At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Securing deployments using command analytics
Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes...
Unstructured security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from...
Probabilistic suffix trees for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
System, method, and program product for processing secure transactions
within a cloud computing system
Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment...
System and method for providing security monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
Reducing data connections for transmitting secured data
A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further...
One way secure link
A method for secure communications between a transmitting computer and a receiving computer includes transmitting data from the transmitting computer over a...
Security implementation for resource distribution
A system for securely distributing and managing resources includes a smart device, a resource management device, and a third party system, each having...
Systems and methods for optimizing computer network operations
Disclosed herein are systems and methods to integrate and manage a computer network operations (CNO) infrastructure. A framework may include CNO applications...
Isolation of trusted input/output devices
Techniques are provided to ensure isolation of trusted input/output devices using a Secure Crypto-Processor. Secure IO lines may be used to drive devices that...
Method of performing device to device communication between user
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond...
Systems and methods for enhancing confidentiality via logic gate
Presented are systems and methods that allow hardware designers to protect valuable IP and information in the hardware domain in order to increase overall...
Security and surveillance system based on smart phone devices
Security and surveillance system based on smart phones devices, of the type of devices having capacity for communications with a wide area network, such as the...
Adaptive exit arm times based on real time events and historical data in a
home security system
A security system includes a plurality of sensors installed at a premises to capture data from an environment in or around the premises, a memory configured to...
Server-based fast remote display on client devices
A system and method for controlling a display on a client device such as a wireless communication device, e.g., a smartphone or similar device is presented....
Moving a portion of a streaming application to a public cloud based on
A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be...
Securing portable data elements between containers in insecure shared
Systems and methods for encrypting an unencrypted data set within a file are provided. The disclosed systems and methods can be configured to create a...
Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
Safe and secure internet or network connected computing machine providing
means for processing, manipulating,...
A computing machine that minimizes problems from external files, such as software virus and malware is disclosed. The computing machine has local operations...
Secure biometric data capture, processing and management for selectively
prohibiting access to a data storage...
A system includes one or more biometric sensors, a sensor hub and a trusted application execution environment. The sensor hub has exclusive access to the...
Data processing method and electronic device thereof
A method of operating an electronic device is provided. The method includes creating a security key based on data shared with a specific electronic device,...
Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
Ephemeral peripheral device
An ephemeral system includes an ephemeral communications device and associated ephemeral memory system (onboard or peripheral) for securing user data. Different...
Systems and methods of secure domain isolation involving separation kernel
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
Method and system for preventing shopping cart theft
The present invention provides a system and method for preventing theft of mobile objects which are used by for temporary time period by anonymous users. The...
Self-balancing board with primary wheel and distal auxiliary wheel
A self-balancing board is provided, comprising a primary wheel assembly, a platform, at least one sensor, a controller, a first auxiliary wheel assembly, and a...
Computer hardware unit with collapsible mounting brackets
A computer hardware unit, a data center cabinet having the same, and a method of removing the computer hardware unit from the data center cabinet. The computer...
Enhanced hotspot 2.0 management object for trusted non-3GPP access
User equipment (UE) includes a transceiver configured to transmit and receive information to/from a Wireless Fidelity (WiFi) access point. The UE includes...
Systems, methods, and computer program products for interfacing multiple
service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
Method for personalising a secure element
Methods and device for personalizing a secure element (e.g., a eUICC) may include or implement operations for receiving a personalization request issued by an...
Method and apparatus for remotely running application program
A method for remotely running an application program. A client acquires an application program from a server, runs the application program on the client, and...
System and method for providing network and computer firewall protection
with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
Method for operating a security gateway of a communication system for
A method for operating a security gateway between data buses of a vehicle, in which a correlation between an identification information item (ID) of the message...
Secure data redaction and masking in intercepted data interactions
A method for modifying intercepted data interactions is provided in the illustrative embodiments. At a security application executing in a security data...
Automotive ECU controller and data network having security features for
protection from malware transmission
In one implementation, a method for providing security on controllers includes detecting, by a given controller, an attempted security attack on the given...
Detecting and reacting to malicious activity in decrypted application data
Described herein are systems and methods for detecting potentially malicious activity in a network session. Embodiments may involve identifying a requested...
Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
Universal subscriber identity recognition and data classification
An aspect includes storing data elements in a storage space of a memory device. The storage space is allocated for an account of a subscriber of a universal...
Cloaked data system
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
System for secure communications
A system and method provides security features for inter-computer communications. After a user has proved an association with one of several firms, a user...
System and method for securing data transport between a non-IP endpoint
device that is connected to a gateway...
A method of securing data transport between an endpoint device, without an IP address and connected to a gateway device, and a connected service using a...
Systems and methods for providing network security monitoring
Systems and methods are disclosed for providing network security monitoring in a computer network. In an embodiment, network configuration data may be gathered...
System and method for initializing a shared secret system
Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the...
Data protection keys
One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure...
Decentralized and distributed secure home subscriber server device
A decentralized and distributed secure home subscriber server is provided. First data can be sent representing a first nonce string to a mobile device; and in...
Network address-based encryption
A system for encrypting data and transferring or storing data securely may include a computing device including an encryptor configured to generate an...
System and method to secure sensitive content in a URI
A system and method for transmitting data using a data transfer protocol, including receiving, at the first device, a request from the second device, the...
DNSSEC lightweight database access protocol gateway
A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested...
Secure access control to an embedded device through a networked computer
A method for secure access control to a power tool enables secure access to an embedded computing device in the power tool from a web application in another...