At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dynamic de-identification and anonymity
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to...
Reporting and management of computer systems and data sources
A system and method are provided for managing data, such as for example security or other business data. For the example of security data, security data is...
Systems and methods for data verification and replay prevention
A system and method are provided for the secure sharing of information stored using cloud storage services and for performing data verification and replay...
Automatic data protection in a computer system
Techniques are provided for a data security system that includes two mappings: a first mapping that maps a security policy to sensitive type and a second...
Secure mobile interface access system
A method performed by one or more server devices connected to a mobile device via a network, the mobile device being connected to an electronic device is...
Updating changes to caches
Embodiments relate to systems and methods for updating changes to caches. In aspects, a provisioning server can receive by a hardware processor a security data...
Systems and methods of secure domain isolation involving separation kernel
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
Systems, methods and computer programs providing impact mitigation of
Disclosed is a method and system to operate a governed data processing system in concert with a governing data processing system. The method includes operating...
Document encryption and decryption
A document encryption and decryption system and method for selectively encrypting and decrypting files and attachments, electronic mail, text messages, and any...
System and method of security management for a virtual environment
A system and method can support security management in a computing environment that includes one or more virtualized machines to which one or more applications...
Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who...
Systems, methods and computer program products including features of
transforming data involving a secure...
Systems and methods for transforming data involving a secure format from which the data is recoverable. In one implementation, there is provided a method of...
Dividing a power input and directly providing divided power to an output
terminal in a power control circuit
A memory card with a smart card function including a flash memory unit, a data processing control unit, and a power control unit is provided. The data...
Distributed virtual storage cloud architecture and a method thereof
The present disclosure relates to a distributed information storage system which functions as virtual cloud storage overlay on top of physical cloud storage...
Apparatuses, methods and systems for a virtual security camera
The APPARATUSES, METHODS AND SYSTEMS FOR AN ONLINE BEHAVIOR MONITOR ("OBM") transform user social-gaming behavioral pattern data via various OBM components into...
Wi-Fi access point and system for establishing data transmission channel
A Wi-Fi access point (AP) is provided. The Wi-Fi AP includes a femtocell signaling interface, a WAN interface, a Wi-Fi AP radio access interface, and a...
Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
In-circuit security system and methods for controlling access to and use
of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
Content-based security processing using distributed scan management
A method and apparatus is provided for processing acquired document data, using distributed scan management protocols, according to a security classification of...
Valid replacement data in encoded video
A security method for H.264 video streams and the like is provided that comprises: coding video data with incorrect or missing bytes, whereby the coded video is...
Method and system for prevention of control word sharing
A method and system of preventing control word sharing, the method and system including receiving a temporal key, denoted TK.sub.i, at a removable security...
Portable electronic entity capable of receiving broadcast multimedia data
A portable electronic entity includes a communication interface (110) with a host terminal (TH), a conversion system (170) for a signal received in a secure...
System and method for securing the data and information transmitted as
A system for securing data and information transmitted via entails is disclosed. The system includes a sender-side device from which an email including a first...
Systems and methods for implementing computer security
A computing device includes a security control module to monitor and control security of the operating system and security of one or more applications executing...
Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
Detecting computer security threats in electronic documents based on
In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages,...
Directing audited data traffic to specific repositories
Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules...
Method and apparatus for creating custom access control hierarchies
The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an...
Method and system for securely establishing cryptographic keys for
A method and system for encrypting communications between two aircraft on the ground at an airport. Each aircraft is coupled to a ground network via a broadband...
Security-enhanced cloud system and security management method thereof
A security-enhanced cloud system is provided. The system includes a mobile terminal for creating fingerprint recognition information and face recognition...
Network authentication method for secure user identity verification
In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted...
Browser plug-in for secure credential submission
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
Method of transferring the control of a security module from a first
entity to a second entity
A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain...
Method and apparatus of handling data decryption for a packet data
convergence protocol layer in a wireless...
The present invention provides a method of handling data decryption for a Packet Data Convergence Protocol layer of a user equipment upon handover in a wireless...
System and method for automatic data security back-up and control for
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
Distributed multi-processing security gateway
Systems and methods for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
Data prioritization, storage and protection in a vehicular communication
This disclosure is directed to data prioritization, storage and protection in a vehicular communication system. A black box (BB) in a vehicle may receive data...
Security alarm systems and methods for collecting and utilizing condition
A security alarm system having a plurality of features. Among other features, the security alarm system includes a plurality of secondary sensors, which refers...
Automatically generating event objects from images
A mobile data analysis system is provided that enables mobile device location tracking, secure messaging, and real-time sharing of intelligence information,...
Systems and methods for encoded alias based transactions
Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to...
System for analyzing security compliance requirements
A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework.TM.. The system...
Method and system for management of security rule set
There are provided a method of automated managing one or more security rule-sets and a system thereof. The method comprising: obtaining data characterizing a...
Protection device, protection software, and protection method for
controlling external device
A protection device controlling an external device is provided having a mode detector, security data, a data detector, and a controller. The external device...
Secure mechanism to switch between different domains of operation in a
A data processing apparatus including processing circuitry having a secure domain and a further different secure domain and a data store for storing data and...
User interface for secure virtual document management system
A user interface for a virtual file management system that provides user access to managed content on mobile devices. The system comprises storage domains...
Method and apparatus of securely processing data for file backup,
de-duplication, and restoration
Disclosed are an apparatus and method of de-duplicating at least one data file. One example method may include requesting a list of data rows stored in a...
Sensitive personal information data protection
A computing device may be configured to provide operations related to providing additional security for sensitive personal information (SPI) in data records of...
Method for securing a transaction performed with a programmable portable
A method for securing a transaction between a transaction device and an external device is described. The transaction device includes a communication...