At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for secure remote storage
Systems and methods are provided for transmitting data to at least one storage system. A request is received to store a data set in a storage location. In...
Hybrid firewall for data center security
A system and method for managing a hybrid firewall solution, employing both hardware and software firewall components, for a cloud computing data center is...
Code tampering protection for insecure environments
In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow...
Print function system and method for secure cloud data storage
A system and method of transferring data between human readable documents using a virtual print driver is disclosed. A first user's computer has a standard text...
Managing hidden security features in user equipment
A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first...
Mobile messaging hub enabling enterprise office telephone numbers
A messaging hub provides communication services for user devices associated with an enterprise office telephone number. The messaging hub establishes a secure...
Social media and data sharing controls for data security purposes
Social media and data sharing controls may be provided. Upon receiving a request to transmit an element of data to a recipient, a determination may be made as...
Security for network delivered services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
Systems and methods for improved multisite management and reporting of
converged communication systems and...
The present invention discloses improved systems and methods for multisite management of computer server systems and in particular converged communication...
Security protocols for mobile operator networks
Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media...
Tool for the centralized supervision and/or hypervision of a set of
systems having different security levels
A tool for the supervision and/or hypervision of a set of systems of different security levels, the systems transmitting messages, includes a display system,...
Method and system for securing user identities and creating virtual users
to enhance privacy on a communication...
A method of enabling a real entity to access a service on a communication network using a virtual entity, the method including the steps of establishing a user...
System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device operated by a second user includes a database that is in...
Secure software authenticator data transfer between processing devices
A method comprises establishing a network connection between the first processing device and the second processing device for transfer of data associated with a...
Client/server security by an intermediary rendering modified in-memory
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
Load balancing among a cluster of firewall security devices
A method for balancing load among firewall security devices in a network is disclosed. Firewall security devices are arranged in multiple clusters. A switching...
Method and system for traffic isolation in a network
One embodiment of the present invention provides a system that facilitates traffic isolation (TI) in a network. During operation, the system configures a set of...
System and method for providing network support services and premises
gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
System and method for temporary secure boot of an electronic device
The invention discloses system and method of temporary secure boot process of an electronic device. The method comprises: generating a first token according to...
Encryption processing device, encryption processing method, and program
An encryption processing device including an encryption processing part configured to divide configuration bits of data to be data processed into plural lines,...
Optimizing security bits in a media access control (MAC) header
A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol...
Secured communication in network environments
A computing device can obtain a session key for encrypting data that is communicated between a client device and the computing device. The computing device can...
Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
FPGA configuration data scrambling using input multiplexers
Circuits, methods, and apparatus that provide for protection of configuration bitstreams from theft. One exemplary embodiment receives a scrambled configuration...
Battery management for a breathing assistance system
A method for providing battery security in a breathing assistance system configured to provide breathing assistance to a patient is provided. A battery security...
Apparatus and method for controlling refreshing of data in a DRAM
An apparatus comprises a dynamic random-access memory (DRAM) for storing data. Refresh control circuitry is provided to control the DRAM to periodically perform...
Method and control arrangement to secure an alarm system
A method and control arrangement to secure an alarm system in a site to be monitored. The readiness to forward an alarm out of the site is monitored with a...
Immediate response security system
Aspects of the present disclosure involve an intelligent and immediate response security system configured to provide continuous and immediate security data to...
According to one example, there is provided a method of generating a security feature that encodes data. The method comprises obtaining an n-bit code of data to...
System and method for security-aware master
A security-aware master is provided, such that a master can determine its security state before attempting access to secure resources or before requesting...
On-demand database service system, method and computer program product for
conditionally allowing an...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
Trusted security zone access to peripheral devices
A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the...
Preventing the loss of sensitive data synchronized with a mobile device
A mobile device identifies a secure document that contains one or more context rules that correspond to the secure document. The mobile device determines...
System, method and computer program product for conditionally sharing an
object with one or more entities
In accordance with embodiments, there are provided mechanisms and methods for conditionally sharing an object with one or more entities. These mechanisms and...
Method for secure software resume from low power mode
Systems, methods, and other embodiments associated with a secure software resume from low power mode are described. According to one embodiment, a method...
Method and apparatus for determining virus-infected files
Disclosed in the present invention are a method and apparatus for determining a virus-infected file, which belong to the field of computer security. The method...
Fuel dispenser user interface system architecture
A vending machine can include a touch display and a touch controller operatively connected to the touch display and configured to transmit display data to the...
Methods, systems and apparatus for managing data entries on a database
A method for securely storing password information in a memory of a computer device. The stored password information is protected by a master password. The...
Securing virtual machines with optimized anti-virus scan
The present disclosure provides for performing virus scans at a storage device that stores one or more virtual machine disk image files (VMDK files). A secure...
Network based management of protected data sets
A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected...
Femoral arthroplasty jig
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
Method for user equipment setting security with network in wireless
communication system and apparatus for same
In the present invention, a method for a user equipment transmitting/receiving a signal with a network in a wireless communication system is disclosed. More...
Systems and methods for remote authorization of financial transactions
using public key infrastructure (PKI)
The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality...
Apparatus and method for multimedia service
An apparatus and method are provided for securing service quality in multimedia services. The method includes arranging media data samples in each data frame...
Method and system for remote data access using a mobile device
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
Method and apparatus for generating a security token carrier
A method and an apparatus for generating a security token carrier, which belong to the field of data security, are disclosed. The method may include: generating...
Switch equipment and data processing method for supporting link layer
A switch equipment and data processing method for supporting link layer security transmission are provided. The switch equipment for supporting link layer...
Encrypting data using time stamps
A system including a time stamp module, an encryption module, and a packet generator module. The time stamp module is configured to generate a time stamp for a...
Secure wireless network-based activation for table-side information and
A new table-side device is seamlessly and securely integrated to an existing (primary) Wi-Fi network within an operating environment at a restaurant location....
Secure authentication of identification for computing devices
In the field of computer and data security, the identifier (ID) of a computing device is protected by providing a secure signature used to verify the ID. The...