At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Near field communication (NFC) device and method for selectively securing
records in a near field communication...
A method and device for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
Data security for internet of things (IOT) devices
System for monitoring of IoT data traffic between an IoT device connected via a cellular network and a server using Internet Protocol (IP), where the IP...
Method of personalizing a security element cooperating with an apparatus
The invention relates to a method of personalizing a security element cooperating with an apparatus. This personalization includes downloading data, which is...
Updating profiles for secondary wireless devices
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message...
Apparatuses, methods and systems for interfacing with a trusted
subscription management platform
Apparatuses, methods, and systems are provided for implementing a trusted subscription management platform. The platform allows the remote creation,...
Data resource control through a control policy defining an authorized
context for utilization of a protected...
Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving...
Security configuration file conversion with security policy optimization
Systems and methods for converting a configuration file from a first language into a second language with policy optimization and auditing are provided....
Method and system for gathering and contextualizing multiple events to
identify potential security incidents
A method and system for aggregating and correlating disparate and unrelated events to enable faster security event detection. A plurality of event logs...
System and method for secure synchronization of data across multiple
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
Systems and methods for predicting security threat attacks
A computer-implemented method for predicting security threat attacks may include (1) identifying candidate security threat targets with latent attributes that...
Computer security based on hierarchical cache latency signature
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
Context based management for secure augmented reality applications
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device...
Method for accessing a plurality of services by a mobile terminal user,
and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
System and method for data security on big data sets
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
Implementing single sign-on in a transaction processing system
A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security...
Method for enabling lawful interception by providing security information
A method and apparatus are provided. Information associated with a lawful interception of communication data of a user equipment is received. Security...
Policy based cryptographic key distribution for network group encryption
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
System and method for encryption key management in a mixed infrastructure
stream processing framework
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream...
Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
Packet tagging for improved guest system security
Some embodiments provide a novel method for monitoring network requests from a machine. The method captures the network request at various layers of a protocol...
Enhancing privacy and security on a SDN network using SDN flow based
A computer implemented method for providing security on a software defined network (SDN). The method comprises providing a master SDN controller for managing...
Channel based communication and transaction system
System and methods are provided for receiving identification information from remote user devices associated with users. The identification information serves...
Cloud-based services exchange
In general, a cloud-based services exchange (or "cloud exchange") for interconnecting multiple cloud service providers with multiple cloud service customers is...
Inherent power-over-data bus signaling for secure operating mode switching
A method for changing an operating mode of a processing unit of a network node is described. The processing unit is connected to a communication and supply line...
Devices, systems, and methods for authenticated intravascular device use
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
Digital data locker system providing enhanced security and protection for
data storage and retrieval
The subject matter herein is directed to a digital data locker that acts as an intermediary between end users operating end user device and document providers....
Magnetic coupling device with reflective plate and methods for use
Aspects of the subject disclosure may include, for example, a coupling device including a receiving portion that receives a radio frequency signal conveying...
Method, apparatus and system for inserting watermark data
An apparatus and method for a sensor network, machine-to-machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT) are...
Method and system for graphic and sonic encryption for securing data and
A method of verifying a transaction between a first party and a second party using a first graphical symbol having at least a two-dimensional array of different...
Security systems and methods for encoding and decoding digital content
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data...
Data processing method and data processing device
Provided is a data processing method in a data processing device that is connected to an external storage device and that is equipped with a storage device, the...
Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
System and method for cryptographic suite management
Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit...
Software vulnerability analysis method and device
The present disclosure includes: searching a code clone corresponding to a used source code from any analysis target source code; detecting a security sink and...
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
Customer vehicle data security method
A database system and method for managing and storing sensitive and non-sensitive vehicle data. Received vehicle data messages are processed to separate out...
Double-mix Feistel network for key generation or encryption
A method of providing security in a computer system includes dividing a block of data into initial left and right halves, and calculating updated left and right...
Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
System and method for monitoring a transport of a passenger transportation
device or transport unit
A transport-monitoring module for monitoring a transport of a transport unit of a passenger-transportation device is arranged on the transport unit. The...
QR code containing machine readable DNA and nanoparticles
A security code is provided having a diffractive holographic code of a quick response type, a data-matrix two-dimensional code or other bar code types, formed...
Selective data transmission method and system based on central monitoring
The present invention provides a selective data transmission method and a system based on a central monitoring system. The selective data transmission method...
Audio proximity-based mobile device data sharing
At least two mobile devices introduce one another and select data for transfer to and receipt by at least one receiving mobile device using audio...
Dynamic utilization of services by a temporary device
A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code...
Low power wireless RF communication platform and ad-hoc security network
Wireless radio frequency communications platform may include a plurality of sensor units communicatively coupled over a wireless radio frequency communication...
Method and apparatus for hardware-enforced, always-on insertion of a
watermark in a video processing path
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
Information processing apparatus, information processing method, and
non-transitory computer readable medium
An information processing apparatus includes plural communication interfaces, a specifying unit, a network determining unit, and a transmission controller. The...
Information processing apparatus configured to predict a size of a
storage-use region , method, image...
An information processing apparatus includes a memory, and circuitry. The circuitry acquires a plurality of images divided from original image data, the...
Method and system for automatically managing secure communications and
distribution of secrets in multiple...
Communications and security policy data for two or more zones is obtained that includes data indicating allowed protocols for the respective communications...