At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method for protecting real-time safety and security relevant
A system for generating and detecting watermarks within a video frame (e.g., video content) is described to determine whether a data interruption has occurred....
Device and method in wireless communication system and wireless
There is disclosed a device and method in a wireless communication system and a wireless communication system, the device including: a secure channel...
Multi-factor mobile user authentication
A system and method are disclosed herein leveraging financial networks standards with mobile device data and secure processing and storage environment knowledge...
Person tracking and privacy and acceleration of data using autonomous
A mechanism is described for facilitating person tracking and data security in machine learning at autonomous machines. A method of embodiments, as described...
Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
Secure public cloud with protected guest-verified host control
A host Virtual Machine Monitor (VMM) operates "blindly," without the host VMM having the ability to access data within a guest virtual machine (VM) or the...
Fine-grained access control for data manipulation language (DML)
operations on relational data
Embodiments allow, within database security policies, the grant of data change operation-specific privileges to particular users to be applied within particular...
External secure unit
A method for operating an external secure unit comprises at least a memory for storing data, a processor for processing the data, at least one interface for...
Security through layers in an intelligent electronic device
The present disclosure provides for improving security in a meter or an intelligent electronic device (IED) through the use of a security key which is unique to...
Storage media abstraction for uniform data storage
A storage abstraction system is described herein that exposes storage from an operating system as a uniform storage device and abstracts from applications the...
Non-volatile memory for secure storage of authentication data
A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the...
Automated evaluation of computer programming
Techniques are described for analysis and evaluation of different computer programs developed by different users to accomplish programming tasks. A computer...
Method for capturing, storing, accessing, and outputting digital content
A method for capturing and outputting digital content is herein disclosed and enabled, the output system includes an information apparatus, a server, and a...
System and method for data storage, transfer, synchronization, and
A system for storing and transmitting data in a highly compact format comprising reference codes to data chunklets contained in a library, wherein the data are...
Automated drone systems
An automated drone security system for surveilling a location includes one or more drones with onboard sensors and an imaging device for measuring surveillance...
Systems and methods for detecting threats and contraband in cargo
The present specification discloses systems and methods for identifying and reporting contents of a tanker, container or vehicle. Programmatic tools are...
Fixed drone visualization in security systems
An unmanned aerial vehicle is described and includes a computer carried by the unmanned aerial vehicle to control flight of the unmanned aerial vehicle and at...
Elongate printhead having robust electrical assembly
An inkjet printhead includes: a rigid elongate carrier having an ink supply channel and a lower surface having a plurality of printhead chips mounted thereon; a...
Apparatus, system, and method of wirelessly transmitting and receiving
A wireless media player and a related system and methodology. One feature of the wireless media player system pertains to a virtual connector system, apparatus,...
Securely communicating a status of a wireless technology device to a
A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status...
Secure systems and methods for establishing wireless audio sharing
A system and method for tethering wireless audio devices. The method includes establishing a first wireless connection between an intermediary device and a...
Securing communications for roaming user equipment (UE) using a native
A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a...
Method and apparatus for dynamic configuration of a multiprocessor health
A health monitoring system which can collect data generated from multiple health, fitness, and environmental data generating devices by a health application...
System and method for time based anomaly detection in an in-vehicle
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the...
Efficient and secure user credential store for credentials enforcement
using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
Constructing graph models of event correlation in enterprise security
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated by...
Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
Secure integration of independent cloud foundry applications in a fiori
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if read...
System and method for secure control of resources of wireless mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
Pre-authenticated identification token
A pre-authenticated token system includes an identification token having a switch, a transmitter and receiver circuit, and a sensor; a docking station having...
Systems and methods for secure storage and management of credentials and
A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform....
System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
Stateless access stratum security for cellular internet of things
Aspects of security schemes (e.g., integrity protection, encryption, or both) are described. A measure of access stratum security can be realized without...
Systems, methods, and media for a cloud based social media network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
Asymmetrical encryption of storage system to protect copyright and
Robust security of copyright-protected content is provided when such content is digitally stored in a storage device of a client device in encrypted form. The...
Secure processing environment for protecting sensitive information
A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may...
Method for dynamic adjustment of a level of verbosity of a component of a
A method for dynamic management of a first level of verbosity of a component defined in a data network, the data network having a control center, each component...
Peer discovery, connection, and data transfer
Implementations relate to peer-to-peer discovery, connection, and data transfer providing privacy protection and increased security features.
Setting a password on a device
Embodiments disclosed herein provide a server, a device and methods for providing security data to a device requiring a password for use in protecting a...
Method and apparatus for secure communications in networks
An unencrypted media access control layer (MAC) protocol data unit (MPDU) having a header is received at a wireless network interface device. The header...
Homomorphic processing unit (HPU) for accelerating secure computations
under homomorphic encryption
Fully homomorphic encryption integrated circuit (IC) chips, systems and associated methods are disclosed. In one embodiment, an integrated circuit (IC)...
Payment device with data entry keys
A payment device with data entry keys which are obscured from view when not in use. An example payment device includes a plurality of data entry keys for...
Method and apparatus of providing real-time feedback for magnetic secure
A user terminal comprising: i) a display module comprising a display screen and an interface circuitry for receiving a user input; and ii) a magnetic stripe...
System of shared secure data storage and management
This disclosure relates to a storage provider for storing first encrypted data associated with first meta tags from a first publisher and second encrypted data...
Data source based application sandboxing
A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having...
Method for controlling security system and electronic device thereof
A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display, a...
Robust data tagging
Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added...
Secure memory implementation for secure execution of virtual machines
An embodiment involves secure memory implementation for secure execution of virtual machines. Data is processed in a first mode and a second mode, and commands...