At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for providing password-free, hardware-rooted, ASIC-based
authentication of a human to a...
Biometric data are obtained from a biometric sensor on a mobile device, containing an ASIC, which is connected to or incorporated within it. The mobile device...
Real identity authentication
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored...
Information processing apparatus and program execution method
According to one embodiment, an information processing apparatus includes a processor, a main memory, and a memory controller. The memory controller executes an...
Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
End-to-end trusted communications infrastructure
A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being...
Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
Near-field communication authentication
Various aspects are directed to circuit apparatuses, portable electronic devices, and executable applets pertaining to storing and providing secure access to...
Molecular receptor-based chemical field-effect transistor (CHEMFET)
devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
Proctored performance analysis
Systems and methods described herein provide for administering and proctoring of a secure online exam that allows for complex testing utilizing practical...
Secure point of sale presentation of a barcode at an information handling
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
Printing device, printing control method and recording medium capable of
interruption printing with high security
A LAN control unit receives print data from a client device or the like. An input job storage unit registered on a hard disk a series of PDL commands included...
Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...
Development of business applications
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be...
Encrypting and storing confidential data
Data storage circuitry for securely storing confidential data and a data processing apparatus for processing and storing the data and a method are disclosed....
Method for secure production printing
A method for printing a composite document creates a fixed data unit for a composite document, the fixed data unit being a portion of an individual document...
Persistent host determination
A system comprises a security manager to scan a network for host instances representing hosts on the network at that time, and record characteristics of the...
Application authentication method and electronic device supporting the
A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a...
Techniques and logic are presented for encrypting and decrypting programs and related data within a multi-processor system to prevent tampering. The decryption...
Data security system for a navigation system
A data security system for a navigation system comprising an enabling/disabling unit for enabling or disabling a data transfer from a data memory to a data...
Method and apparatus for transmitting/receiving a reference signal in a
wireless communication system
A method and apparatus for transmitting/receiving reference signals in Long Term Evolution (LTE) and LTE-Advanced (LTE-A) systems includes determining whether a...
Apparatus for transceiving point to point moving signal reception high
channel using horizontal blanking...
Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking...
Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
Method and system for managing data in a communication network
A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving (502) metadata associated with a...
Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
Client-configurable security options for data streams
A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a...
Blacklisting and whitelisting of security-related events
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
Border property validation for named data networks
One embodiment provides a system for distributing packets within a trust domain. During operation, the system receives, by an ingress node in the trust domain,...
Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
Integrity protection and/or ciphering for UE registration with a wireless
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a...
Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries...
Method and apparatus for transmitting and receiving data based on secured
path bandwidth in network established...
A method and apparatus for transmitting and receiving data. The method and apparatus previously determines a validity of a data transmission path for...
Systems and methods for "machine-to-machine" (M2M) communications between
modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the...
Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Method and apparatus for remotely communicating vehicle information to the
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
Identifying participants for collaboration in a threat exchange community
Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat...
Secure communication architecture
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
Method and apparatus for data security reading
A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a...
Method and apparatus for privacy and trust enhancing sharing of data for
One embodiment of the present invention provides a system for privacy-preserving sharing of data for secure collaboration. During operation, the system obtains...
Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
Linear address mapping protection
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
Context-aware permission control of hybrid mobile applications
Controlling access to secure resources of a data processing system is provided. An input-to-output mapping of an application installed on the data processing...
Method and system for securing the entry of data to a device
A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device...
System and method of enhancing security of a wireless device through usage
A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data...
Security in enterprise level business information networking
Systems, apparatus, and methods for implementing enterprise level social and business information networking are provided. Users can receive relevant...