At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
Method and apparatus for distributing encryption and decryption processes
between network devices
In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host,...
Systems and methods for transmitting and displaying private message data
via a text input application
The present disclosure relates to systems and methods for transmitting and displaying private messages securely using a mobile device. The mobile device...
Large-scale simultaneous digital signature service system based on hash
function and method thereof
Disclosed are a system and method of a large-scale simultaneous digital signature service based on a hash function. According to the system and method, the main...
Multiple authority data security and access
A request to perform one or more operations using a second key that is inaccessible to a customer of a computing resource service provider is received from the...
Security-focused network monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
Smart-home security system with keypad device resistant to anomalous
Security keypad device for detecting tampering includes a keypad, a high power wireless module for communicating data via a local area network, a low power...
Entry control system
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a...
Cryptographic authentication and identification method using real-time
A method for securing data and safeguarding its origin, in which the data are transmitted from a customer device to a center in an encrypted manner using...
Data support with tan-generator and display
The invention creates a data carrier, in particular chip card, in particular smart card, having a device for generating one-time passwords and having a display...
System and method for trusted mobile device payment
This invention is related to secure payments using data codes displayed on a mobile device, for example a QR code displayed on a cell-phone. The invention...
System and method of embedding a two dimensional code with concealed
The present invention embodies a technique to embed a graphic representation and/or a concealed message such as but not limited to two dimensional codes such as...
Decentralized token table generation
New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of...
Transparent client application to arbitrate data storage between mutable
and immutable data repositories
Provided is a process including: receiving a first write request from an application requesting to write data to a first remote database via a network;...
Method and system for destroying sensitive enterprise data on portable
Systems and methods for destroying sensitive enterprise data on portable devices are provided. Such systems and methods may include providing a portable device...
Securing recorded data
A method, executed by a computer, for recording data includes splitting a file into sequential extents, reordering the sequential extents into non-sequential...
Software nomenclature system for security vulnerability management
Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a...
System and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
System, method, and device for controlled access to a network
A device for controlling network access comprising a first transceiver configured in as open access point device, a second transceiver configured in client mode...
System and method for program security protection
Systems and methods are provided for program security protection. An exemplary method for program security protection may comprise obtaining data packets...
Instructions and logic to fork processes of secure enclaves and establish
child enclaves in a secure enclave...
Instructions and logic fork processes and establish child enclaves in a secure enclave page cache (EPC). Instructions specify addresses for secure storage...
Integrated system and method for the acquisition, processing and
production of health care records and services
The highly secure method and system acquires, processes and produces health care (HC) data and service records from multiple local devices, notwithstanding...
Wide-scale replication of similarly structured data
A service metadata replication system includes an ingester that scrapes or receives service data including metadata values for service objects from various...
Systems, apparatus, and methods for accessing data from a database as a
System, apparatus, and method are provided for accessing data from a database as a file. Data is organized more securely in database than a file system, but...
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
Methods and systems for providing a customized network
A method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data are provided. The data is grouped and...
Secure start system for an autonomous vehicle
A secure start system for an autonomous vehicle (AV) can include a compute stack and a communications router. The communications router can include an encrypted...
Robotic assistance in security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one...
Friction coefficient measuring method of surface of specimen
A method of measuring a friction coefficient of a surface of a specimen includes: obtaining surface information of the specimen by using an atomic force...
Apparatus for production of three-dimensional objects by stereolithography
A system for making three dimensional objects. The system may have a frame, a build platform movably coupled to the frame, a vat removably secured so that the...
Method and apparatus for using upstream communication in a card shuffler
A security system for a casino table card game has a casino table with i) indicia thereon for the placement of wagers, ii) a data entry system with an...
Method and system for datacasting and content management
A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system...
Mobile event notifications
Disclosed is a mobile event streaming system that receives customer application lifecycle and user events including a message, event source and a destination...
Method and system for fast access to advanced visualization of medical
scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
Protocol agnostic security by using out-of-band health check
A computer-implemented method provides an improvement in security breach detection and comprises using a broker computing device, calculating a digital...
Method and system for IPSec security for IPP-USB data
A method of providing security for data being transferred over a Universal Serial Bus (USB) connection, the method comprising: setting an IPsec policy...
Malware and exploit campaign detection system and method
A malware and exploit campaign detection system and method are provided that cannot be detected by the malware or exploit campaign. The system may provide...
Systems and methods for adaptive security protocols in a managed system
Embodiments disclosed herein describe one or more servers of an enterprise system that may be configured to receive security and vulnerability information from...
Optimizing security analyses in SaaS environment
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
Supervisory control and data acquisition
Aspects of the present disclosure relate to computer system security. A machine accesses a set of records corresponding to a set of users having access to a...
Systems and methods for providing security services during power
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
System, method and computer program product for managing access to
systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
Systems and methods for securing social media for users and businesses and
rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
Secure data processing method and system
The invention discloses a secure data processing method and system, wherein the secure data processing method comprises the following steps of: a security...
Secure feature and key management in integrated circuits
A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority...
Single sign-on between multiple data centers
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
System for a secure encryption proxy in a content centric network
One embodiment provides a system that facilitates a secure encryption proxy in a content centric network. During operation, the system receives, by an...
Methods and systems for establishing secure communication between devices
via at least one intermediate device
Methods to establish communication between a first and second device via at least one intermediate device comprise, at the first device, generating an offer...
A system and method of network privacy enables end-users of a Network to have legal title or rights to all data knowingly or unknowingly transmitted while...