At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method of operating a security system with deterrent capability for
intimidation and neutralization
A method of operating a security system with deterrent capability is implemented through security cameras that are articulated and non-articulated, entry doors,...
Secure distributed single action payment authorization system
Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes transmitting user...
Secured keypad devices
A data entry device including a housing including a top housing portion including key apertures, a plurality of data entry keys mounted in the housing to have...
Method, server and computer program for security management in database
Disclosed is a program for security management in a database, which is stored in a computer readable medium to allow a computer to perform steps including:...
Entity security implied by an asset in a repository system
Techniques are described for managing access to a repository system storing information (e.g., metadata) about objects (e.g., an application, a process, or a...
Aggregation and classification of secure data
In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a...
Confidential extraction of system internal data
Secure extraction of state information of a computer system is provided. A method includes obtaining, by a security engine of a system, a public encryption key...
Split storage and communication of documents
Embodiments for preventing data loss and allowing selective access data include systems and methods that receive a data payload to be stored by the system;...
Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
Protection of secured boot secrets for operating system reboot
Protecting secured boot secrets while starting an operating system. Embodiments include starting a first operating system using a trusted computing base,...
System and method for updating an operating system for a smart card or
other secure element
A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active...
Establishing secure initial state in a processing platform containing both
high assurance security and...
A method including initializing the processing platform, wherein initializing the processing platform includes performing a power on self-test (POST) configured...
Synchronization of UEFI secure boot variables on a managed server
Techniques are provided for actively managing secure boot variables. Such techniques include receiving a request from an entity to modify a portion of a basic...
Trusted code generation and verification to prevent fraud from maleficent
external devices that capture data
A user equipment. The user equipment comprises a processor, a memory, a trusted security zone, wherein the trusted security zone provides hardware assisted...
Method and system to provide access to secure features of a device
A method of providing access to secure features of a device includes detecting motion of a secured device during entry of first access credentials on the...
Memory management device and non-transitory computer readable storage
In one embodiment, a storage unit stores a table tree and verifier tree. The table tree includes parent and child tables. The verifier tree includes parent and...
Data recorder for permanently storing pre-event data
A data recorder for permanently storing pre-event data may include a read-write memory with a plurality of bit cells in the read-write memory. Each bit cell may...
System-based control of programmable devices
A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of...
Independently operable flight data capture and transmission device
An independently operable flight data capture and transmission device includes an aerodynamically efficient main body having a mounting bracket for securing the...
Device, system and method providing data security and attribute based data
access in participatory sensing
Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data...
Managing use of security keys
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply...
Security application for data security formatting, tagging and control
A security program installed or in communication with a computer is provided. The security program is configured to intercept disk (I/O) operations that...
Method and apparatus to process KECCAK secure hashing algorithm
A processor includes a plurality of registers, an instruction decoder to receive an instruction to process a KECCAK state cube of data representing a KECCAK...
Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
Nonce silent and replay resistant encryption and authentication wireless
An access point and a sensor node are disclosed for use within a wireless sensor network. The wireless sensor network includes at least one access point adapted...
Certificating vehicle public key with vehicle attributes
A method for providing secure connection between vehicles. A unique pair of digitally signed public key and private key is provided to each vehicle, along with...
Secure emergency response technology
Technology for securely processing emergency response. An emergency response server receives intermittent location data from a client device during...
Real-time network monitoring and security
A hardware device for monitoring and intercepting data packetized data traffic at full line rate, is proved. In high bandwidth embodiments, full line rate...
Method and system for secure digital object management
A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host...
Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
Proxy-less secure sockets layer (SSL) data inspection
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
Method for logging of a remote control session
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
Systems and methods of transmitting data
Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to,...
Sensor-based detection and remediation system
The invention comprises a method and system of deploying and managing sensor agents to provide services to networks and devices within a network. The invention...
Methods and apparatus for validating a digital signature
Various embodiments include one or more of systems, methods, software, and data structures for validating a digital signature, wherein common information in a...
Visible-light communication-based encryption, decryption and
encryption/decryption method and system
Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication....
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
Convertible data carrier cradle for electronic mobile device
A data carrier is convertible into a cradle for a mobile communications device. The data carrier includes a first manipulation line downstream of a cutout in...
Abberation detection technology
In some implementations, techniques are described for detecting abnormal installations in a property monitored by a monitoring (e.g., security) system. For...
Security system storage of persistent data
A security system including devices generating persistent data, a local control system (LCS) including a microprocessor and non-volatile memory and receiving...
Garage door status and control via a security system
Methods, systems, and devices are described that are directed to status and control of a garage door system via an alarm system controller. A garage door system...
Diamond-based tradeable instrument security system
A tradeable commodity or instrument, a trading system for a plurality of such commodities, a method of trading using such a system and security systems related...
Intelligent interactive voice response system for processing customer
Extracting and sharing user preference information includes receiving a call from a user device, retrieving user information from a user account stored in a...
Spatial security for stored data
Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or...
Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
Secure controller systems and associated methods thereof
Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive...