At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system to provision and manage a computing application hosted
by a virtual instance of a machine
A system and method are described for provisioning and managing virtual instances of a computing application running within a public virtualization space...
Virtual machine management using a downloadable subscriber identity module
A method is presented of establishing communications with a Virtual Machine, VM, in a virtualized computing environment using a 3GPPcommunications network. The...
Transparent type-based object augmentation by orthogonal functionality
Tools and techniques are described for transparently and safely augmenting the functionality of objects in an existing collection of objects. One approach...
Radar signal processing device, radar apparatus, and method of processing
A radar signal processing device is provided, which performs a scan correlation in a polar coordinate system to secure accuracy of the scan correlation, and...
Railway safety critical systems with task redundancy and asymmetric
A railway safety critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product...
Data carrier with see-through window and method for producing it
The invention relates to a data carrier having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of...
Ergonomic man-machine interface incorporating adaptive pattern recognition
based control system
An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context....
Method and system for preserving privacy during data aggregation in a
wireless sensor network
A computer-based system and method for secured privacy preservation scheme while data aggregation in a non-hierarchical wireless sensor network that lacks...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Utilizing a social graph for network access and admission control
Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a...
Facilitation of seamless security data transfer for wireless network
Configuration and credential data associated with a wireless network can be stored by the wireless network or a by a gateway device associated with the wireless...
Method and apparatus for automated password entry
A method and apparatus are provided for protecting security credentials (e.g., username/password combinations) and/or other sensitive data in a "password...
Virtual machine and application migration over local and wide area
networks without timeout using data compression
Long distance cloud migration (LDCM) to overcome the limitations faced by the cloud migration techniques over long distance, high speed WAN infrastructures....
Automated firearm security measures to contact assistance
Removing a gun or other weapon from a holster may inevitably require police backup to secure officer safety. One example device may include a weapon securing...
Method and system for identifying a security document
A method is provided of identifying a security document using an identifying device. The identifying device is provided with a capacitance sensor and a second...
Method and apparatus for secure wireless point of sale transactions
In an embodiment, a method of masking transaction data for a secure wireless transaction includes transmitting wireless pseudo transaction data that includes...
System and method for secure cross-domain communication in a browser
A method for client-side cross-domain communication of a browser application executing on a client computing device, wherein said browser application comprises...
Method for managing public and private data input at a device
A method is provided for managing public and private data input by a device such as a mobile handset, a personal digital assistant, a personal computer and an...
System and method for secure loading data in a cache memory
A system and method for securely loading data in a cache memory associated with at least one secure processor that performs data processing by using at least...
Baseband secure boot with remote storage
In order to simplify and reduce the cost of an electronic device, the size of a first non-volatile memory associated with an integrated circuit is significantly...
Data management method
Provided is a technology for improving the efficiency and the accuracy of data security. To this end, protection information provided to data is maintained...
Selective monitoring of archive and backup storage
Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a...
Processing run-time error messages and implementing security policies in
A user administers web hosting on user's server from his computer remotely. When a run time error is generated, an error message is sent to a server connected...
Patch management automation tool for UNIX, APARXML
The present invention provides a common framework to determine if machines are patched and automatically applies patches as required. It provides an automated...
Using hard drive on panels for data storage
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an...
Structural bollard assembly for electric vehicle infrastructure
The invention disclosed herein is directed to electric vehicle ("EV") infrastructure, which includes a customizable charging station that comprises a modular...
Methods and apparatus for access data recovery from a malfunctioning
Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus...
Mobile device authentication
One aspect of the invention is a system for mobile device authentication. The system includes a public-facing server configured to interface with a mobile...
Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...
Technologies for scalable security architecture of virtualized networks
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security...
Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
Identity management via cloud
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving...
Secure computer operations
In some implementations, a computing device includes an identifier that is embedded into a firmware of the computing device. The identifier uniquely identifies...
Apparatus and method for secure delivery of data from a communication
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
Securing email conversations
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address...
Method and system for managing security in a computing environment
A method and system for managing data security in a computing environment. A processor at the gateway server receives, from a user device, at least one message....
Cross domain gateway having temporal separation
A computer network is disclosed that includes a first domain and a second domain. The second domain has a higher security classification than the first domain....
Systems and methods for remote device configuration
Systems and methods for remote device configuration is provided. In one embodiment, a method comprises outputting, from a computer, to a first computing device,...
Cryptographic security functions based on anticipated changes in dynamic
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
Secure pairing for secure communication across devices
Technologies for securely pairing a first computing device with a second computing device include the first computing device to generate a session message key...
Methods for cryptographic delegation and enforcement of dynamic access to
Efficient methods for assigning, revoking, and realizing access to stored data involve a cryptographic key hierarchy and a set of operations performed on...
Angled connector for connecting two devices and having a fastening device
Embodiments of the present disclosure include an apparatus and a method for connecting a first device and second device. An apparatus includes an angled...
DRAM security erase
A memory includes a DRAM array having memory cells, wordlines and bitlines coupled to the memory cells, and sense amplifiers. The memory can be configured to...
Secure nonscheduled video visitation system
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated...
System and method for populating a field on a form including remote field
level data capture
In general, in one aspect, the invention relates to a method for populating a field on a form. The method includes: establishing a communication session between...
Methods and systems for securing stored information
Methods and systems for securing information are provided. The method includes generating a hash key by an input/output (I/O) processing module interfacing with...