At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Managing transmission and storage of sensitive data
Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance...
Method and system for web integrity validator
A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data...
Performance enhancements for finding top traffic patterns
A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
Cryptographic proxy service
A cryptographic proxy service may be provided. Upon determining that data associated with a network destination comprises at least some sensitive data, a...
Intelligent security analysis and enforcement for data transfer
An approach is provided for managing a message being transferred from a mobile device. A sensitivity level of data in the message payload is determined prior to...
Data encryption cipher using rotating ports
A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) to establish multiple secure point-to-point connections. This...
Communication system, wireless communication apparatus, and communication
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
Host providing system and communication control method
A host providing system includes a physical host network switch which determines permission and non-permission of communication on the basis of whether or not...
System for and method of securing a network utilizing credentials
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device...
System and method for optical security firewalls in computer communication
There is a method and system for a bidirectional firewall in computer communications, which utilizes the transfer of information from an optical display to a...
System and method for authentication for transceivers
A method and apparatus of a network element that authenticates a transceiver and/or a field replaceable unit of the network element is described. The network...
Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
Identifying security boundaries on computing devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a...
Event-driven, asset-centric key management in a smart grid
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event...
A device for decrypting data includes a number of devices secured by at least one security device. The secured devices include a receiver for receiving...
Managing data exchange between an avionic core and an open world device
A flight management system includes: an avionics core implementing generic aircraft management functionalities and providing services associated with the...
Methods, systems, and products for security services
Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm controller determines an alarm...
Apparatus and method for managing health data
An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the...
Method for secure storing of a data file via a computer communication
A computer implemented method, server computer and computer program for securely storing a data file via a computer communication network. The method includes:...
Adding or replacing disks with re-key processing
In a network of multiple storage devices, a storage device may become faulty and need to be replaced or additional capacity may need to be added through...
Risk adaptive information flow based access control
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the...
Separation of duties checks from entitlement sets
A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access...
Security and data privacy for lighting sensory networks
In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key...
Systems and methods for detecting discrepancies in automobile-network data
The disclosed computer-implemented method for detecting discrepancies in automobile-network data may include (1) receiving data that indicates at least one...
Processing data stored in external storage device
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data...
Hybrid applications utilizing distributed models and views apparatuses,
methods and systems
The Hybrid Applications Utilizing Distributed Models And Views Apparatuses, Methods And Systems ("HAP") transform hybrid application user inputs using HAP...
Security role testing using an embeddable container and properties object
Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data...
Weighing apparatus with secured communication means
A weighing apparatus 1 comprising a load cell 4, a processing unit 3 external of the load cell 4 and data means 7, 8, 9, 10 for operating the weighing apparatus...
Translational correction of payload-release device based on tracked
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground...
Activity monitoring system with haptic feedback
An activity monitoring apparatus is provided. The activity monitoring apparatus includes a retention feature configured to removably secure the monitoring...
System and method for wireless handheld device security in a data center
A data center includes an access controller with a short range wireless communication controller, and an access point with a long range wireless communication...
Managing hidden security features in user equipment
A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first...
Terahertz wireless communications-based method and system for data
A first terahertz storage device and a second terahertz storage device may be placed within an effective distance to each other, and, by connection and pairing...
Systems and methods to synchronize data to a mobile device based on a
device usage context
A method, system, and computer-readable medium for synchronizing policy data on a device based on device usage context. By synchronizing policy data on the...
Method and apparatus for low cost 3D video making
Video capture devices may be held in a frame having at least two openings and a plurality of slots on a first side and a plurality of tabs on a second side...
Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
Resumption of play for a content-delivery session
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
Systems and method for assuring security governance in managed computer
An agile governance system provides recommendations for infrastructure change requests concerning a cloud-based computer environment in accordance with security...
Application self-service for assured log management in cloud environments
A log management service provides automated log management for any applications deployed on a cloud. A security profile defining the logging requirements for...
Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
Data encryption/decryption using neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
Data encryption, transport, and storage service for carrier-grade networks
A method, a system, and a non-transitory storage medium for storing user preferences pertaining to a data encryption service that provides on-demand encryption...
Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
A method includes receiving biometric data, the biometric data non-uniformly distributed and processing the biometric data to a level of randomness as a...
Secure bitstream authentication
Methods and systems are provided for securely authenticating data of an integrated circuit. By authenticating data having keystream blocks inserted between...
Communications system having a secure credentials storage device
The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device...
Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...