At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Healthcare as a service--downloadable enterprise application
An application as a service provided in a secure environment. A sandbox in a user's computing environment may be created. An application may be downloaded to...
System for positioning a tool in a work space
A system for assisting in the use by an operator of the operating element of a tool at desired locations at a worksite, includes a stationary control and a...
Method and device for machining large sized plates in a numerical control
A method and device useful for material removal from large plate-shaped materials, for example machining and polishing of glass and stone. The invention...
Arthroplasty jig and method of performing arthroplasty
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
Method, system, network element, and gateway for processing access point
name restriction information
A method, a system, a network element, and a gateway for processing access point name restriction information are disclosed. The method includes a second...
System and method for social sensor platform based private social network
The present systems and methods are directed to a private network of personal social sensors. The sensors are irreversibly paired with a communication device...
Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
System and method for providing network and computer firewall protection
with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
Collaborative infrastructure supporting cyber-security analytics in
A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is...
Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
Data leak protection in upper layer protocols
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
Security services for end users that utilize service chaining
Embodiments described herein provide security for end users of User Equipment (UE) that utilize service chaining for Service Data Flows (SDFs). One embodiment...
Multi-path routing control for an encrypted tunnel
The present disclosure is directed to a system and method for applying unique routing rules to encrypted data packets being transmitted via a tunneling...
System, method and computer program product for serving an application
from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
Method and apparatus for plug-in wireless safety devices
An aftermarket vehicle communications device that that is part of a V2X communications system. The device can be a plug-in device, a wireless device separate...
Method, apparatus and system for security application for integrated
At least one method, apparatus and system disclosed involves providing a restricted access protocol for accessing a memory device. A first memory portion of a...
Key extraction during secure boot
One feature pertains to a method for extracting a secret key during a secure boot flow of an integrated circuit. Specifically, the secure boot flow includes...
Virtual input mechanism for secure data acquisition
A prompt for input data in a user interface (UI) is detected. An input window to receive the input data is presented, and the input data is received via the...
Systems and method for wirelessly and securely updating a terrain
awareness warning system database
Systems and methods for updating a terrain awareness and warning system (TAWS) database are disclosed. The systems request, by way of the first wireless...
Data transmission blocking holder for personal data transmitting and
A personal communication device ("PCD") holder includes: an at least semi-rigid housing having a base wall and at least one side wall extending from the base...
Interchangeable internal modular avionics platform assembly
Internal interchangeable modular avionics platform assemblies and methods for removably mounting and interchanging modular avionics platforms within an...
Method and system for fast access to advanced visualization of medical
scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
Computer security vulnerability assessment
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
System and method of cyber threat intensity determination and application
to cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings,...
System and method of cyber threat structure mapping and application to
cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
System security monitoring
A computing device may receive netflow data that includes information corresponding to network-side activity associated with a target device. The computing...
System and method for data center security enhancements leveraging server
SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
Secure collection of sensitive data
In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a...
Systems and methods for image-based encryption of cloud data
The disclosed computer-implemented method for image-based encryption of cloud data may include (1) identifying a user account for a cloud data store, wherein...
System and method of establishing trusted operability between networks in
a network functions virtualization...
A system for establishing a trusted end-to-end communication link between different NFV networks is disclosed. The system comprises a server operating in a...
Systems for improved mobile internet performance and security
Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A...
Intelligent medical network edge router
A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking...
Method and system for securing the entry of data to a device
Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn...
System and method for secure deletion of data
Systems and methods for secure deletion of data items in a storage system may support the deletion of stored data item. In response to a storage request, a...
Grommet-mount electrical power unit assembly
An electrical receptacle assembly is mountable at an opening in a work surface to provide convenient access to electrical power and/or data. The assembly...
Semiconductor device and method of manufacturing same
An object is to provide a reliability-improved semiconductor device having a MONOS memory that rewrites data by injecting carriers into a charge storage...
Entry point opening sensor
A sensor package is disclosed that includes, a compass, an accelerometer, and an electromagnetic flux tag based open/close sensor. The compass may be activated...
Pattern analytics and physical access control system method of operation
A predictive physical access control and security intervention system includes a credential device, indicia sensors, portal actuators; and a data store of...
Online stock payment system
In general, this disclosure describes an electronic payment processing system that facilitates payment for goods or services using securities, such as stock. In...
Method and system for risk measurement and modeling
A method and system for risk measurement and modeling, which may be used to identify and mitigate information security risks for an information system, and...
Secure data processing method and use in biometry
The invention relates to a processing method, including the calculation of one function between a datum to be compared and a reference datum. The function can...
Hosted application gateway architecture with multi-level security policy
and rule promulgations
A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database...
Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
Systems and methods for data sharing and transaction processing for high
Systems and methods for data sharing and transaction processing for high security documents are disclosed. According to one embodiment, a method may include (1)...
Secure query processing over encrypted data
The subject disclosure is directed towards secure query processing over encrypted database records without disclosing information to an adversary except for...
System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
Dynamic network tuner for the automated correlation of networking device
functionality and network-related...
A dynamic network tuner establishes fluid, continuous, and automatic correlation between the extent and/or degree of a networking device's functionality, on the...
Authentication and control of encryption keys
An apparatus, a method, and a system are presented in which the apparatus may include a security circuit, a processor, and an interface controller. The security...
Storage device reader having security function and security method using
Disclosed is a storage device reader for interfacing a storage device and a user terminal, which includes a storage unit and a control unit. The data storage...
Methods, apparatus, and systems for secure demand paging and other paging
operations for processor devices
A secure demand paging system includes a secure internal memory having a table relating physical addresses to virtual addresses, a non-volatile memory, a...