At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Devices, systems and methods for authenticated intravascular device use
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
System and method for securely storing and utilizing password validation
A system and method for storing and accessing password verification data on multi-user computer systems that prevents remote attacks. Along with ...
Systems and methods for "machine-to-machine" (M2M) communications between
modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
Method and system for remotely keyed encrypting/decrypting data with prior
checking a token
A method for encrypting a message by a host device includes requesting, by the host device, a message key from a secure device and generating, by the secure...
Broadband communication network architecture with train control network
and train serving network combined, and...
A broadband communication network architecture with a train control network and a train serving network combined, is characterized by, comprising a trusted...
Electronic device and method for controlling display on basis of
information of accessory device and accessory...
An accessory device of a portable electronic device is provided. The accessory device includes a first cover that is detachably attached to at least a portion...
Unmanned aerial vehicle system and method of use
An unmanned aerial vehicle (UAV) system includes a command center having a computing device an unmanned aerial vehicle (UAV) with a body, the UAV to communicate...
Method and apparatus for remotely communicating vehicle information to the
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
Systems and methods for generating structured data based on scanned
A system and method for efficiently and securely converting physical documents, including handwritten reports, into structured data stored in databases is...
Form factor with an alias code and a secure chip ID
Systems and methods may comprise RFID data acquisition technology which may be embedded in a fob or tag for use in completing financial transactions. This fob...
Security layer and methods for protecting tenant data in a cloud-mediated
A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on...
Securely processing range predicates on cloud databases
Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method...
Method and system for securing data
A first access key, which is provided by a key server for decrypting a file and the encrypted file is published on a public network by a first user. Every time...
Processing method for making electronic documents secure
Disclosed are systems and processing methods that may be performed by first, second, and third processor units to give access to an item of sensitive text data...
Data protection system
A storage device of a data center may protect data stored on a storage medium of the storage device using a data security mechanism. The data security mechanism...
Secure credentials control method
Methods, apparatus, and systems are provided to secure access to an account of a user. The account may have a system administrator. The user may have a...
Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
Encryption authorization dongle having volatile memory
Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be...
Technologies for authenticating a user of a computing device based on
authentication context state
Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of...
Advanced zero-knowledge document processing and synchronization
Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and...
Dynamic clock lane assignment for increased performance and security
A lane within a processor bus that communicatively connects a transmitter and a receiver is dynamically assigned as a clock lane. The clock lane subsequently...
Securely distributing random keys in a dispersed storage network
A method includes encrypting first data segment using first encryption key (EK1) to produce first encrypted data segment (DS), appending the first encrypted DS...
Secure system on chip
A secure SoC IC is disclosed herein. In embodiments, a SoC IC for computing may comprise a plurality of processor cores, wherein each processor core has at...
Lighting control apparatus and method
A lighting control apparatus (106) may include an accelerometer (118), a wireless communication interface (112), and a secure connection (125) for securing the...
Method and apparatus for communicating using unlicensed bands in mobile
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
Method and system for securely transferring a message
In a method and system for securely transferring a message (N) from a transmitter unit (SE) to a receiver unit (EE), a message sent by a transmitter unit (SE)...
Apparatus and methods for electronic subscriber identity module (ESIM)
installation and interoperability
Methods and apparatus for managing processing of electronic Subscriber Identity Modules (eSIM) data at a mobile device are disclosed. An eSIM management entity...
Arrangement for, and method of, securing a data capture session of a
portable data capture device
A sensor senses when a portable, handheld data capture device has been dropped from a user's hand and is in free fall in a venue. A control system automatically...
Verifiable check and security document system
A secured document with a security architecture having a plurality of security elements for authentication, wherein at least one security element is printed...
Non-intrusive user authentication system
A system for secure user authentication of a mobile electronic device includes a touch-based user interface of the mobile electronic device, a processor, and a...
Separating sensitive data from mobile devices for theft prevention
Concepts and technologies are disclosed herein for separating sensitive data from mobile devices for theft prevention. According to one aspect, a system...
Method and apparatus for providing secure file transmission
An approach is provided for enabling the transmission of files independent of a file transfer application or the throughput capabilities of the sending or...
Network traffic control device, and security policy configuration method
and apparatus thereof
A network traffic control device, and a security policy configuration method. The network traffic control device identifies a source, a destination, and an...
Efficient and secure user credential store for credentials enforcement
using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
Attack detection through signal delay monitoring
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
Systems and methods for securing command and data interfaces to sensors
and devices through the use of a...
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module...
System and method for data center security enhancements leveraging server
SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
Method and system for securing data communicated in a network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a...
Synthetic genomic variant-based secure transaction devices, systems and
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
System architecture and method for guaranteeing network information
Disclosed is a system architecture and method for guaranteeing network information security, the system architecture including the Internet, a program...
Efficient start-up for secured connections and related services
One embodiment of the present invention includes an approach for efficient start-up for secured connections and related services. A client machine receives, via...
Secured data transmission using identity-based cryptography
A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely...
Highly secure firewall system
A firewall system with closed ports configured to reject the data packets and create a readable log of rejected data packets. A port listening processor...
Security device implementing network flow prediction
A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated...
Structural data ferry system
A system allowing computers to be un-connected to the internet or networks generally while still allowing computers to share data on networks. By creating a...
Data processing method, apparatus, client, server and system
The present invention discloses a data processing method, apparatus, client, server and system, which belong to the field of computer technologies. The method...
Method and apparatus for transmitting and receiving data in communication
Disclosed is a technology for a sensor network, Machine to Machine (M2M), Machine Type Communication (MTC), and Internet of Things (IoT). The present disclosure...
Method for verifying the identity of a user of a communicating terminal
and associated system
A method for verifying identity of a user of a communicating terminal, including: a preliminary operation including: communicating a first piece of identity...
Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
System and method for generating a cryptographic key
A system and method for generating a cryptographic key using a sequence of data segments selected by a user from one or more data resources. Raw data from the...