At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
Secure data replication
One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within...
System and method for uploading and management of
contract-research-organization data to a sponsor company's...
The present disclosure provides a system and method for comprehensive data synchronization management between a sponsor-company's central ...
Encrypting data for storage in a dispersed storage network
A method includes retrieving a plurality of secure data packages from storage units. The method further includes separating the secure data packages into masked...
Transparent secure interception handling
A method and system for transparent secure interception handling is provided. The method and system include deploying a virtual machine (VM) in an environment...
Battery, battery controller, and method for the secured digital
transmission of current measurement values
The invention relates to a method for the secured digital transmission of current measurement values and to a battery (1) and a battery controller (10) which...
System for remotely-operated systems
The invention relates to a remote-controlled system comprising: --at least one ground interface (3), from which an operator can control a remote-controlled...
Insulin pump data acquisition device and system
An insulin pump data acquisition device & system including: an insulin pump data acquisition device for use with an insulin pump, the data acquisition device...
IP-based satellite command, control, and data transfer
A method and system for satellite control in space using an IP-based satellite bus and all-IP compliant subsystems and payload(s) and a corresponding T&C...
Illuminated glove assembly
An illuminated glove assembly includes a glove and an illumination data controller. The glove has a body portion, a longitudinal glove axis, a pointer...
Secure wireless local area network (WLAN) for data and control traffic
A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the...
Relevancy improvement through targeting of information based on data
gathered from a networked device...
In one embodiment, a method of a relevancy-matching server includes matching primary data generated from a fingerprint data with targeted data based on a...
Light device has built-in digital data system for record image, sound
A LED Light device having built-in camera unit is powered by AC or-and DC power source for a lamp-holder, LED bulb, flashlight, garden, entrance door light or...
Creating and managing a network security tag
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
Honeyport active network security
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
Detecting malware in mixed content files
Computer systems and methods in various embodiments are configured to determine whether a file is likely to be malware-free or include malware. In an...
Identity resolution in data intake stage of machine data processing
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
System, device and method for detecting a malicious attack based on direct
communications between remotely...
In an embodiment, a system, device and method for detecting a malicious attack is described. Herein, the system includes a security network device that conducts...
Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain internal log data of a computer network of an...
System and method for automatic wireless network authentication
A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an...
Security token with embedded data
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
Securing a server before connecting the server to a data communications
Securing a server before connecting the server to a data communications network in a data center may include: establishing a proximity-based communications...
Task segregation in a multi-tenant identity and data security management
A system provides cloud-based identity and access management. The system receives a request to perform an identity management service, and accesses a...
Microservices based multi-tenant identity and data security management
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
Secure migration of virtual machines from source to target and transfer of
VM descriptor and keys between...
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
Data transmission security improvements
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
Security network processor system and method
A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for...
Direct synthesis of receiver clock
The Direct Synthesis of a Receiver Clock (DSRC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable local...
Wi-Fi offload of cellular data
A security gateway system offloads cellular data from user equipment ("UE"). The system receives a dynamic host configuration protocol ("DHCP") message from a...
Network authentication method for secure electronic transactions
In a network authentication method, a client device stores a reference first private key portion obtained by encrypting a first private key portion of a private...
IoT communication utilizing secure asynchronous P2P communication and data
A device may receive a connection request including a digital certificate from an endpoint for establishing a secure connection for a communication, the digital...
Lockbox access device and method with biometric security data
A lockbox access apparatus comprising a wireless communications device having a stored program configured to: cause the wireless communications device to...
Method and system for secure syndicated balance display
One or more financial accounts associated with a user are designated for balance monitoring and balance display. Balance increments are then defined and a...
Power control device and power control method
Information to be displayed on a display is generated in such a way that a gateway processes a measured value (with a time stamp) transmitted from a power...
Method and system for providing a secure shuffle of game objects across
A computer-implemented method and system are provided for ensuring the integrity and security of digital shuffles of cards or objects across multiple entities...
Game console system, method and computer program product with
anti-malware/spyware and parental control...
A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is...
Dynamic WLAN connections
A cellular communications network is configured to support calling over untrusted networks such as the Internet. A cellular communications device is used to...
Secure ID authentication
A secure ID authentication system for authenticating over a multi-channel cellular radio network a response from a user module comprising a SIM card to a...
Distributed method and system for determining the position of a mobile
device using long-range signals and...
A method and system is described where a plurality of position reference devices use short-range wireless communication protocols to transmit positioning...
Automatic curation and modification of virtualized computer programs
In an embodiment, a data processing method comprises receiving a first instance of computer program data at a security unit having one or more processors;...
Systems and methods for monitoring the activity of devices within an
organization by leveraging data generated...
A computer-implemented method for monitoring the activity of devices within an organization by leveraging data generated by an existing security solution...
System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
Interacting with a remote server over a network to determine whether to
allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
Cross provider security management functionality within a cloud service
Implementation of cross provider security in accordance with the disclosures made herein enables users of a system (e.g., a cloud services brokerage platform)...
Multi-tiered protection platform
A multi-tier platform provides additional security at a perimeter of a computer system, where an intermediate layer interacts with a web layer and controls data...
Virtual smart card to perform security-critical operations
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of...
Method for securing an electronic document
The object of this invention is a method for securing an electronic document. In particular, this invention relates to a method that prevents the forging of...
Authentication for cluster peering
A method and system for authenticating of the pairing of computing devices is described. In an example, a passphrase is established on computing devices. The...
Content protection for data as a service (DaaS)
The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the...
Method and system for communicating over a segmented virtual private
An approach for providing secure communication services is disclosed. A secure data tunnel from a source node to a destination node is established via a...