At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for controlling access to an access point
A security system comprises a positioning unit that determines locations of user devices relative to a threshold of the access point, a surveillance camera that...
Secure data entry using a card reader with minimal display and input
capabilities having a display
A card reader comprising a display configured to optionally graphically display a character; one or more sensors configured to receive user input, wherein the...
System and method for performing secure online banking transactions
A method and system is provided for performing secure online banking transactions. An example method includes: collecting data related to at least one...
Parsing, processing, and/or securing stream buffers
Described are examples for securely storing stream data received from a stream source. Stream data can be received from the stream source for storing in one or...
Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
Cloud security platform
A data security system, including a security manager remotely controlling, via a network application programming interface, a cloud-based service that performs...
Master device for controlling application security environments
Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data,...
Provisioning of a shippable storage device and ingesting data from the
shippable storage device
When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data from...
Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method,...
System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
Systems and methods for secure storage of user information in a user
Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of...
Cross-domain security in cryptographically partitioned cloud
Solutions for secure memory access in a computing platform, include a multi-key encryption (MKE) engine as part of the memory interface between processor...
System-on-chips and operation methods thereof
A system-on-chip includes a magnetic random access memory and a security interface. The magnetic random access memory includes a plurality of memory areas, each...
Various examples are directed to systems and methods for securing a data storage device. A storage controller may receive a read request directed to the data...
System and method for baseboard management controller assisted dynamic
early host video on systems with a...
An information handling system includes a data processor, a security co-processor, and a baseboard management controller (BMC). The security co-processor...
Providing secure access to data in mobile devices
Embodiments of the present disclosure provide a method, system and computer program product for providing a secure access to data in mobile devices by acquiring...
Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
Exit device systems and methods
An exit device according to one embodiment includes a plurality of sensors and an electronic dogging mechanism. The exit device is configured to locally analyze...
Apparatus and method for providing multiple connections using different
radio access technology in wireless...
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
Device and method of handling data transmission/reception for dual
A communication device for handling data transmission/reception for dual connectivity comprises a storage unit for storing instructions of connecting to a first...
Method and apparatus for providing augmented reality services
The present disclosure relates to a communication technique and system for combining 5G communication systems with IoT technologies to achieve a higher data...
Feedback for a privacy indicator on a security camera
Features are disclosed for a security camera including automated identification of disabled privacy indicators based on feedback included in monitored data...
Method and apparatus for secure content delivery from a telecommunication
According to one aspect, the teachings herein disclose a method and apparatus for a providing content over a secure connection to a subscriber device, where the...
Integration framework and user interface for embedding transfer services
Techniques are disclosed for providing secure transaction functionality embedded into host applications executing on transaction client devices, using an...
Security systems for mitigating attacks from a headless browser executing
on a client computer
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an...
Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
Systems and methods of network security and threat management
The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention...
Securing a network
Methods and systems for visualizing, analyzing, archiving and securing computer and internet of things (IoT) data networks are disclosed. The system includes a...
Technologies for secure personalization of a security monitoring virtual
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include...
Optimizing security analyses in SaaS environments
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
Reactive virtual security appliances
Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific...
Action response framework for data security incidents
An incident manager application (IM) for responding to data security incidents in enterprise networks is disclosed. An IM tracks the incidents in an enterprise...
Policy management, enforcement, and audit for data security
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing, and enforcing policies on data security. A policy...
Data driven role based security
Aspects extend to methods, systems, and computer program products for controlling performance of a requested user operation. It is determined if a requested...
Protecting sensitive information from a secure data store
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
Methods for internet communication security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users,...
Local data aggregation repository
Apparatuses, systems, methods, and computer program products are disclosed for a local repository of aggregated data. A hardware device comprises a local...
Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
Method and apparatus for securing a sensor or device
One embodiment of this invention describes a method and apparatus for the secure identification and validation of low complexity sensors or devices on a...
Secure data exchange method between a communication device and a service
provider based on asymmetric public...
The invention relates to a method for securely exchanging data (5) between a communication device (1) and a server (8) of a service provider (2) via a...
Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
Intelligent firewall access rules
A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of...
Enterprise server behavior profiling
Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and...
Managing queue distribution between critical datacenter and flexible
Systems include one or more critical datacenter connected to behind-the-meter flexible datacenters. The critical datacenter is powered by grid power and not...
Magnetic communication method
The disclosure relates to a magnetic communication method that does not use induction. For example, a transmitter device may generate a magnetic field in a...
Risk profiling using portal based scanners
A system and method for consolidating data collected using a hierarchical scanning system and assessing security risks regarding the shipping containers is...
Systems and methods for securing a vehicle during extended idle
Methods and systems are provided for an extended secure idle (SI) for a mobile platform. The SI may be entered and exited responsive to a variety of SI entry...
Method and system for secure order management system data encryption,
decryption, and segmentation
An apparatus for segmented processing of order management system data is described herein. The apparatus generally includes: a front end interface that is...
Wireless data communication interface
In some embodiments, the rendering a financial transaction record in a second format includes converting a tokenized first item of financial transaction...
Computer system and method for improving security screening
In an example, a computing device comprises at least one processor, a memory, and a non-transitory computer-readable storage medium storing instructions thereon...