At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
Information theoretically secure protocol for mobile proactive secret
sharing with near-optimal resilience
Described, is system for mobile proactive secret sharing. The system initializes a RobustShare protocol to distribute a block of secret data among a set of...
Delegation of access rights to an account after the disappearance of the
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing...
Data driven system for responding to security vulnerability
A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a...
Information processing systems with security-related feedback
An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing...
Secured repair data package
An arrangement for storing a data set in an ECU in a vehicle control system, wherein the arrangement includes a computer connected to the vehicle, where the...
Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
Selective management of security data
Security techniques may be selectively performed on data based on a classification of the data. One example technique includes receiving a memory access command...
Printing system including a host apparatus, and a printing apparatus which
is connected to the host apparatus...
When performing authenticated printing, an administrator must minutely grasp the consistency between account registered information held by a printer and...
Security for memory module data
A memory module contains a set of contacts configured to contact a second set of contacts on a memory module connector when the memory module is removed from...
Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
Method of controlling SDIO device and related SDIO system and SDIO device
Described in embodiments herein are techniques for placing a secure digital input output (SDIO) device in a sleep mode and waking up the SDIO device from the...
3-dimensional model creation methods and apparatuses
Disclosed are methods and apparatuses for creating a 3-Dimensional model for objects in an inspected luggage in a CT system. The method includes acquiring slice...
Structure for railroad ties having data acquisition, processing and
A laminated wood and encapsulated railroad tie structure and its associated method of manufacture. A wood core of laminated wood slats is inserted into an...
Embedded security system for environment-controlled transportation
containers and method for detecting a...
An embedded security system for an environment-controlled trailer including a transportation refrigeration unit. The security system includes a plurality of...
Method for managing data communication between a communication device and
another device and communication device
A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500)...
Authorized areas of authentication
A secure access system, including a stationary computing device that controls access to secure data over a secure network, including an authorized area of...
System and method for building intelligent and distributed L2-L7 unified
threat management infrastructure for...
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically...
Selective modification of encrypted application layer data in a
transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
Clock synchronized dynamic password security label validity real-time
authentication system and method thereof
This invention discloses a clock synchronized dynamic password security label validity real-time authentication system and method thereof, which comprises, the...
Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
Secure connection between a data repository and an intelligence
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
Multi-tenant secure separation of data in a cloud-based application
Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of...
Securing data based on network connectivity
A method includes identifying a trusted computer network. The method also includes monitoring a plurality of active network connections. The method further...
Secure conditional access and digital rights management in a multimedia
Methods and systems for processing video data are disclosed herein and may comprise receiving within a single mobile multimedia processor chip integrated within...
Cost tracking for virtual control planes
Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be...
Security architecture, battery and motor vehicle having a corresponding
A security architecture, a battery, and a motor vehicle that has a corresponding battery are configured to be used to combine battery packs of a lower security...
Modular communicator for use in life critical network
A modular patient communicator provides for communications with a patient implantable medical device (PIMD) and connectivity with a central authority (CA) via...
Systems and methods of dynamically varying a pre-alarm time of a security
Systems and methods of adjusting a pre-alarm time are provided, including detecting, by a sensor, an entry into a building by a person and generating detection...
Systems and methods for customer deactivation of security elements
Systems (100) and methods (1100) for activating an Electronic Article Surveillance ("EAS") element deactivator. The methods involve: obtaining customer-related...
Methods and systems configured to detect and guarantee identity for the
purpose of data protection and access...
A security system is provided that integrates physical and logical security controls for the protection of secured resources. The resources may include physical...
Controlling access to a resource
A system is provided for controling access to a resource, the access being restricted by an access mechanism. The system comprises an access control subsystem...
Method and apparatus for the transfer of a money amount by using a two
dimension image code
The present disclosure concerns a method for transferring a money amount by using a two-dimension image code. It provides that the registration of the transfer...
Human body security inspection method and system
The present invention provides a human body security inspection method and system. The method comprises: retrieving in real-time scanning row or column image...
System and method for security and privacy aware virtual machine
A checkpointing method for creating a file representing a restorable state of a virtual machine in a computing system, comprising identifying processes...
Secure application access system
A proxy server creates an index of keywords, receives an encrypted record, decrypts the received encrypted record as decrypted data and, when a keyword in the...
Systems and methods for securing data
Systems and methods for securing data are disclosed. An administrative system may create a secure configuration. The secure configuration may disable...
System and method for remotely assigning and revoking access credentials
using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
Unified online content manager apparatuses, methods, and systems
Apparatuses, methods, and systems for transforming user identification information and user selection data inputs into a profile data output, a generated query...
Information processing apparatus and computer program product
According to an embodiment, an information processing apparatus includes a secure OS, a non-secure OS, and a monitor. The monitor is configured to switch...
Method and apparatus for authorizing a print device to perform a service
A document printing system may include a print engine, a controller coupled to the print engine and a communication port in electrical communication with the...
Robust data replication
Disclosed is a system for replicating data. The system may comprise a plurality of nodes preferably organized in groups with one of the nodes acting as a...
Systems and methods for presenting actual data on a display device based on eye-tracking data. An eye-tracking engine receives sensed data from an eye-tracking...
Secure smartphone-operated gun lock with means for overriding release of
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
System and method for capturing exercise data
The system and method for capturing exercise data may include offsetting an imaginary longitudinal axis of a center beam of a workout bar and an imaginary...
Coexistence of multiple radios in a medical device
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
Remote provisioning of 3GPP downloadable subscriber identity module for
virtual machine applications
A method is presented of providing a subscriber identity for the provision of services on behalf of the subscriber in a virtual computing environment. The...
Client device with secure clock and methods for use therewith
A client device includes a network interface that is coupled to receive media content and server time data via a network, wherein the media content is protected...