At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Trusted client-centric application architecture
Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
On-board applet migration
An electronic device (such as a cellular telephone) automatically installs and personalizes updates to an applet on a secure element in the electronic device....
File processing method and apparatus, and storage device
A file processing method and a storage device for storing a file in a redundant array of independent disks (RAID) are disclosed. In this method, the storage...
Seat belt buckle incorporating a display
A seat belt buckle for receiving a latch plate of a vehicle seat belt includes a housing having a slot for receiving the latch plate, a locking mechanism within...
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
Using a wireless beacon to provide access credentials to a secure network
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi...
Terminal based on conditional access technology
The terminal comprises a tuner, a security chip and a digital television terminal main chip. The tuner is used to receive cable television broadcast data...
Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
Systems, methods, and computer program products for interfacing multiple
service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
Polymorphic security policy action
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
Dynamic comparative analysis method and apparatus for detecting and
preventing code injection and other network...
A security appliance includes a vulnerable testbed that simulates at least one known vulnerability, and a secure testbed that simulates not having that...
Interacting with a remote server over a network to determine whether to
allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
Communication terminal and secure log-in method acquiring password from
server using user ID and sensor data
A communication terminal is provided with functions to redirect authentication data, make a substitute reply of a password to a biometric authentication part,...
Security key generation for simultaneous multiple cell connections for
A first security context is established between a given user computing device and a first network computing device to enable a secure data connection between...
Network security method and network security servo system
A network security method and a network security servo system are provided. The method includes: decrypting a plurality of encrypted data points from an...
Computer system and network interface with hardware based packet filtering
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
System and method for data center security enhancements leveraging managed
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
XML based generic UNIX discovery framework
Services that support recovery of a data center require collecting information concerning the service customer's physical and virtual infrastructure, and...
Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
Encrypted mass-storage device with self running application
An encrypted mass-storage drive device with self-running application is disclosed. The encrypted mass-storage drive device allows storage of vital documents and...
Asset security management system
Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received. The face print...
Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
Maintaining secure data isolated from non-secure access when switching
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
System for transparent authentication across installed applications
A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from...
Cloud control system and method for LAN-based controlled apparatus
A cloud control system for LAN-based controlled apparatus and method for the same is disclosed. The cloud control system includes a cloud server and a LAN...
Systems and methods for using unique device identifiers to enhance
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
Parallel processing of data for an untrusted application
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
Methods and apparatus for managing data within a secure element
Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise...
Dynamic transmission of personal data to only trusted entities
Secure storage of important/relevant information on a device and/or internet cloud is facilitated, and enables automatic transmission of that important/relevant...
Wireless telecommunications network, and a method of authenticating a
A method is provided of authenticating a message from a femtocell base station in a wireless telecommunications network comprising a security gateway and a...
Personal security alert and monitoring apparatus
A personal monitoring apparatus and methods of using the personal monitoring apparatus for contacting one or more third parties through wireless signals and/or...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Data loss prevention (DLP) methods by a cloud service including third
party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
Secure data communication
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
Method and system for configuring and securing a device or apparatus, a
device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
Scalable network apparatus for content based switching or validation
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
System and method for automated provisioning of a wireless device
A processor and a system for automated provisioning of one or more wireless devices are provided. The processor includes one or more processing subsystems...