At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for implementing data migration while preserving
security policies of a source filer
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for...
System and method for monitoring computing servers for possible
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
Data security system
A method, computer system, and computer program product for validating data contained in a request sent by a requestor to a server application. A computer...
Credential authentication methods and systems
Methods and systems are provided for performing and verifying transactions involving authentication with a secure credential, such as a smart card, in an...
Method and apparatus for providing adaptive self-synchronized dynamic
address translation as an intrusion...
A translator is provided for translating predetermined portions of packet header information including an address of a data packet according to a cipher...
Secure data exchange technique
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the...
Network communication method, network communication system, network
communication apparatus and program using...
A method for network communication under SNMP includes: producing an access request when a first device accesses management information stored in a second...
Module for "machine-to-machine" communications using public key
Methods and systems are provided for efficient and secure "Machine-to-Machine" (M2M) between modules and servers. The module and server can utilize public key...
Secure computing system, secure computing method, secure computing
apparatus, and program therefor
A third secure computing apparatus generates data Wb associated with each bit b of a segment t that satisfies a relation m.sub.A=s*t for a first input value...
DRAM security erase
A memory includes a DRAM array having memory cells, wordlines and bitlines coupled to the memory cells, and sense amplifiers. The memory can be configured to...
Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
Guiding a user to safety from the premises of an industrial plant
A method, safety route guiding device and a computer program product enables users in the premises of an industrial plant to reach safety in case of an...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Image forming apparatus equipped with secure print function, method of
controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
Method for protecting the integrity of a fixed-length data structure
One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be...
Secure data copying
A method, computer program product, and system for the anonymization of sensitive data from a plurality of selected business objects or tables stored in a...
Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
Distributed privacy framework system and method of implementation
An apparatus, program product and method for managing access to a secure, encrypted webserver. A user computer may communicate through a cloud server with the...
Matrix code for encryption, storage, and transmission of data
A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and...
Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of...
Enhanced security SCADA systems and methods
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security...
Method and apparatus for enhanced file system monitoring on mobile
A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events...
System and method for distinguishing human swipe input sequence behavior
and using a confidence value on a...
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Method for accessing a plurality of services by a mobile terminal user,
and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
Cache structure for a computer system providing support for secure objects
A method (and structure) of enhancing efficiency in processing using a secure environment on a computer, includes, for each line of a cache, providing an...
System and method for real-time transactional data obfuscation
A system and method for providing transactional data privacy while maintaining data usability, including the use of different obfuscation functions for...
Procedure for the preparation and performing of a post issuance process on
a secure element
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
Portable data carrier having operating error counter
In a method in a portable data carrier for securing the data carrier against external attacks on the data carrier, there is employed at least one counter in the...
Security device for functional display, security, and charging of handheld
A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels...
Multiple-zero-point riflescope turret system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and an aiming reference system. The multiple-zero-point...
CQI transmission power control method and apparatus for wireless
communication system supporting multi-cell HSDPA
A CQI transmission power control method is provided for transmitting CQIs of multiple cells is provided for a multi-cell HSDPA system in which multiple cells...
Secure aircraft data transmission using multiple communication channels
Provided are methods and systems for terrestrial data transmission between aircraft and external networks, such as airline networks and/or airport networks....
Method for exporting on a secure server data comprised on a UICC comprised
in a terminal
A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the...
Method, device, and system for network-based remote control over
contactless secure storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
Localized visible light communications among wireless communication
A method and apparatus for monitoring a localized region of a touch screen for a plurality of sensor inputs to identify a camera profile of at least one user...
Android-based secure handheld network access device and micro-USB version
of IEEE 802.15.4 bridge for ACSD networks
This disclosure focuses on the development of a micro-usb module that allows a smart-device to transmit and receive IEEE 802.25.4 messages via a connection...
Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
Method, cryptographic system and security module for descrambling content
packets of a digital transport stream
A method and cryptographic system for descrambling content packets, included within a digital transport stream, having conditional access messages and header...
Emergency alert system and program for portable devices
A system and software application that communicates with a central service for alerting a security service that help is needed, wherein an application running...
Transmitting appliance-specific content to a user device
Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party...
Sending out-of-band notifications
Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP)...
Techniques for data security in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
System and method for creating and applying categorization-based policy to
secure a mobile communications...
A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the...
Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...