At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
Detection of clustering in graphs in network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
Computer security based on hierarchical cache latency signature
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
Secure permissioning of access to user accounts, including secure
deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
Secure transmission of local private encoding data
A method of secure transfer of local private encoding data between a first communication device and a second communication device, the first communication...
System for allocating sensor network resources
The technology relates to allocating the resource costs of a sensor network. In particular, an auction model is used to control the demand-side of sensor...
Power management and security for wireless modules in "machine-to-machine"
Methods and systems are provided for power management and security for wireless modules in "Machine-to-Machine" communications. A wireless module operating in a...
Data communications case having an internal antenna array
A data communications apparatus including a case having a base and a lid connectable to the base, the lid movable with respect to the base between an open...
Systems and methods for information capture
Disclosed herein are information capture systems and related methods. An information capture system includes a sensor secured to an object configured to be...
Access control based on rhythmic pattern repetition
Techniques are described for controlling access based on pattern repetition. A rhythmic pattern may be communicated to a portable computing device of an...
Composite security marking
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking...
Reader device for reading a marking comprising a physical unclonable
The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a...
Information security/privacy in an always listening assistant device
An always-listening-capable computing device includes a receiver for input from a user, a module for communication with a remote server, and a gate-keeping...
Method and device for controlling security screen in electronic device
A device and a method for controlling a security screen in an electronic device are provided. The electronic device includes a display module, a first memory...
A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the...
Mobile device data security system
Systems, computer program products, and methods are described herein for a mobile device data security system. The present invention is configured to establish...
Security enabled predictive mobile data caching
An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing...
Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Information processing terminal and method
An information processing terminal displays a confirmation screen for confirming whether to delete data relating to a web site, in a case where a movement from...
Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
Methods and apparatus for secure communication in a vehicle-based data
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is...
Systems and methods for key logger prevention security techniques
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious...
Enterprise-wide security for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
System and method for secure control of resources of wireless mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
Automatically generating certification documents
A certification application automatically generates a certification document associated with a service. A transformation module retrieves a component...
System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
Secure dynamic communication network and protocol
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled,...
Bi-directional data security for control systems
A cyber-security device includes a processor operable to process messages with a data validation rule-set; an external communication interface configured for...
Management of secret data items used for server authentication
A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to...
Set of servers for "machine-to-machine" communications using public key
A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers...
Fiber optic light intensity encryption
A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses...
Integration of secure protocols into a fraud detection system
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction...
The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising...
Asset protection of integrated circuits during transport
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
Determining potential sharing of private data associated with a private
network domain to improve data security
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable...
Automated management of confidential data in cloud environments
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
Method and system for using principal components analysis (PCA) to display
trends in aircraft cyber events in...
A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or...
Systems and methods for controlling access to computer applications or
Solutions for controlling access to computer applications or data are disclosed. For instance, certain systems advantageously secure access to applications and...
Methods and apparatus for device authentication and secure data exchange
between a server application and a device
In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the...
Virtual machine migration via a mobile device
Embodiments relate to virtual machine (VM) migration via a mobile device. A method includes requesting, by a mobile device, a source computer to capture a state...
Virtual machine monitoring method and system thereof
A virtual machine monitoring method and a system thereof are provided. The virtual machine monitoring method includes: detecting at least one hardware resource...
Method and apparatus for providing search information
The present disclosure relates to technologies for sensor networks, machine-to-machine (M2M), machine-type communication (MTC), and Internet of things (IoT)....
Ruggedized enclosure for data storage device
The embodiments provide a rugged enclosure for an external drive. The enclosure is configured to provide shock protection and protect the external drive from...
Constructing social networks using monitored game play
Features are described to use data from game play to construct social networks of users. For example determining that a user played a game with a certain...
Beam mounted chair assembly
Beam mounted chair assemblies may include at least two standards supported on a floor, a beam secured to, and supported by, the standards, and a plurality of...
Secure toll-free application data access
Secure toll-free application data network access is disclosed. Respective limits for registered traffic (e.g., application provider addresses; content type;...
Secure communications with wearable devices
Various embodiments described herein include systems and methods directed towards allowing a wearable device with one or more sensors to communicate with a...
Machine-to-machine cellular communication security
Facilitating authentication on communication between a mobile terminal and a server is achieved. The communication is made through a Serving GPRS Support Node...