At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for securely registering a recipient to a
computer-implemented funds transfer payment network
A computer-implemented payment processing method includes storing, by a computer system, information regarding a recipient in an account information directory,...
Programmable unit for metadata processing
A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor....
Continuous malicious software identification through responsive machine
A security system and method secures and responds to security threats in a computer having a CPU, a Kernel/OS, and software applications. A low-level data...
Authentication and control of encryption keys
An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message...
Unlock and recovery for encrypted devices
A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some...
Image decoloring apparatus and method of controlling security in image
According to an embodiment, an image erasing apparatus includes an accessory information acquiring unit and an execution availability determining unit. The...
Mobile communications device providing heuristic security authentication
features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
Securing a managed forwarding element that operates within a data compute
Some embodiments provide a method for securing a managed forwarding element (MFE) that operates in a data compute node (DCN) executing in a host machine. The...
Securing a managed forwarding element that operates within a data compute
Some embodiments provide a method for securing a managed forwarding element (MFE) that operates within a data compute node (DCN) executing in a host machine....
Storage device, computer readable recording medium, and storage device
A group generation unit 111 regards, as an invalid area, an area of a first storage medium in which data to be updated is stored and stores updated data in the...
Methods and systems for providing hardware security functions using flash
Methods and system for providing a security function, such as random number generation, fingerprinting and data hiding, using a Flash memory. The methods and...
Method, device and computer program for monitoring an industrial control
A method is for monitoring an industrial control system. The method comprises collecting data from one or more sources external to the industrial control...
The present disclosure is directed to systems and methods that include a beacon that includes an antenna; data storage configured to store a code that is...
Secure broadcast beacon communications
Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment,...
System and method for secure synchronization of data across multiple
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
Systems, devices, and methods for improved network security
Embodiments relate to systems, devices, and computing-implemented methods for providing DoS mitigation using a list of persistent clients generated using...
Systems and methods for providing an integrated identifier
Embodiments described herein provide systems and methods to streamline the mechanism by which data users access differently regulated data through the use of...
Secure authentication of a user of a device during a session with a
A computer-implemented method for secure authentication of a user to a service for executing a transaction, the method being implemented in a system including a...
Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
Network session data sharing
In general, techniques for sharing of network session data are described. The techniques may enable security devices to leverage application classification...
Homomorphic encryption with optimized parameter selection
The techniques and/or systems described herein are directed to improvements in homomorphic encryption to improve processing speed and storage requirements. For...
Ad hoc one-time pairing of remote devices using online audio
Participants of a phone conference can share electronic data without a need to exchange passwords to link two devices nor to login to access data. The invention...
System and method for assessing security threats and criminal proclivities
A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity...
Security prejudgment based on characteristic information
An example method of security prejudgment based on characteristic information include receiving characteristic information of a monitored party from the...
Method of determining if personal belonging or space has been disturbed
with camera, WiFi and Bluetooth...
The present invention provides a method of detection disturbances of movement and light for semi-secure items via a bluetooth enabled `chip` which will alert a...
Secured location confirmation
Features are disclosed for accurately and efficiently identifying whether a location is secured after unattended delivery of an item. The features include...
Secured vehicle for user use only
Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for...
Integrated clinical trial workflow system
A computer-based system configured to present a user interface that enables a user to access multiple clinical trial systems via a common secure web-based...
Systems and methods for requesting a reservation for a set of debt
instruments to be offered
A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be...
Smart authentication and identification via voiceprints
The systems and methods described herein allow an electronic transaction to be performed upon determining, via biometric data, that an authorized individual is...
Methods, apparatus and computer program products for securely accessing
Customer data is securely downloaded to a browser toolbar by performing a check to determine whether a request for customer data includes a request for personal...
Virtual POS system and method
The present invention relates to a token device for securely executing a data transaction. The token device comprises: a secure element; a web server module...
Sensor fusion for passenger conveyance control
A fusion based passenger tracking system includes one or more 2D/3D sensors for capturing 2D/3D data; one or more security sensors for capturing security data;...
Vascular pattern detection systems
In the examples provided herein, a vascular pattern recognition system integrated onto a portable card includes a vascular pattern detection system to obtain...
Apparatus and method for trusted execution environment file protection
An apparatus and method for securing sensitive data on a mobile device are provided. The method includes receiving an encryption or decryption request for the...
Controlling secure processing of confidential data in untrusted devices
A number of transmissions of secure data communicated between a secure trusted device and an unsecure untrusted device in a DBMS is controlled. The data is...
System for assuring security of sensitive data on a host
Techniques determine and mitigate leakage of sensitive data into log data. The message is parsed to identify a first value and a first data classification tag...
Traffic processing for network performance and security
Aspects of the subject disclosure are directed towards protecting machines, such as virtual machines in a cloud datacenter, from receiving unwanted traffic, and...
Secure authentication protocol systems and methods
An input device of a secure authentication protocol system may receive at least one user authentication factor in a pre-boot session. The input device may...
Method, system and apparatus for guiding and tracking medication usage
Methods and systems are provided for tracking and guiding a patient's clinically directed medication usage. Medicaments are placed in secure passive packaging...
Wearable personal digital device for facilitating mobile device payments
and personal use
Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric...
Security system using visual floor plan
An apparatus for a premises based system is provided. A processor may be configured to generate a layout (such as a floor plan layout) of at least a portion of...
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
Security extensions for non-volatile memory
The disclosed embodiments provide security extensions for memory (e.g., non-volatile memory) by means of address and data scrambling and differential data...
Lockable enclosure and system and method for operating the same
A system and method for securing personal articles, including a lockable enclosure, an image acquisition device disposed to capture an image of an interior of...
Real-time interference check system of machine tool and robot
An interference check system capable of appropriately checking interference between a machine tool and a robot in real time even in the case where real-time...
Bone and tool tracking with MEMS in computer-assisted surgery
A method tracks a tool with respect to a bone in computer-assisted surgery. A reference tracker with a MEMS unit is secured to the bone. The tracker outputs...
Secure wireless networks for vehicles
A system and method (600) of securely and accurately connecting mobile devices (110) to wireless networks in vehicles (210) by using encrypted wireless network...
Automated provisioning of managed services in a Wi-Fi capable client
Methods and apparatus for deploying and configuring WiFi capable devices are described. A WiFi capable device such as security camera, temperature monitor...
Security management on a mobile device
A method for managing security levels on a mobile device includes receiving a capsule including first data; assigning a first data tag to the capsule, the first...