At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
Portable intermediary trusted device
In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may include a position sensor configured to acquire position...
Method for authentication and assuring compliance of devices accessing
Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network. The invention includes...
Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
System and method for authentication of a mobile device configured with
In various embodiments, a system, method, and computer readable medium (collectively, the "System") for authenticating a mobile device configured to initiate...
Picture management method and device, picture synchronization method and
A picture management method and device, a picture synchronization method and device are disclosed. The picture management method can be applied to a client...
Security device for data component
A security device for preventing the use of a data sending/receiving component having a connector and positioned in a computer housing includes a locking...
Cache and data organization for memory protection
This disclosure is directed to cache and data organization for memory protection. Memory protection operations in a device may be expedited by organizing cache...
Format preserving encryption
Encrypting data without losing their format is important in computing systems, because many parties using confidential data rely on systems that require...
Methods of dynamically securing electronic devices and other
communications through environmental and system...
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its...
Systems and methods for tracking and recording events in a network of
A security client can be configured to operate on the one or more computing systems and record all events occurring on the one or more computing systems. The...
User activity monitoring by use of rule-based search queries
Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An...
System and method for self-protecting data
Disclosed is a system comprising a physical memory, a processor and a software component. The software component includes a policy/domain handler for receiving...
Storage device that secures a block for a stream or namespace and system
having the storage device
A storage device includes a nonvolatile semiconductor memory device including a plurality of physical blocks and a memory controller. The memory controller is...
Secure storage device sanitization
Technologies are provided for secure sanitization of a storage device. A storage device can be configured to support an operational mode, into which the storage...
Protective enclosure for data storage
A data storage enclosure for storing data on digital storage media has a lid that secures to a base. The enclosure has an upper insulating block that is located...
Well tools with vibratory telemetry to optical line therein
A well tool can include an outer housing and a vibratory transmitter disposed in the outer housing. The vibratory transmitter transmits a vibratory signal to an...
An electronic faucet assembly includes a mixing valve and a user interface in communication with a controller. Input to the user interface illustratively causes...
Method for transmitting security data and method for receiving same
According to one embodiment of the present specification, a method for transmitting security data is disclosed. The method for transmitting security data can...
Configurable secure mobile tool for AMI and AMR metering systems
Disclosed herein are apparatuses, methods and systems for a configurable and secure mobile tool for Advanced Metering Infrastructure (AMI) and Automatic Meter...
Electronic wireless hand held multimedia device
An electronic wireless hand held multimedia device includes a microprocessor and more than one wireless transceiver modules enabling wireless communications...
Information infrastructure management tools with variable and configurable
filters and segmental data stores
Method of creating an information infrastructure for processing data throughput or a method for processing data throughput in a distributed computing system...
Distributed vetronics intrustion detection system and device
A computing device may include a non-transitory computer-readable medium and a processor communicatively coupled to the non-transitory computer-readable medium....
Software tampering detection and reporting process
A method is disclosed. The method includes determining, by a security software application on a communication device, that the communication device has been...
Security policy efficacy visualization
A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count...
Systems, methods and computer program products for information integration
across disparate information systems
An information integration system may include a set of integration services embodied on one or more server machines in a computing environment. The set of...
Method and apparatus for secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. A method includes receiving a request for data that is encrypted according to a...
Systems and methods for single device authentication
Described are systems, methods, and computer readable medium for authenticating user device interactions with external entities. A secure communication session...
Performance and security management of applications deployed in hosted
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing...
Encryption using biometric image-based key
Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as...
Secure storage of hashes within a distributed ledger
The present disclosure describes systems and methods for verification of data, including updates to applications, firmware, operating system libraries or other...
Controlling access to a location
A method of controlling access to a location secured by a lock mechanism. An access control management system (ACMS) administrates electronic keys for multiple...
Secure and private tracking across multiple cameras
A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure...
Preventing displaying private data based on security policy
The present invention discloses a display method and an electronic device. The method is applicable to an electronic device, the electronic device is capable of...
Data security system with encryption
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected...
System and method for secure file management by a local client device
A system and method is provided for secure file and document management and editing by local client devices. An exemplary method includes receiving by a server,...
Use case driven granular application and browser data loss prevention
A flexible policy system allows compliant apps on a mobile device to interact with a secure container memory space to ensure that data leak prevention policies...
Secure creation of encrypted virtual machines from encrypted templates
Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further...
Systems and methods for gesture based biometric security
A system receives a source and a metadata layer that describes the source. The source may comprise source records with fields containing source data, and the...
Secure application acceleration system, methods and apparatus
An improved storage controller that enables the acceleration of datacenter software, by making it easier to deploy application software portions (applets) onto...
Automated secure data and firmware migration between removable storage
devices that supports boot partitions...
Systems, apparatuses and methods may include technology that detects a migration request and conducts a first transfer, via a trusted execution environment...
Vehicle system including security unit providing degradation commands via
a vehicle data bus and related methods
A vehicle security unit is for a vehicle including at least one data communications bus, an On-Board Diagnostic (OBD) port coupled to the at least one data...
Wearable cardioverter defibrillator (WCD) system using security NFC tag
for uploading configuration data
A wearable cardioverter defibrillator (WCD) system includes a processor, a memory, a wireless communication module (DWCM), and an NFC tag that stores...
Relationship and security in online social and professional networks and
A method is provided for evolving a defined online existing relationship between a first member and a second member, the online existing relationship defined by...
Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
System and method for performing asset and crowd tracking in an IoT system
A system and method are described for performing asset and user tracking. For example, one embodiment of a system comprises: an Internet of Things (IoT) device...
Real-time, location-aware mobile device data breach prevention
A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and...
Identity-based face and voice recognition to regulate content rights and
parental controls using consumer profiles
A viewer's rights to view content is determined instantly, without exposing any data externally, by capturing both a facial image and speech of the viewer. The...
System for a monitored and reconstructible personal rendezvous session
Disclosed is a system that adapts a personally portable "smart" communications device to enhance a user's personal security by continuously monitoring an alert...
Techniques for prevent information disclosure via dynamic secure cloud
Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud...