At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for environmental testing and evaluation of
non-destructive inspection sensors
A system and method for environmental testing and evaluation of non-destructive inspection (NDI) sensors is provided. The system has a structure having a...
Bandwidth guaranteed system, radio node device and bandwidth guaranteeing
To establish an alternative path without giving an influence on signal continuity to a data transmission line to which a communication bandwidth cannot be...
Mobile device and method to monitor a baseband processor in relation to
the actions on an applicaton processor
A method and device to analyze the security of a mobile terminal having application and baseband processors are described. Various information may be acquired...
Security method for the verification of an information retrieval request
The invention is related to security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a...
Methods and devices for OTA management of subscriber identity modules
Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a...
System and method for managing OTA provisioning applications through use
of profiles and data preparation
A method using a non-transitory processor for providing an application product including receiving an application profile, a key profile, a secure element (SE)...
Method and apparatus for handling handover procedure
The present invention provides a method for handling a handover procedure for a Radio Resource Control (RRC) layer in a user equipment (UE) of a wireless...
Method and system for global navigation satellite system configuration of
wireless communication applications
Methods and systems for global positioning navigate satellite system configuration of wireless communication applications may comprise in a wireless...
Billing varied service based on tier
A mobile communication device that monitors and reports consumption of multi-tiered communication services is disclosed. The mobile communication device...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for backing up data include securely connecting at least first and second privately addressed computers over a network,...
Method and apparatus for enhancing communication security
A method and apparatus can be configured to transmit indicators to a network entity. The indicators indicate whether security will be applied to a media data,...
Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
Cross-domain object models for securely sharing information between
network security domains
Techniques are described for controlling transfer of information in a secure manner across multiple network security domains. As described herein, cross-domain...
Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
Network coding-based anonymous communication
A computer-based peer-to-peer anonymous networking using a coding scheme with a formal information theoretic security characterization to construct a...
Systems and methods for secure remote access
Embodiments of the disclosure can include systems and methods for secure remote transfers. The onsite monitoring system secure file transfer solution can allow...
Plant communication network
An embodiment of the disclosure provides a communication network having a plurality of end devices protected by multilayer switches that receive data packets in...
White-list firewall based on the document object model
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to...
MAC aggregation with message multiplicity for use in a multi-node data
A MAC aggregation technique utilizing a large field addition operation is disclosed. The large field addition operation defines the addition of two or more MACs...
Data security system
A data security system that includes a first memory device to store message data to be secured, a second memory device to store microcode including an...
Information processing device and computer program product
According to an embodiment, a device includes a processor unit, a control unit, a setting unit, a writing unit, and an executing unit. The processor unit is...
Data storage medium having security function and output apparatus therefor
Provided are a storage medium, which has a security function, for storing media content and an output apparatus for outputting data stored in the storage...
Security monitoring with programmable mapping
An integrated security arrangement is implemented in a variety of embodiments. In one such embodiment an integrated security arrangement includes a plurality of...
Tablet based kiosk
A tablet based kiosk to securely support a tablet such as a personal computer to receive, transmit and display information or data comprising a tablet mount...
In-network online storage with increased session bandwidth
A system includes a private communications network to provide content to a user using a first, base amount of bandwidth, a policy server, coupled to the...
Wireless mobile transaction system and the procedure for carrying out
transactions with a mobile phone
The invention belongs to the field of systems for provision of computer-supported transactions with the use of a mobile phone, more exactly to the field of...
Electronic commerce with cryptographic authentication
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received...
Information processing apparatus, method of controlling same, and storage
An information processing apparatus which is capable of ensuring mutual security in cases where security information is displayed in a state in which an image...
Security model for workflows aggregating third party secure services
A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model...
Systems, methods, and computer medium to securely transfer business
transactional data between physically...
Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are...
Method for protecting security of data, network entity and communication
The present invention relates to communication technologies and discloses a method and an apparatus for protecting security of data, so as to solve the problem...
Data driven system for responding to security vulnerability
A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a...
Runtime based application security and regulatory compliance in cloud
A mechanism is provided in a data processing system for runtime based application security. The application runtime environment executing within a virtual...
Biometric verification with improved privacy and network performance in
The present invention relates to improving the privacy of biometric information used in biometric authentication of identity by retaining all biometric...
System and method for supporting agile development in an enterprise crawl
and search framework environment
Systems and methods for providing an enterprise crawl and search framework, including features such as use with middleware and enterprise application...
Circuit structure on flexible printed circuit substrate having one end
with shape corresponding to SIM card and...
A circuit structure is utilized in circuit connection in a hand-held mobile communication device. The circuit structure is enabled to interconnect electrically...
Systems, methods, and apparatuses for testing mobile device applications
Aspects of the present disclosure generally relate to systems and methods for facilitating optimization of mobile application testing. In one embodiment, a...
Disk array control apparatus, disk array apparatus, and disk array control
To provide a disk array control apparatus which enables security of data from a host controller along with prevention of the degradation of process performance...
Environment preserving cloud migration and management
A system and method of operation is disclosed describing migration, management, and operation of applications and servers from customer data centers to cloud...
Secure memory system with fast wipe feature
A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data...
Virtualization, optimization and adaptation of dynamic demand response in
a renewable energy-based electricity...
In a renewable energy-based electricity grid infrastructure, distributed data analytics enable modeling and delivery of an appropriate, time-sensitive, dynamic...
Coordination of multipath traffic
In one implementation, traffic in a mobile network is directed across multiple paths to a single cloud server or security server (e.g., a security as a...
An identification module (such as a SIM card) for securely providing a mobile identity to a mobile data network for use in identifying mobile equipment in which...
Method for provisioning high speed wireless infrastructure
Several million television receive antennas installed on roof tops in the US and around the world. A method is disclosed that uses each of the millions of...
Method and apparatus for providing enhanced communications
Call service centers typically require a user to confirm its identity by manually entering identification. An embodiment of the present invention uses a client...
Methods, devices and systems for establishing end-to-end secure
connections and for securely communicating data...
The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely...
Techniques for sensor based attack reflection
Techniques for sensor based attack reflection are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for sensor based...
Transmission apparatus, reception apparatus, communication system,
transmission method, and reception method
Provided is a transmission apparatus capable of avoiding unnecessary decryption and preventing a denial-of-service attack. The transmission apparatus that...