At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Compromised insider honey pots using reverse honey tokens
According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain...
Automated security analytics platform with pluggable data collection and
Pluggable network security modules provide a collaborative response across plural networks by allowing modules associated with detection and neutralization of a...
Refinement-based security analysis
A method, computer program product, and computer system for assigning, by a computing device, a value to a first data-flow of a first summary associated with a...
Secure method to exchange digital content between a scanning appliance and
A method and apparatus for exchanging digital content between a scanning appliance and a mobile device are disclosed. In one embodiment, the method comprises:...
Propagating security identity information to components of a composite
Various methods and systems for propagating identity information in a composite application are presented. State data of a composite application, as executed...
Method for adapting security policies of an information system
The present invention refers to a method for adapting security policies of an information system infrastructure as a function of attacks on the system by...
Device and method for automatic driver installation
Provided are a device and method for automatic driver installation. The device comprises: a remoter server, a client host and an information security device....
Method and apparatus for securely storing data in a database
A method of securely storing data in a memory on a computer including a processor is provided. The method includes receiving unencrypted data; randomly...
Technique for supporting multiple secure enclaves
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
Secure data handling in a computer system
A computer system includes a first storage area accessible by an operating system and a second storage area accessible by authorized functions only. According...
Computer security system and method
A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a...
Fully authenticated content transmission from a provider to a recipient
device via an intermediary device
A method, system, and computer readable medium containing programming for handling fully authenticated transmission of video or other data (content) from a...
Offline data access using trusted hardware
A cryptographically-secure component provides access-undeniability and verifiable revocation for clients with respect to downloaded content items from a server....
Systems, devices, and methods for securely transmitting a security
parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
Method of identification or authorization, and associated system and
Method of identification or of authorization using a system comprising at least one sensor for acquiring biometric data and one secure module storing a set of...
Security infrastructure for cloud services
A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during...
System and method for providing load balanced secure media content and
data delivery in a distributed computing...
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
Wireless internet access module, communication method for host and
wireless internet access module, and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with...
Portable communication USB device for providing mobile internet access
service or for providing other...
A portable USB device that enables mobile Internet accessing service is disclosed. The portable USB can be plugged into an external USB port of a computing...
Intelligent network interface controller
A network interface for the secure transmission of data comprises a functionally encapsulated unit that encompasses the elements required to ensure a minimum...
Method for downloading software
A method for downloading software from a host device to an electronic device through a communication line, which, even when the download is interrupted, can...
IPsec connection to private networks
A server hosting system and method of connecting to managed servers using IPsec are disclosed. The server hosting system includes a plurality of managed...
Dynamic visual statistical data display and method for limited display
Embodiments include methods for distributing visual display information related to a plurality of items to one or more display devices, and methods for...
System and method for enabling custom portfolio definition in an IP
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
Secure witness or criminal participant location or position and time
recording information apparatus, systemts...
An apparatus, system or method for use of encrypted or confidential location or position, time, and unique identifier information (LPTI Information) comprising...
Method and system for transmitting location data
The disclosure discloses a method and a system for transmitting location data. The method comprises at least one step of that: the location data is transmitted...
Method for positioning target terminal while protecting privacy of user
A method of providing location information of a target Secure User Plane Location (SUPL) Enabled Terminal (target SET) while protecting privacy of a user of the...
Methods of wirelessly providing data between applications of a first
electronic device and a second electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
Mobile communication terminal and method
A mobile communication terminal used in wideband code division multiple access (WCDMA) 3G mobile communication includes: a communication terminal unit...
Voice-over-IP (VoIP) systems, components and methods for providing
enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
Relay communication apparatus and multistage relay communication system
A multistage relay communication system 100 includes a trunk network 1 and branch networks 2 (2a, 2b), each of which includes one or more communication...
Data breakout at the edge of a mobile data network
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The...
System to provide a security technology and management portal
A system to facilitate management of surveillance devices, that are distributed over a monitored region, through a geographic information (GI) portal, having GI...
Thin film transistor substrate and method for fabricating the same
The present invention relates to a thin film transistor substrate and method for fabricating the same which can secure an alignment margin and reduce the number...
Smart card reader with a secure logging feature
A secure smart card reader is disclosed that is enabled to make reader signatures on data representative of events and actions which may be security related and...
Drill bit-mounted data acquisition systems and associated data transfer
apparatus and method
A data acquisition module comprising a base sized and configured for disposition within a shank of a drill bit bore and an extension protruding therefrom having...
Systems and methods for providing anonymized user profile data
Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the...
Security risk aggregation and analysis
Methods and apparatuses, including computer program products, are described for transaction-based security risk aggregation and analysis. A server computing...
Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
Method and system for securing data from a non-point of sale device over
an external network
A data control system prevents non-point of sale devices (135, 155) from sending data over an external network (160) via a secure connection reserved for point...
Apparatus and security system for data loss prevention, and operating
method of data loss prevention apparatus
Disclosed are a DLP security system and an operating method thereof. An operating method of a data loss prevention (DLP) apparatus, comprising: converting, into...
Adaptive strike count policy
An adaptive strike count management is implemented for securing resources. The method authorizes access to a resource if a security credential matches...
Identity management via cloud
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving...
System and method for copying protected data from one secured storage
device to another via a third party
A third party is configured to establish a virtual secure channel between a source SSD and a destination SSD via which the third party reads protected digital...
Provisioning access control using SDDL on the basis of a XACML policy
A method is disclosed, and a corresponding data carrier and policy converter, for producing at least one Security Descriptor Definition Language, SDDL, rule...
Self-generation of virtual machine security clusters
A method of operating a virtual computing system includes receiving at a security controller security data corresponding to a candidate virtual machine that is...
Isolating tenants executing in multi-tenant software containers
Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants...
Pairing of angle sensor and electronic control unit
Various embodiments relate to a tamper-proof vehicle sensor system and a related method for sending secure packets between components. A sensing unit may...
Systems and methods for secure third-party data storage
A computer-implemented method for secure third-party data storage may include 1) identifying, at a server-side computing device, a request from a client system...
Data card verification system
To verify a pair of correspondents in an electronic transaction, each of the correspondents utilizes respective parts of first and second signature schemes. The...