At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL
A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on...
COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS AND USING FACIAL
A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can...
Multi-Focused Fine-Grained Security Framework
An approach is provided in which a knowledge manager generates a knowledge structure that includes security annotation tokens and term tokens. Each of the...
DATA STORAGE SYSTEMS AND METHODS
Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive...
Managing Keys Used for Encrypting Data
A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time...
SYSTEM AND METHOD FOR PROVIDING A CRYPTOGRAPHIC PLATFORM FOR EXCHANGING
A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted...
METHODS AND APPARATUSES FOR IMPROVED APP SECURITY TESTING
Embodiments are disclosed for performing static and/or non-emulated dynamic analysis of mobile computing device software to improve app security testing. In...
SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING
A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and...
SYSTEM AND METHOD FOR VERIFYING MALICIOUS ACTIONS BY UTILIZING VIRTUALIZED
A system comprising a memory device having executable instructions stored in the memory device, and a processing device, in response to the executable...
USER CONTROLLABLE PLATFORM-LEVEL TRIGGER TO SET POLICY FOR PROTECTING
PLATFORM FROM MALWARE
Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some...
SYSTEM AND METHODS FOR SECURE FIRMWARE VALIDATION
An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor...
SECURE SOFTWARE AUTHENTICATION AND VERIFICATION
A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve...
Method and Apparatus for Providing Security to Devices
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The...
IDENTIFICATION OF COMPUTERIZED BOTS, AND IDENTIFICATION OF AUTOMATED
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or...
A COMPUTING DEVICE FOR ITERATIVE APPILCATION OF TABLE NETWORKS
A computing device (500) comprising an electronic storage (510) and an electronic processor (550) coupled to the storage, the storage storing a series of table...
VIRUS SIGNATURE MATCHING METHOD AND APPARATUS
The present disclosure provides a virus signature matching method, including: obtaining an inputted target file; loading a virus signature database, and...
AUTOMATED IDENTIFICATION AND REVERSE ENGINEERING OF MALWARE
An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be...
MANAGING SOFTWARE DEPLOYMENT
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
RENDER ENGINE, AND METHOD OF USING THE SAME, TO VERIFY DATA FOR ACCESS
AND/OR PUBLICATION VIA A COMPUTER SYSTEM
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce...
TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of...
Method to Detect Malicious Behavior by Computing the Likelihood of Data
A method, performed by a processor to detect malicious or risky data accesses is provided. The method includes modeling user accesses to a content repository...
Paravirtualized Security Threat Protection of a Computer-Driven System
with Networked Devices
A computer-implemented method and computer program product for protecting a computer-driven system from a security threat. The computer-driven system includes...
USER ACTIVITY MONITORING
Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An...
COMPUTER DEVICE AND METHOD FOR ISOLATING UNTRUSTED CONTENT ON A CLIPBOARD
A computer device and respective method provides a primary clipboard accessible from a primary user account, while a sandbox is used to isolate and contain a...
COMPUTER DEVICE AND METHOD FOR CONTROLLING UNTRUSTED ACCESS TO A
A computer device includes hardware with a connected peripheral device such as a camera or a microphone. An operating system is configured to operate the...
DEVICE AND METHOD OF REQUESTING EXTERNAL DEVICE TO EXECUTE TASK
A first device requesting a second device to execute a task is provided. The first device includes a communication unit configured to communicate with the...
SYSTEMS AND METHODS FOR AUTHENTICATED SYSTEM PARTITION ACCESS
In accordance with embodiments of the present disclosure, an information handling system may include a processor, a storage resource communicatively coupled to...
SOFTWARE VERIFICATION FOR AUTOMATIC TRAIN OPERATION
An automatic train operation system includes a first control system configured to run a first software for controlling a first vehicle subsystem and a second...
METHOD OF AUTHENTICATION
A method of image-based authentication comprising the steps of: receiving a user input representing a first combination of a plurality of images; and...
NUMERIC KEYPAD ENCRYPTION FOR AUGMENTED REALITY DEVICES
Embodiments of the present invention provide methods and systems for numeric keypad encryption using an augmented reality device. The method may include...
Unlocking Control Method and Apparatus for Intelligent Terminal
This application discloses an unlocking control method and apparatus for an intelligent terminal, including: detecting, when an intelligent terminal enters an...
Secure Element as a Digital Pocket
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are...
PERFORMING USER SEAMLESS AUTHENTICATIONS
In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the...
METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY
A technology is disclosed that addresses the problem of identity verification while respecting the need to minimize intrusion upon the privacy and civil rights...
MULTI-FACTOR AUTHENTICATION USING A COMBINED SECURE PATTERN
A method and system for multi-factor authentication. The method involves combining a plurality of authentication patterns into a combined secure pattern by...
SYSTEMS AND METHODS FOR PROVIDING AUTOMATIC CONTENT RECOGNITION TO VERIFY
Systems and methods are disclosed herein for an Automatic Content Recognition (ACR) system that determines whether affiliates are adhering to criteria set by...
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND
An information processing device includes an acquisition unit configured to acquire developer identification information associated with an application program...
MEDIA DISTRIBUTION NETWORK, ASSOCIATED PROGRAM PRODUCTS, AND METHODS OF
USING THE SAME
A media server is disclosed, and comprises one or more non-transitory computer-readable memory devices upon which at least one set of instructions are stored,...
MEDIA CLIENT DEVICE SETUP UTILIZING ZERO-TOUCH INSTALLATION
A device may receive and store first device information (first information), associated with a media client device (media client), and a first security key (a...
NETWORK MODELING FOR DRUG TOXICITY PREDICTION
A computational systems pharmacology framework consisting of statistical modeling and machine learning based on comprehensive integration of systems biology...
METHODS, SYSTEMS, AND DEVICES FOR DESIGNING MOLECULES
Method, systems, and devices for designing a test molecule are disclosed. An example method includes using a molecular simulator to generate sets of simulation...
SYSTEMS AND METHODS FOR PAIN TRACKING
Systems, methods, and computer program products for recording and monitoring pain are disclosed. A device may record a date and time corresponding to a pain...
POPULATION PHARMACOKINETICS TOOLS AND USES THEREOF
The present invention is directed to computer based pharmacokinetics systems, such as. web-based pharmacokinetics systems, and their use to predict a dose and...
SYSTEMS AND METHODS FOR ASSESSMENT OF TISSUE FUNCTION BASED ON VASCULAR
Systems and methods are disclosed for assessing tissue function based on vascular disease. One method includes receiving a patient-specific anatomic model...
SYSTEMS AND METHODS FOR CARDIOVASCULAR BLOOD FLOW AND MUSCULOSKELETAL
MODELING FOR PREDICTING DEVICE FAILURE OR...
Computer-implemented methods are disclosed for assessing the effect of musculoskeletal activities on disease and/or clinical events, the method comprising:...
SUBJECT-SPECIFIC ASSESSMENT OF NEUROLOGICAL DISORDERS WITH BIOCHEMICAL
A method for subject-specific assessment of neurological disorders, the method includes receiving 3D image data representative of a subject's brain and...
The present invention provides a method of determining a treatment program for a subject. The method includes obtaining subject data representing the subject's...
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR RESPIRATORY AND CARDIOVASCULAR
MONITORING, EVALUATION, AND TREATMENT
A patient respiratory and cardiovascular monitoring and evaluation system broadly comprising a wearable respiratory and cardiovascular monitoring garment, a...
SYSTEM AND METHOD FOR PERFORMING A DIAGNOSTIC ANALYSIS OF PHYSIOLOGICAL
A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a user profile of a...
Safety Features for Medical Devices Requiring Assistance and Supervision
An automatic locking system for a medical treatment device helps to ensure that an assistant is present during treatment of a patient. Among the features...