At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to...
Provided is to secure a data-writing period to a source line and reduce the number of the IC chips used. N image data (e.g., three image data, RGB) are...
Methods and systems for determining a location of a container
Systems and methods of securing chattels are provided. Motion of a first container can be measured by a sensor over an interval of time and compared to motion...
Automated banking machine with non-contact reading of card data
An automated banking machine is part of a banking system that can operate to cause financial transfers responsive to data read from data bearing records. The...
Method and apparatus for providing secure and anonymous cash-out and
cash-in values in a gaming system
A method, apparatus, article of manufacture, and a memory structure for providing a payout to a player is disclosed. An ATM or ATM-like device is used to cash...
System and method for providing consumers with access to an article while
preventing theft thereof
The present invention is directed to a system and method for providing consumers with access to an article while preventing theft thereof. In one aspect, the...
Contactless communication device
A contactless communication device comprises a contactless front chip, a security chip concentrator and a security chipset. Wherein, said security chipset...
Methods and systems for forcing an application to store data in a secure
The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting...
Apparatus and method for performing different cryptographic algorithms in
a communication system
A communication apparatus performs encryption on data transmitted from another communication apparatus by using first or second cryptographic algorithm, or...
Data security with a security module
A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The...
Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
Content management system for securely managing static and dynamic data
A computer-implemented method manages data content, the data content including static data and dynamic data. The content management method includes analyzing...
System and method for mobile communication device application advisement
This disclosure is directed to a system and method for providing advisement about applications on mobile communication devices such as smartphones, netbooks,...
Merging an out of synchronization indicator and a change recording
indicator in response to a failure in...
A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores...
Acoustically secure phase change memory devices
Systems, methods, and firmware for operating data storage devices and storage processors are provided herein. In one example, a data storage device is provided....
Medical cart for dispensing medication
Technology for dispensing medication from a wheeled medical cart is disclosed. A method comprises placing the medication in a medication storage compartment of...
Method and system for distribution of media
A system for the distribution of media is disclosed. The system comprises a network center; a delivery system for receiving data from and transmitting data to...
Method to enforce watermarking instructions in a receiving device
A method to enforce watermarking instructions by a security module in a receiving device, comprising the steps of receiving a security message by--a security...
Testing web applications for security vulnerabilities with metarequests
A method includes instantiating, in response to a request by an executing application, an input data object with one or more uninitialized fields and traversing...
Secure data exchange between data processing systems
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
Multi-service VPN network client for mobile device having integrated
An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be...
Aggregate signing of data in content centric networking
One embodiment provides a system that facilitates routers in verifying content objects in a cost-effective manner by aggregating content objects into a secure...
Attestation of data sanitization
Systems and methods are disclosed for performing data sanitization at a data storage device (DSD). In an embodiment, a controller may direct a memory device to...
Method and apparatus for hardware-accelerated encryption/decryption
An integrated circuit for data encryption/decryption and secure key management is disclosed. The integrated circuit may be used in conjunction with other...
Method to encrypt information that is transferred between two
Method for encrypting information transferred between two mobile telephones, each having a security module and where a security application contains encryption...
Retaining clip for use with a mass storage device
A retaining clip to be used with a storage device in a host computer system, wherein the retaining clip is configured to secure an interposer serving as...
Mobile terminal security systems
Systems that can track an object as it moves across the field of view of the security device, integrate transaction data with the object information, and can...
Highly secure combination lock system
A combination lock system has a lock body with a central portion and an surrounding portion on a face of the lock system. The central portion has a biometric...
Peer-to-peer transfer between mobile devices with coupled secure elements
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
System and method for globally and securely accessing unified information
in a computer network
A smartphone that includes a communications interface to communicate via one or more Internet communications channels is provided. The smartphone also includes...
Systems and methods for contextualized data protection
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to...
Method and system for granting access to secure data
Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved...
Privacy-enhanced car data distribution
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges...
Associating a signing key with a software component of a computing
A method and system is provided for operatively associating a signing key with a software component of a computing platform. The computing platform includes a...
Methods for restricting resources used by an application based on a base
profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
Secure off-chip processing such as for biometric data
In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing...
Method and device for integrating a device into a network
A method and a server for integrating a device into a network, a first device identification of the device is detected being a reading device authorized for...
Method and device for improving the data transmission security in a serial
data transmission having flexible...
A method is provided for serial data transmission in a bus system having at least two bus subscribers, which exchange messages via the bus, the send access to...
Method for checking data consistency in a system on chip
The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving...
Secure patch updates of a virtual machine image in a virtualization data
Virtual Machine (VM) images in a virtualized environment are updated through the use of patches. A virtualization data processing system includes a hypervisor...
Systems and methods for intercepting, processing, and protecting user data
through web application pattern...
Systems and methods of intercepting user data of a web application are provided. After web application resources are obtained for execution on a client device,...
System and method for selecting means for intercepting network
Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to...
Security management in M2M area network
The disclosure is related to a machine to machine (M2M) device and a security management method thereof. The M2M device includes an identification circuit. The...
Near field communication application identification routing in card
A near field communications (NFC) device is disclosed that interacts with other NFC devices to exchange information and/or the data. The NFC device can include...
Systems and apparatuses for a secure mobile cloud framework for mobile
computing and communication
Systems and apparatuses for a secure mobile cloud framework (referred to as MobiCloud) for mobile computing and communication are disclosed. Embodiments of...
Systems and methods of securing operational information associated with an
The invention is directed to a tamper-evident method of encrypting data relating to one or more print cartridges installed in an imaging device that includes...
Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
Secure on-demand supply method and system and traffic type acquisition
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a...