At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
Controlling a computer system
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
Method and vehicle-to-X communication system for selectively checking data
security sequences of received...
A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or...
Method of securing access to data or services that are accessible via a
device implementing the method and...
The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to...
Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
Electronic protected health information security for digital medical
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
Secure connection between a data repository and an intelligence
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
Method and apparatus for secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote...
Content-based transport security for distributed producers
A content-producing computer system can use a locally generated key or a client-generated key to communicate with a client device during a session over a...
Network device implementing two-stage flow information aggregation
A network security device includes a network flow statistics processing engine to process network flow information related to network flows. The network flow...
System and method for network virtualization and security using computer
systems and software
Methods and systems are provided for network security. In one embodiment, the method involves receiving a data packet (e.g., from a firewall). The method also...
Bi-directional data security for supervisor control and data acquisition
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
Takeover processes in security network integrated with premise security
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
Method, apparatus, and computer program product for dynamic security based
A method of routing data that is part of a grid job including steps of: receiving a data packet at a routing device; determining whether the data packet is...
Security system for handheld wireless devices using time-variable
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
Two-dimensional bar code for ID card
A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data...
Controlling exposure of sensitive data and operation using process bound
security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
Secure memories using unique identification elements
Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying...
Method for establishing a secure communication channel
The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote...
Methods and devices for fixed execution flow multiplier recoding and
One feature pertains to an electronic device that includes a memory circuit and a processing circuit. The processing circuit computes a scalar multiplication...
Methods and systems for providing data security in data storage devices
A data storage device comprising a storage media and a controller is disclosed. The controller is configured to receive a write command including a logical...
Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
Methods and apparatus for pairing items for security
An item of value comprises an assembly of parts. The parts comprise a component that has value independent of the item, and an assembly security system that is...
Image processing apparatus and method for processing image thereof
An image processing apparatus and image processing method thereof are disclosed. The image processing apparatus includes a first image processor which includes...
Secure authentication and payment system
The present invention provides a service for allowing secure financial transactions to be carried out, the service involving authenticating a user's identity...
Secure mobile payment processing
A system for processing payment data includes a payer terminal, a recipient terminal, and a payment server. The payer terminal is adapted to return, to the...
System and method for building automation using video content analysis
with depth sensing
A method and system for monitoring buildings (including houses and office buildings) by performing video content analysis based on two-dimensional image data...
Privacy protection for participatory sensing system
Provided is a method that may be used for privacy protection. The method comprises: generating a pseudonym at a user equipment in association with sensed data;...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving,...
Method and a device for making a computer application secure
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method...
Processing extensible markup language security messages using delta
Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
Computer system and method of securely booting a computer system
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data...
Secure privilege level execution and access protection
The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user...
Systems and methods for securing virtual machine computing environments
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
Controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
Cloud E-DRM system and service method thereof
A digital rights management system and a service method thereof, and an enterprise digital rights management (E-DRM) system for document security installed in a...
System and method of integrating mobile medical data into a database
centric analytical process, and clinical...
The present invention provides a system and method of integrating mobile medical data into a database centric analytical process, and clinical workflow. This...
Image display device and memory management method of the same
According to the present disclosure, there is disclosed an image display device and a memory management method thereof. According to an embodiment of the...
Secure data encryption in shared storage using namespaces
A data storage device in a distributed computing system has physical block addresses that are each allocated to multiple namespaces. To access the data storage...
Systems and methods for securely accessing encrypted data stores
The disclosed computer-implemented method for securely accessing encrypted data stores may include (1) receiving, from a data storage service, a request to...
Anomaly detection system, anomaly detection method, and program for the
An anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection...
Data management system of an aircraft
A system to manage transmissions of data between a flight management system (e.g., of an avionics type) of an aircraft and a portable electronic (e.g., of an...
System and method for acquiring electrical measurements of an electronic
Provided is a method and an apparatus for acquiring electrical measurements of an electronic device. The method and the apparatus comprise securing an...
Protecting data stored on a mobile communication device utilizing a
personal identification number code of a...
A method for protecting data on a mobile communication device, comprising: reading existing security data from a universal integrated circuit card (UICC) during...
Location brokering for providing security, privacy and services
Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt...
Secure wireless network setup using multicast packets
A method is described of adding a wireless device to a secure wireless local area network (WLAN) that is secured by a wireless network security key. A computer...
Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...