At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method for using an internet of things edge secure gateway
A gateway is configured to perform a method that includes receiving data from a first device using a first protocol. The first protocol is a cloud based...
Management apparatus and method for controlling management apparatus
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
Network security method and device
A network security method and a device relating to the field of network communication where the method includes, recording a correspondence between an Internet...
Domain reputation evaluation process and method
A system for the identification and subsequent rating of domains based on a result derived from a proprietary algorithm configured to detect when a new domain...
Data surveillance system
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
System for providing levels of security access to a process data network
Embodiments enable a system to determine, authorize, and adjust access, writing, retrieval, and validation rights of users and entities associated with one or...
Preventing persistent storage of cryptographic information using signaling
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
Cryptographic security functions based on anticipated changes in dynamic
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who...
Methods and systems for providing security to distributed microservices
Systems for providing security to distributed microservices are provided herein. In some embodiments, a system includes a plurality of microservices, each of...
Flexible inline arrangements for guiding traffic through network tools
A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network...
Network visibility appliances for cloud computing architectures
With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes...
Secure storage decryption system
A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted...
Approaches for high speed global packet data services for LEO/MEO
A satellite system comprises LEO satellites and MEO satellites, and a control plane protocol architecture. The PHY, MAC, MAC/RLC and RRC layers are optimized...
Secure storage apparatus
In one embodiment, an apparatus includes a non-volatile memory, a one-time programmable (OTP) memory, and a processor operative to write data values to the...
Using degree of confidence to prevent false security system alarms
A device and method for analyzing an event at a premises is provided. In one embodiment the device includes a processor and a memory configured to store...
Constant infrared detection for security
A system and method for securing an edge zone in a space, while not restricting normal activities in the space, is provided. The system and method comprises an...
Medical information navigation engine (MINE) system
A method of transacting medical information includes receiving medical information from a medical sources, identifying, mapping, and consolidating the received...
System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
Data security using alternative encoding
A system and method for protecting text from unauthorized access. An original data set including a plurality of character code values is received, where each...
Systems and methods for detecting unknown vulnerabilities in computing
The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that...
Maintaining secure clustered software with a container-based architecture
The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device in a...
Method and apparatus for managing super user password on smart mobile
The present invention discloses a method and an apparatus for managing a super user password on a smart mobile terminal, wherein the method for managing the...
System and method for privacy-enhanced data synchronization
A system, apparatus, method, and machine readable medium are described for establishing a trust circle between multiple devices. For example, one embodiment of...
Method and system for secure distribution of selected content to be
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
Direct memory access authorization in a processing system
A processor employs a hardware encryption module in the memory access path between an input/out device and memory to cryptographically isolate secure...
Image file distribution apparatus, image file recovery apparatus, image
file distribution method, image file...
Provided are an image file distribution apparatus, an image file recovery apparatus, an image file distribution method, an image file recovery method, an image...
Secured compact keyboard
A keyboard of a data entry device includes a printed circuit board, a spacer having a plurality of key-positioning locations, a plurality of keys, each key...
Method and device for quantification of plant chlorophyll content
A system for measuring chlorophyll concentration in a leaf sample includes a leaf-holding illuminator device with a main body containing a power source, a...
Systems and methods for operating drones in response to an incident
A response system may be provided. The response system may include a security system and an autonomous drone. The security system includes a security sensor and...
Information processing system, extended input device, and information
In a state where an extended input device is secured to a data transmission device, an image capturing unit of the data transmission device captures an image of...
Method and apparatus for scheduling uplink data in mobile communication
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
Communication security processing method, and apparatus
The present invention provides a communication security processing method and an apparatus. The communication security processing method includes: determining,...
Method and system for managing security keys for user and M2M devices in a
wireless communication network...
Pre Shared Keys ("PSK") for application and data session security are generated using application authentication secret values stored in a SIM device/card. The...
Method and apparatus for streaming video security
A streaming video security device is provided that comprises an input LAN interface, at least one streaming video decoder, an output LAN interface, at least one...
Segregation of electronic personal health information
A dynamic secure mobile network is provided to enable the transfer and storage of private data. The dynamic secure mobile network can provide secured...
Methods and systems for detection and classification of multimedia content
in secured transactions
An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or...
Preventative enterprise change management
Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in...
Zone-based security architecture for intra-vehicular wireless
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
Secure crypto module including electrical shorting security layers
A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic...
Systems and methods for detecting online fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
Scarecrow for data security
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
Generating a virtual database to test data security of a real database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
Security and authentication daisy chain analysis and warning system
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
Secure transport layer authentication of network traffic
Technologies are disclosed herein for transport layer network data authentication. A token packet is attached to network data sent from a client software...
System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
Proximity-based system for automatic application or data access and item
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...