At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
Automatically assessing an anatomical surface feature and securely
managing information related to the same
A facility for procuring and analyzing information about an anatomical surface feature from a caregiver that is usable to generate an assessment of the surface...
Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
Programmable validation of transaction requests
A data processor includes an input/output bridge that provides enforcement of a security status on transactions between devices across the bridge. The bridge...
Securing data using per tenant encryption keys
One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a...
Method and apparatus for secure data entry using a virtual interface
Method and apparatus for secure data entry. In the method a virtual data entry interface is generated, and is outputted so as to be readable only by the user....
Method and system for risk modeling in autonomous vehicles
A method for adaptive risk modeling for an autonomous vehicle, the method comprising: retrieving parameters of an identified driving mission of the autonomous...
Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
Wide area network (WAN) backhaul for wireless relays in a data
A wireless relay serves a first User Equipment (UE). An eNodeB wirelessly exchanges UE signaling data and UE user data with the first UE. The eNodeB processes...
Secured data access from a mobile device executing a native mobile
application and a headless browser
Systems, methods, and computer-readable storage devices to enable secured data access from a mobile device executing a native mobile application and a headless...
Method and system to enable secure communication for inter-eNB
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier...
Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
Systems and methods for endpoint management classification
A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to...
Secure virtualized mobile cellular device
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
System and method for generating auditable secure seeds from real-world
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
A method for allowing a first party and a second party to obtain shared secret information is provided. The method comprises the steps of: obtaining, by the...
System, device, and method of secure entry and handling of passwords
Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure...
Instructions processors, methods, and systems to process secure hash
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
System and method for secure communications and data storage using
An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and machine...
Peer-to-peer proximity pairing of electronic devices with cameras and
see-through heads-up displays
The disclosed embodiments relate to electronic devices with optical head-mounted displays (OHMDs). Each electronic device includes an OHMD that provides a...
Method and system for providing secure remote testing
A method and system provides security for remotely administered tests to examinees at respective remote locations by providing, with a head mounted image...
Secure access to physical resources using asymmetric cryptography
Digital certificates are signed by a server's private key and installed at lock controllers that restrict access to physical resources. The server's public key...
Reverse trace-preventing wireless recognition secure entry method and
secure entry system using same
The present invention relates to a secure entry method of a radio-frequency identification (RFID) secure entry system including a tag, a reader, a detector, a...
Client-side security for tokenized transactions
A method for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method includes storing a...
System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
Method and system for secure transmission of remote notification service
messages to mobile devices without...
A method for receiving and processing a data message includes: storing at least an encryption key; receiving a data message, the data message including at an...
System and method for event monitoring and detection
A system for event detection and reporting has primary sensors for producing raw data from observing the proximate area, one or more processors for the primary...
Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
Simultaneous state-based cryptographic splitting in a secure storage
Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the...
Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
Methods and systems for ensuring printer looses ability to print security
patterns if disconnected from...
The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print...
Secure object having protected region, integrity tree, and unprotected
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
Modeling a network security environment as a game
Disclosed are various embodiments that model a network security environment as a game. A data model corresponding to a network security environment is received....
Method and apparatus for implementing virtual machine introspection
The present disclosure relates to the field of information technologies and discloses a method and an apparatus for implementing virtual machine introspection....
Method and apparatus for authenticating access to a multi-level secure
environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
System and method for securing tenant data on a local appliance prior to
delivery to a SaaS data center hosted...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
Method and apparatus for upgrading operating system of electronic device
An embodiment discloses an electronic device capable of performing an upgrade to an Operating System (OS) having enhanced security without deleting any user...
Method for upgrading communication device
A method is disclosed for updating communication equipment through a server in a communication system, wherein the server stores the updated files used for...
Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
Apparatus, system, and method of wirelessly transmitting and receiving
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
Authorized areas of authentication
An electronic device including a memory storing at least one of biometric or passcode data of a user, and a processor (i) requesting access of data over the...
A user equipment method, user equipment, a base station method, a base station and computer program products. The user equipment method, comprises: on reception...
Method, device and system for managing audio, video and data
Described herein are methods, systems and programs for managing the sharing of video, audio and data communications between users over the internet in the most...
Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...