At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
INFORMATION PROCESSING APPARATUS, POWER SOURCE CONTROL METHOD OF
INFORMATION PROCESSING APPARATUS AND PROGRAM
Provided is an information processing apparatus including an IC module that performs communication with an external apparatus, a detection unit that detects an...
Methods and Apparatus for Localizing a Source of a Set of Radio Signals
Methods and apparatus are provided for localizing a source of a set of radio signals, such as radio signals received from an RFID tag at various locations. A...
RADIO FREQUENCY IDENTIFICATION (RFID) READER, RFID TAG, AND METHOD THEREOF
FOR PERFORMING WRITE CHECK OF TAG DATA
An RFID reader, RFID tag, and method thereof for performing a write check of tag data. According to an exemplary embodiment, the RFID reader may include: a...
CARD READER AND CONTROL METHOD THEREFOR
A card reader may include a card insertion slot into which the card is inserted; a metal detecting mechanism structured to detect the external connection...
ANTI-RECORDING CARD READING DEVICE
This anti-recording card reading device includes: a magnetic card reading head having a data reading terminal and a flexible circuit board, where the flexible...
CMOS CURRENT-MODE SQUARING CIRCUIT
The CMOS current-mode squaring circuit includes a translinear loop. A rectifier is used to produce the absolute value of the input current. Carrier mobility...
DATA PROCESSING SYSTEM WITH TEMPERATURE MONITORING FOR SECURITY
A processing system includes a processor and a temperature security module coupled to provide a temperature tamper signal to the processor. The temperature...
PROVIDING ENHANCED REPLAY PROTECTION FOR A MEMORY
In an embodiment, a processor includes: at least one core to execute instructions; a cache memory coupled to the at least one core to store data; and a tracker...
METHOD FOR ENCRYPTING DATABASE
According to an embodiment of the present invention, a computer program stored in a computer-readable medium for encrypting a data value included in a data...
FLEXIBLE COUNTER SYSTEM FOR MEMORY PROTECTION
The present disclosure is directed to a flexible counter system for memory protection. In general, a counter system for supporting memory protection operations...
TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES
Technologies for hardening encryption operations are disclosed. In some embodiments, the technologies harden encryption operations typically performed by...
DETECTION OF STEGANOGRAPHY ON THE PERIMETER
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The...
SYSTEMS AND METHODS FOR ANONOSIZING DATA
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to...
METAMOROPHIC STORAGE OF PASSCODES
Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes...
MANAGING DIGITAL PHOTOGRAPH METADATA ANONYMIZATION
An approach for managing photograph metadata anonymization is provided. The approach receives, by one or more processors, a photograph file, wherein the...
ELECTRONIC DATA SECURITY APPARATUS
An apparatus for providing security for an integrated circuit (IC) chip is disclosed. The apparatus may include the IC chip, attached to a surface of a printed...
ACCESS CONTROL METHOD AND TERMINAL DEVICE
An access control method and a terminal device are disclosed. The method includes: receiving an unlock password after receiving an instruction for opening an...
CONSUMER AND BRAND OWNER DATA MANAGEMENT TOOLS AND CONSUMER PRIVACY TOOLS
The disclosed tools include enhanced and flexible login and profile management tools as well as brand owner communication tools that provide more flexibility...
SYSTEM AND METHOD FOR CREATING AND TRANSITIONING TO MULTIPLE FACETS OF A
SOCIAL MEDIA OBJECT IN A SOCIAL NETWORK
Systems and methods for facilitating users to create multi-faceted social media objects (e.g., text, images, videos, etc.) with one public facing front side...
PRIVACY AND MODELING PRESERVED DATA SHARING
A method for generating a classification model using original data that is sensitive or private to a data owner. The method includes: receiving, from one or...
SYSTEM AND METHOD ENABLING MULTIPARTY AND MULTI LEVEL AUTHORIZATIONS FOR
ACCESSING CONFIDENTIAL INFORMATION
Disclosed is a method and system for enabling multi-party and multi level authorizations for accessing confidential information. A first set of access...
SECURING PROTECTED HEALTH INFORMATION BASED ON SOFTWARE DESIGNATION
Systems, methods, and computer program products to perform an operation comprising receiving, from a first process, a request to access content stored in a...
PRIVACY AND MODELING PRESERVED DATA SHARING
A system, method and computer program product for generating a classification model using original data that is sensitive or private to a data owner. The...
USER VERIFICATION USING TOUCH AND EYE TRACKING
A method includes receiving at a processor, an indication of a user touching a point on a data entry device, receiving at the processor, an indication of a...
NON-BLOCKING REGISTRATION IN DISTRIBUTED TRANSACTIONS
A method for transaction registration is described herein. The method includes sending, for a transaction manager, a registration request for a transaction....
SYSTEM AND METHOD FOR ENHANCED DISPLAY-SCREEN SECURITY AND PRIVACY
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
SYSTEMS, METHODS, AND APPARATUS TO PROVIDE PRIVATE INFORMATION RETRIEVAL
Systems, methods, and apparatus to provide private information retrieval. A disclosed example system includes a first trusted processing unit to store a first...
INTEGRATED CIRCUIT DEVICE, INFORMATION PROCESSING APPARATUS, MEMORY
MANAGEMENT METHOD FOR INFORMATION STORAGE...
A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region...
MASKING OF DIFFERENT CONTENT TYPES
Systems and methods for masking content of different types are described. The system may implement the method comprising receiving a request to mask input...
DATABASE SERVER AND CLIENT FOR QUERY PROCESSING ON ENCRYPTED DATA
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to...
FLEXIBLE ROLE BASED AUTHORIZATION MODEL
Systems and methods described herein relate to role-based authorization systems which allow customization of role templates as well as the ability, using...
Smart Card with Domain-Trust Evaluation and Domain Policy Management
Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or...
SECURE USER INPUT MODE FOR ELECTRONIC DEVICES USING RANDOMIZED LOCATIONS
OF SELECTION INDICIA
Operations by an electronic device include randomly selecting an initial location among ordered keys for display of a selection indicia, and displaying on a...
DATA SECURITY WITH A SECURITY MODULE
A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The...
Systems and Methods for Protecting Video Content
Systems and methods for content-protecting video codecs are described. At least one embodiment of the invention comprises a system for protecting video content...
OUT-OF-BAND HOST OS BOOT SEQUENCE VERIFICATION
Embodiments of techniques and systems for out-of-band verification of host OS components are described. In embodiments, a out-of-band host OS boot sequence...
Method for Validating an Untrusted Native Code Module
A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system...
METHOD FOR EVALUATION, COMPUTER-READABLE RECORDING MEDIUM HAVING STORED
THEREIN PROGRAM FOR EVALUATION, AND...
According to an aspect of the embodiments, a method for evaluation of selection for an edited field, including: displaying information having one or more...
INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD
An information processing device may include a master circuit; and a security circuit. The master circuit may include a status checking circuit configured to...
MEMORY SCANNING METHODS AND APPARATUS
Memory scanning methods and apparatus are disclosed. An example apparatus includes a walker to traverse a paging structure of an address translation system; a...
System and Method for Emulation-based Detection of Malicious Code with
Unmet Operating System or Architecture...
System, method and media are shown for detecting potentially malicious code by iteratively emulating potentially malicious code, that involve, for each offset...
UNAUTHORIZED ACTIVITY DETECTION AND CLASSIFICATION
Systems and methods are provided for identifying and detecting unauthorized user activity and for decreasing the rate of false-positives. The disclosed systems...
TECHNOLOGIES FOR CONTROL FLOW EXPLOIT MITIGATION USING PROCESSOR TRACE
Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of...
SECURITY WITHIN A SOFTWARE-DEFINED INFRASTRUCTURE
There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload...
CONTROL-FLOW INTEGRITY WITH MANAGED CODE AND UNMANAGED CODE
A data processing system (DPS) supports control-flow integrity (CFI). The DPS comprises a processing element with a CFI enforcement mechanism that supports one...
eMMC Monitoring Method and Apparatus
Embodiments of the present disclosure disclose an Embedded Multi Media Card (eMMC) monitoring method and apparatus. The monitoring method includes monitoring...
PATTERN INPUT APPARATUS AND METHOD, AND RECORDING MEDIUM USING THE SAME
The present disclosure discloses a pattern input apparatus and a pattern input method for user authentication. According to the present disclosure, differently...
PATTERN-BASED PASSWORD WITH DYNAMIC SHAPE OVERLAY
Methods for enabling pattern-based user authentication are described. During a registration phase for establishing user credentials, an end user of a computing...
IMAGE-BASED USER AUTHENTICATION
An authenticity accuracy, corresponding to a personal identification number, is determined. A device presents a correct image (or group of images) and an...