At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for cognizant transport layer security (CTLS)
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic...
Onboard access control system for communication from the open domain to
the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end...
Secure identity and personal information storage and transfer
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with...
Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the...
Method and device for utilizing application-level prior knowledge for
selectively storing data in higher...
A method for selectively storing data identified by a software application in higher performance media may include executing control programming for an...
Device and method for facilitating secure communications over a cellular
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
Secure data transfer in a virtual environment
In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context...
System and method for providing an enterprise deployment topology with
thick client functionality
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to...
Multi-modality, multi-resource, information integration environment
A multi-modality, multi-resource, information integration environment system is disclosed that comprises: (a) at least one computer readable medium capable of...
Ensuring integrity of security event log upon download and delete
A cloud deployment appliance includes a mechanism to enable permitted users to move event records reliably from an internal event log of the appliance to a data...
Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface...
Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is...
Systems and methods for regulating the receipt of data transmitted from a
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a...
Method and apparatus for auxiliary communications with mobile
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden...
Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
Advanced container security device network protocols
In one preferred embodiment, a set of air interface protocols (AIPs) provides a method for secure wireless-to-IP communication between conveyance-mounted...
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
Wireless architecture in support of voice and data communications
A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals...
Mobile, secure and customizable emergency service gateway system
A mobile, secure and customizable emergency communication gateway system for providing effective electronic data communications for emergency personnel in a...
Security device implementing flow lookup scheme for improved performance
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow to...
Apparatus and methods for network resource allocation
Methods and apparatus for allocating resources (such as communications bandwidth) using a network access device. In one embodiment, the network includes a...
Printing device and printing method generating watermark information
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
Method for a secure non-volatile logging in an active RFID tag of a
process in a tagged article
Prior to logging of a process flags for locking at all addresses of a logging area of a tag are set to state 1 by means of an interrogator. A high limit (h) and...
Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
Access control system
An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage...
Process, device, and system to cap and seal oil and gas in a riser pipe
A containment valve assembly using the upcoming pressures to control the flow of oil/gas through a riser pipe with a stop flow plug positioned within the valve...
Embedded ring oscillator network for integrated circuit security and
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method...
Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently...
Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
Systems and methods for using transport stream splicing for programming
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
Systems and methods for providing mobile security based on dynamic
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
Processor and data processing method with non-hierarchical computer
security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
Use of data links for aeronautical purposes without compromising safety
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
Adaptive policies and protections for securing financial transaction data
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
Method of performing a secure application in an NFC device
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is...
Dual cookie security system with interlocking validation requirements and
remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value....
System for data flow protection and use control of applications and
portable devices configured by location
The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed...
User transparent virtualization method for protecting computer programs
and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to...
Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user...
Method and apparatus for secure communications through a trusted
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a...
Data capture for secure protocols
This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface...
Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The...
Encapsulation of secure encrypted data in a deployable, secure
communication system allowing benign, secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
Managing security in solid-state devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...