorizing environment to a... |
US-8,990,885 |
Zone-based firewall policy model for a virtualized data center Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security... |
US-8,990,884 |
Quantifying risk based on relationships and applying protections based on
business rules An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are... |
US-8,990,877 |
Interface for use with a video compression system and method using
differencing and clustering The disclosure relates to a system and method having a common interface to manage and integrate secure information traversing a network with disparate domains.... |
US-8,990,587 |
Method and apparatus for secure transport and storage of surveillance
video Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network... |
US-8,990,586 |
Method for selectively exposing subscriber data Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital... |
US-8,990,563 |
Sending protected data in a communication network A method and apparatus for sending protected data from a sender unit to a receiver unit via an intermediate unit. A Transfer Init message that contains a ticket... |
US-8,990,558 |
Securing information in a cloud computing system The method and system for secure data (information) inside a cloud computing system, allow data to be encrypted everywhere in the cloud on storage devices and... |
US-8,990,552 |
Method and apparatus for integrating precise time protocol and media
access control security in network elements A transmit portion of a network device including a medium access control (MAC) module configured to receive a frame of data to be transmitted from the network... |
US-8,990,195 |
Systems and methods for searching media content based on an editing file Various embodiments described herein provide users with a fast and efficient way for identifying scenes for editing purposes. At least one embodiment is a... |
US-8,990,091 |
Parsimonious protection of sensitive data in enterprise dialog systems In one embodiment, a method comprises classifying a representation of audio data of a dialog turn in a dialog system to a classification. The method may further... |
US-8,989,704 |
Invisible mode for mobile phones to facilitate privacy without breaching
trust Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a... |
US-8,989,382 |
Method for detecting security error in mobile telecommunications system
and device of mobile telecommunications According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data... |
US-8,989,381 |
Method, apparatus, and system for data protection on interface in
communications system A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are... |
US-8,989,053 |
Association management in a wireless node network Methods and systems for association management within a wireless node network of nodes and a server are described. A method may identify a first node as a... |
US-8,989,031 |
System and method providing resilient data transmission via spectral
fragments Systems, methods and apparatus for securely transmitting a data stream by dividing a data stream into a plurality of sub-streams; associating each substream... |
US-8,988,401 |
Display device and method of driving the same A display device is disclosed. According to some aspects, the display device includes a display panel for displaying an image, data drivers for supplying data... |
US-8,988,233 |
Point of sale terminal having enhanced security A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly... |
US-8,988,185 |
Security document, security systems and methods of controlling access to a
region A security document is provided comprising a first RFID tag readable only within a first range, and a second RFID tag readable within a second range, the first... |
US-8,985,471 |
Optically readable identification security tag or stamp The invention relates to a security tag made unique by randomly distributing a mixture of large numbers of multicolored small objects, such as two colored glass... |