At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for secure and persistent retention of sensitive
An information processing system provisions a client account for a user to enable a client computer associated with the user to store information in an elastic...
Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
Automatic rotation and storage of security credentials
A system and method for a credentials agent that automatically rotates and stores security credentials usable at least in part to authenticate calling...
Secure current movement indicator
Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment...
Accessing applications from secured states
A computing device can enable a user to navigate to an application or other digital object directly from a lock screen of the device. A user can specify a...
Continuous run-time integrity checking for virtual memory
A run-time integrity checking (RTIC) method compatible with memory having at least portions that store data that is changed over time or at least portions...
Method of actively controlling winch swing via modulated uptake and
An unmanned aerial vehicle (UAV) including a winch system, wherein the winch system includes a winch line having a first end that is secured to the payload, and...
Fall detection device for lifeline; lifeline installation equipped with
said device; associated fall detection...
A fall detection device for a lifeline, intended to be mounted on an energy absorber which includes a static portion and a mobile portion secured together,...
Mobile network device using a wireless SD card that uses SCSI to SD
A mobile network access device, system and method are disclosed. The method includes sending data or a command to a storing unit or a baseband processing unit...
High bandwidth open wired network
An open network suitable for a mobile platform that contains a plurality of host and peripheral devices. Within the network, a central server communicates with...
Method for ensuring security and privacy in a wireless cognitive network
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management...
Method and system for determining subscriber demand for multimedia content
A method of determining demand for multimedia content in a multimedia provider network includes receiving a content demand statistics (CDS) request from a...
Intelligent security light and associated methods
A lighting device capable of detecting a condition in an environment includes a sensor to capture a video frame from a location in the environment. The lighting...
Integrated security video and electromagnetic pulse detector
The present invention relates systems and methods of electromagnetic protection for integrated video and electromagnetic detector security system equipment. A...
Configuring policy settings on client computing devices
Systems and methods for installing policy settings on a client computing device are provided. In some aspects, the client computing device receives policy data...
Dynamic communication between secure endpoints
In one implementation, a hub and spoke network is made up of hub network devices and spoke network devices. A security protocol channel is established between...
Securing data communications in a communications network
A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and...
Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
Randomization of processor subunit timing to enhance security
Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that...
Secure port forwarding to access data between public processing locations
and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
Increased communication security
A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second...
Multi-tenancy support in a cloud based data grid
A system with a tenant aware in-memory data grid includes a data grid configured to store data in memory. A request manager is configured to receive a data grid...
Storing and transmitting sensitive data
A system for secure key management including a secondary device comprising a programmable hardware component and an associated secure data storage, wherein the...
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
Increased communication security
A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer...
System and method of semantically modelling and monitoring applications
and software architecture hosted by an...
The present disclosure is directed to a monitoring system for automatically inferring, without human modelling input or information regarding actual physical...
Custom ASIC combining VoIP and security IP
A custom Application-Specific Integrated Circuit ("ASIC") that simultaneously processes data packets and multimedia packets, including Voice over Internet...
Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
Instruction for accelerating SNOW 3G wireless security algorithm
Vector instructions for performing SNOW 3G wireless security operations are received and executed by the execution circuitry of a processor. The execution...
Automated tools for building secure software programs
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify...
Proximity-based system for automatic application or data access and item
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
Mapping system for not provided keyword in secure search
A keyword estimation process and tool provides data for on-line visits to websites within a secure search environment. Blocks having probability mass functions...
Systems and methods for metadata-based workflows for content creation and
A secure networked metadata-based workflow method and system, managed through core application logic and master database management system for picture, sound,...
Secure boot information with validation control data specifying a
Examples disclosed herein relate to secure boot information with validation control data specifying a validation technique. Examples include determining, with...
Techniques for improving random number generation security
A technique for improving random number generation (RNG) security for a data processing system includes a storage subsystem of a processing unit receiving a...
File processing method and apparatus, and storage device
A file processing method and a storage device for storing a file in a redundant array of independent disks (RAID) are disclosed. In this method, the storage...
Interface for accessing radar data
A process is described that includes the generation and transmission of collision avoidance data and/or collision avoidance instructions based on data from 3-D...
Secure printing using sliced data
An image to be printed on a surface of a substrate that forms, or will be used in, a personalized security document is generated. The image to be printed is...
Method for managing profile of Embedded UICC, and Embedded UICC, Embedded
UICC-equipped terminal, provision...
The present invention provides a method wherein an MNO receives a secret key allocated to a corresponding embedded UICC (eUICC) through SM-SR (secure routing)...
Method and system to provide secure exchange of data between mobile phone
and computer system
Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for...
Secure wavelength selective switch-based reconfigurable branching unit for
Systems and methods for method for data transport using secure reconfigurable branching units, including receiving signals from a first trunk terminal and a...
Dynamic enterprise security control based on user risk factors
Aspects dynamically set enterprise-level security rules by assessing risk factors associated with a user. Risk values representing likelihoods of loss of...
Detection of network security breaches based on analysis of network record
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
System for finding code in a data flow
A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences....
Macro grid governance and communication
A governance apparatus and a communication method for communicating within the governance apparatus. The governance apparatus includes a Government. The...
Key management system for toll-free data service
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Apparatus and method for secure delivery of data from a communication
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
Managing distribution and retrieval of security key fragments among proxy
A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and...