At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
Proximity-based system that secures linked wireless-enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
System and method for limiting mobile device functionality
The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile...
Methods and devices for performing a mobile network switch
A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element includes the steps of:...
Method and device to embed watermark in uncompressed video data
A system and method to watermark an uncompressed content received at a client device in a compressed form and encrypted by at least one content key, said...
Network traffic controller (NTC)
A Network Device (ND) may be configured to enable secure digital video streaming for HD (high definition) digital video systems over a standard network. The ND...
Apparatus and method for managing subscriber profile in wireless
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
Passive based security escalation to shut off of application based on
rules event triggering
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications...
Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
System and method for monitoring computing servers for possible
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
Quantitative security improvement system based on crowdsourcing
The efficacy of security products and practices is quantified, based on monitored activities and conditions on multiple computers over time. A set of metrics is...
Information processing apparatus, information processing method, and
computer readable medium
An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and...
Data security and integrity by remote attestation
The invention includes a system comprising a device, software installed on the device and coupled to the device's hardware and software stack to execute data...
System and method for advanced control tools for administrators in a
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of...
Method to prevent cloning of electronic components using public key
infrastructure secure hardware device
An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a...
Increased communication security
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
Security challenge assisted password proxy
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An...
System and method for creating a trusted cloud security architecture
The present invention provides a method for providing a computer implemented method and system for creating a trusted cloud security architecture having the...
Direct synchronization of synthesized clock
The Direct Synchronization of Synthesized Clock (DSSC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable...
Digital data content certification system, data certification device, user
terminal, computer program and...
A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed...
Client(s) to cloud or remote server secure data or file object encryption
Systems and methods to send or write data or file objects to a remote cloud storage or data server using an encryption gateway. In one embodiment, a...
Lightweight cyber secure bi-directional aircraft communications addressing
and reporting system (ACARS)...
The present invention generally relates to systems and methods for encrypting data. The disclosed techniques can include tracking a plurality of flight...
NFC apparatus capable to perform a contactless tag reading function
An NFC device may include a first and second controller interfaces, a first communication channel coupled to the first controller interface, and a second...
Collective objects management system with enhanced security
A collective objects management system with enhanced security for objects contained in object receptacles distributed throughout the system. Each object...
Secure point of sale terminal and associated methods
Methods and systems for processing secure information are disclosed. One method includes receiving secure data from a user via an input device. The method also...
Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send...
Method and secure device for performing a secure transaction with a
A method for performing a secure transaction between a secure device (2) and a terminal (4), the method being carried out by the secure device (2) and...
System and method for initially establishing and periodically confirming
trust in a software application
Systems and methods for providing trust provisioning are disclosed. A utilization request requesting to utilize data stored by a secure element associated with...
Secure data transfer from a vending device to portable data storage
Techniques for transferring secured data from a vending device to a portable data storage device are described herein. The vending device receives a request...
Method for evolutionary biometric recognition having speed and security
features suitable for POS/ATM applications
A method quickly recognizes a person by identification codes derivable from biometric data and includes registering a user, and recognizing a registered user,...
PROBLEM Unauthorized reproduction by a third party is to be prohibited by preventing waveform monitoring on a circuit board and by providing security from the...
Method and apparatus for processing biometric information in electronic
A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode,...
Platform to build secure mobile collaborative applications using dynamic
presentation and data configurations
System and method to provide access to protected data for a communication terminal, the system including: a publisher database configured to store protected...
Sensor aware security policies with embedded controller hardened
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within...
Record level data security
A database security system protects a data table at both the column level and the individual data record level. Access to data records within the data table is...
Cryptographic protection of information in a processing system
A processor employs a hardware encryption module in the processor's memory access path to cryptographically isolate secure information. In some embodiments, the...
Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
Systems and methods for security data analysis and display
Systems and methods are provided for improved security services. In one aspect, a method is provided for controlling an autonomous data machine situated near a...
Trusted execution within a distributed computing system
Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an...
Platform secure execution modes
The performing of virtual machine (VM)-based secure operations is enabled using a trusted co-processor that is able to operate in a secure mode to perform...
Deduplication-based data security
Providing data security includes: in response to a request to write data content to a storage, generating encrypted data content based on the data content;...
Secured KVM system having remote controller-indicator
A secure peripheral switching system comprises a secure peripheral switch remotely coupled to a secure remote controller-indicator, wherein the secure...
Secure housing for a portable computer
A secure housing for a portable computer, which has a screen, operating keys and at least one connector, can be transferred from an open state to a closed...
Portable security inspection system
The present specification discloses a radiographic inspection system for screening an area. The inspection system has a container that defines an enclosed...
Implantable heart pump controller
The present invention provides devices, systems, and methods for control of and communication with ventricular assist devices. In certain embodiments, the...
Method, system and apparatus for enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a...
Method of accessing a WLAN access point
The invention is a method for authorizing a device to establish a communication session with an access point of a WLAN. A secure token comprises a data related...
System and method for providing a public/private telephone number system
This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public...
Location intelligence management system for border security
Collection and analysis of network transaction information which includes the mobile device's usage, location, movements coupled with data from non-wireless...
Camera system API for third-party integrations
In embodiments of a camera system application program interface (API) for third-party integrations, a camera device captures images as a video stream and...