At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mobile core client architecture
Methods and systems are disclosed for automatically managing multiple types of applications, electronic forms, electronic forms data instances, network services...
Self describing configuration
Systems and methods are provided for self-describing configurations of cloud-based applications for data security providers monitoring communications between a...
System and protocol for remote supervisory parental observation,
interaction, and management of media content...
Embodiments of the present invention relate to systems and protocols for a media management application to be used by a supervisor to monitor, manage, and...
Application security capability exchange via the application and data
According to one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is...
Master security policy server
A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the...
Methods for preventing cyber intrusions and phishing activity
Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated...
Configuring the generation of event data based on a triggering search
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
Interface providing an interactive timeline for evaluating instances of
potential network compromise
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
Methods and systems for API proxy based adaptive security
The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and...
Secure unrestricted network for innovation
The present disclosure relates to a system and method for transporting data within a dual network computing system including a first workstation communicably...
Managing security in messaging protocol communications
Systems and methods are described for management of data transmitted between computing devices in a communication network. An administrative component can...
Managed forwarding element executing in public cloud data compute node
without overlay network
Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter having forwarding elements to which the...
Systems and methods to secure data using computer system attributes
Systems and methods of the present disclosure are directed to a computing system configured to provide seamless protection to data (which can include, without...
Magnetic coupling device with reflective plate and methods for use
Aspects of the subject disclosure may include, for example, a coupling device including a receiving portion that receives a radio frequency signal conveying...
Mobile phone and communication method thereof
A mobile phone and a communication method thereof are provided. The mobile phone includes a mobile phone body and mobile phone accessory, wherein the mobile...
Wireless communication apparatus, wireless communication method, and
wireless communication system
A wireless communication apparatus includes a wireless communication device configured to be capable of executing wireless communication using radio waves, an...
A security checkpoint for verifying whether a user is an authorized user includes: (a) a one-way mirror for concealingly permitting the automated recordation of...
Expense report management methods and apparatus
A system, method, and apparatus for managing expense reports are disclosed. An example apparatus includes an aggregation interface configured to receive, from a...
Systems and methods for authentication of consumer products
Systems and methods for authentication of a consumer product are provided herein. An embodiment of a method for authentication of a consumer product includes...
Interface between near field communications (NFC) controller and secure
Embodiments of an interface system for interfacing between an NFC controller and a secure element are disclosed. In one embodiment, an interface system includes...
Protecting sensitive data
Various examples described herein are directed to systems and methods for securing data. A security system may receive a first record comprising a plurality of...
Self-described security model for resource access
Various embodiments provide techniques and devices for implementing a self-described security model for sharing secure resources between secure applications. In...
Method of security access control for hard disk and hard disk
A method of security access control for a hard disk and a hard disk, where the hard disk includes an Internet Protocol (IP) interface and a control board, and...
User verifying method, terminal device, server and storage medium
The present disclosure provides a user verifying method, a terminal device, a server and a storage medium. The method may include: receiving, by a terminal...
Securing sensitive historian configuration information
Systems and methods for securing configuration information for cloud-based services. A system comprises a data store and data sets including plant process...
Tracing system operations across remote procedure linkages to identify
A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive one or more event notifications...
System and method to reduce storage area usage of android application
A mobile device based on an Android.TM. operating system configure to reduce the size of downloaded Android.TM. application packages. The mobile device...
Image processing device which can improve security at meetings
An MFP is an image processing device which can communicate with external devices such as other MFPs, biological information terminals, a meeting management...
A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having...
Method and system for datacasting and content management
A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system...
System and method for printing documents using print hardware and
automatic print device identification based...
A method for printing a document from a mobile device includes identifying a document to be printed and generating a notification comprising a selection of at...
Systems and methods for establishing and maintaining virtual computing
Networking systems and methods for establishing and maintaining virtual computing clouds are disclosed. A networking system can comprise a server and various...
Custom security browser
A custom browser can be setup or configured by end user to scan, monitor, filter out or eliminate any element of HTTP or HTTPS or Java script code or cookie...
Cognitive information security using a behavioral recognition system
Embodiments presented herein describe techniques for generating a linguistic model of input data obtained from a data source (e.g., a video camera). According...
Network-based approach for training supervised learning classifiers
In one embodiment, a supervisory device in a network receives traffic data from a security device that uses traffic signatures to assess traffic in the network....
Macro grid governance and communication
A governance apparatus and a communication method for communicating within the governance apparatus. The governance apparatus includes a Government. The...
Packet filters in security appliances with modes and intervals
A computer system programmed to provide improved packet capture comprises: a plurality of sensor computers each programmed to capture data packets directed to a...
Data access by external users
Described herein is a framework for providing and securing data access by external users. In accordance with one aspect of the framework, an external schema is...
Hybrid integration of software development kit with secure execution
A portable communication device may include a mobile application executing in an application execution environment and a secure application executing in a...
Method for secure communication using asymmetric and symmetric encryption
over insecure communications
Data may be protected using a combination of symmetric and asymmetric cryptography. A symmetric key may be generated and the data may be encrypted with the...
Data sharing system method
A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of...
Reducing inadvertent data loss in email
A method, mobile device and system are provided for managing and displaying email messages on a device having security classification metadata. The security...
Secure storage encryption system
A system for secure storage of data includes a key database and a processor. The processor is configured to receive a request associated with securely storing...
Method and apparatus for communication in cellular IoT network
The present disclosure relates to a communication scheme and system which fuse a 5G communication system for supporting a higher data transfer rate than a 4G...
Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
Portable intermediary trusted device
In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may include a position sensor configured to acquire position...
Method for authentication and assuring compliance of devices accessing
Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network. The invention includes...
Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
System and method for authentication of a mobile device configured with
In various embodiments, a system, method, and computer readable medium (collectively, the "System") for authenticating a mobile device configured to initiate...
Picture management method and device, picture synchronization method and
A picture management method and device, a picture synchronization method and device are disclosed. The picture management method can be applied to a client...