At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Security and access system based on multi-dimensional location
An invention is provided for system security and access based on multi-dimensional location characteristics. The invention includes collecting contextual...
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
Apparatus and method for providing location based security for
communication with a remote device
A method for providing location based security for communication between a remote device and a mobile device having a global positioning system receiver for...
Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
Secure communication architecture including sniffer
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
Method for encrypting a plurality of data in a secure set
A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an...
Methods and apparatus for authenticating data as originating from a
storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
Secure optionally passive RFID tag or sensor with external power source
and data logging
A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and...
Hardware-enforced, always-on insertion of a watermark in a video
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
System and method for providing contactless payment with a near field
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
Using multiple display servers to protect data
A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in...
Apparatus and method for providing hardware security
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of...
A system includes a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources (e.g., data from...
Security configuration systems and methods for portal users in a
multi-tenant database environment
A computer-implemented system and method includes method includes receiving a data request for data in a database from a user; determining if the user is an...
Secure data management
The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory...
Method and system for securing access to configuration information stored
in universal plug and play data models
A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a...
Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
Method and system for rapidly scanning files
The present embodiments provide a method and system for rapidly scanning a file, wherein the method includes obtaining a data packet, the data packet comprising...
System and method for dynamic adjustment of expiration date for
authorization key for antivirus products
A system for a dynamic adjustment of expiration date of an authorization key, the system comprising: a security product that will be installed on a...
Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
Method for implementing secure data channel between processor and devices
Apparatuses, systems, and methods are directed to securely store, transfer, and/or process data especially sensitive data sent from input devices to processors....
Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
Securing virtual machine data
One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of...
Transportation, storage and stabilization device for electronic equipment
An equipment saddle is provided. The equipment saddle may include a plurality of cases attached to a drapable skirt. Each case forms a compartment for retaining...
SMS botnet detection on mobile devices
Technologies for mobile device security are disclosed. A described technique includes launching a monitoring application that has a priority receiver attribute...
Automatic sanitization of data on a mobile device in a network environment
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a...
Headset computer with handsfree emergency response
Operating conditions for a headset computer are used to detect a situation where an emergency response mode should be activated. In emergency response mode, the...
Systems and methods for independent and control-isolated audio processing
Systems and methods are provided that may implement independent and control-isolated audio processing (ICIAP) to separate and/or control audio streams at...
Method and system for delivering media data
For use in media communications, e.g. in the delivery of video and audio or in teleconferencing, a media file or title is partitioned for secured, efficient...
System for the distribution and deployment of applications, with
provisions for security and policy conformance
A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications...
Network security appliance to imitate a wireless access point of a local
area network through coordination of...
Disclosed are methods and systems of a network security appliance to imitate a wireless access point of a local area network through coordination of multiple...
Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
Application attack monitoring
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions...
Template representation of security resources
Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be...
System and method for isolating mobile data
Disclosed is a system for mobile data isolation, comprising of a tag control management module and a mobile data management module. The tag control management...
Secure method of processing data
The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear...
Methods and apparatus for network communications via a transparent
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
System and method for providing secured access to services
A system and method for providing authenticated access to an initiating terminal in relation to the services provided by a terminating terminal via a...
Power management and security for wireless modules in "machine-to-machine"
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
System and method for conducting searches at target devices
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
System for obtaining vehicular traffic flow data from a tire pressure
An embedded Tire Pressure Monitoring sensor is incorporated into vehicular wheels and a secured central server is used to track the unique identification code...
Smart hybrid card system providing authenticity, privacy, and security
An RFID/MFID system includes a tag and a reader. The tag is adapted to provide an RF identification signature when interrogated with an electric travelling wave...
Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that...
Preventing content data leak on mobile devices
Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed using...
Programmatically detecting collusion-based security policy violations
Sets of multiple software programs selected from a set of candidate software programs are evaluated to determine if the applications can collude to violate a...
User management of authentication tokens
A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A...
Methods, systems and application programmable interface for verifying the
security level of universal resource...
The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and...