At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Watch identification and authentication system and method
A method and system for creating and storing an identifier for a timepiece having at least one gemstone. The method includes determining one or more...
Disclosed is a mobile terminal. The mobile terminal according to the present inventive concept, comprises: a case; a printed circuit board (PCB), which is...
Method for producing a hardware device and hardware device
A method for producing a hardware device, in particular a trusted platform module for the execution of at least one cryptographic algorithm, the hardware device...
System and method for using file hashes to track data leakage and document
propagation in a network
The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated...
Computation to gain access to service
Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess...
Methods and systems for implementing security policies on a mobile device
Methods and devices for implementing security policies on a wireless device. The wireless device may include a non-volatile memory comprising a security type...
Apparatus and methods for displaying information regarding objects
Apparatus, and methods utilizing such apparatus, are described for displaying information regarding an object including a terminal for collecting, manipulating,...
Methods and systems for forcing an application to store data in a secure
The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting...
Automatic file encryption
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The...
Systems and methods for maintaining integrity and secrecy in untrusted
A method for operating a computing system with a trusted processor include generating a secret cryptographic key based on a physically unclonable function in at...
System and method for establishing a shared secret for communication
between different security domains
Embodiments may include generating an initial verifier for a first process, the initial verifier generated based on a trusted image of the first process....
Automating the creation and maintenance of policy compliant environments
Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first...
Apparatus and method for performing different cryptographic algorithms in
a communication system
A communication apparatus performs encryption on data transmitted from another communication apparatus by using first or second cryptographic algorithm, or...
Data security with a security module
A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The...
Interoperability between a plurality of data protection systems
A system is disclosed for providing interoperability between a plurality of data protection systems. The system includes an ontology (3) configured to store...
Software vulnerability notification via icon decorations
A computer identifies computer software applications installed on a computer. The computer sends an electronic request to a program on a server computer that...
Probabilistic cyber threat recognition and prediction
Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a...
Bitstream confirmation for configuration of a programmable logic device
A bitstream for configuration of a programmable logic device is received, the bitstream comprising a data segment and authentication data associated with the...
System and method for validating components during a booting process
A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting...
Modify executable bits of system management memory page table
A computing device to create a system management memory page table in response to the computing device powering on. The system management memory page table...
Encryption and decryption methods applied on operating system
An encryption and decryption methods applied on an operating system kernel are disclosed, where a hash result is obtained from a computation between a booting...
Apparatus and method for securing BIOS in a trusted computing system
An apparatus including a BIOS read only memory (ROM) and a tamper detector. The BIOS ROM includes BIOS contents stored as plaintext, and an encrypted message...
Providing geographic protection to a system
In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a...
Method for malware detection using deep inspection and data discovery
A method of detecting malware is provided. The method includes (a) from a database of historic network traffic, identifying a suspect file that traveled through...
System and method for antivirus checking of native images of software
Disclosed is a system and method for antivirus checking of native images of software assemblies. An example method includes for detecting malicious native...
Dynamically optimizing performance of a security appliance
A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat...
Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
Content management system for securely managing static and dynamic data
A computer-implemented method manages data content, the data content including static data and dynamic data. The content management method includes analyzing...
Framework for efficient security coverage of mobile software applications
using symbolic execution to reach...
A method is described that involves receiving an application and generating a representation of the application that describes states of the application and...
System and method for mobile communication device application advisement
This disclosure is directed to a system and method for providing advisement about applications on mobile communication devices such as smartphones, netbooks,...
Input information authentication device, server device, input information
authentication system, and program of...
At the time of input of authentication information, even when the hand and the input screen are seen from the third person, guess of authentication information...
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and...
Systems and methods for user authentication using eye movement and pupil
size change matching
A system for eye movement and pupil size change matching for user authentication includes an ocular sensor that is configured to sense eyes of a user and...
System and method for confirming location using supplemental sensor and/or
A system, apparatus, method, and machine readable medium are described for performing authentication using environmental data. For example, one embodiment of a...
Method for verifying and calibrating time
A method for verifying and calibrating time is provided. The method includes: receiving a password and related information sent by a client, obtaining related...
Multi mode operation using user interface lock
A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a...
Privileged shared account password sanitation
Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into...
Method of locking an application on a computing device
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the...
Virtualization system with trusted root mode hypervisor and root mode VMM
A first component of a Hypervisor is loaded into the memory upon start up. The first component is responsible for context switching and some interrupt handling....
Managing a software item on a managed computer system
A method and system is provided of managing a current software item on a managed computer system connectable to a management computer system via a computer...
Content source identification using matrix barcode
A system for fingerprinting audiovisual content. The system includes a content receiver and a display device in communication with the content receiver. The...
Dynamic fitness equipment user interface adjustment
A method and exercise system obtain at least one parameter of ongoing exercise on a fitness equipment unit and adjust at least one operational characteristic of...
Method and system for advanced aneurysm analysis
An automated method for aneurysm analysis including: extracting shape descriptors from test vessel data; generating an aneurysm probability map for the test...
Mapping cognitive to functional ability
Methods, systems, and apparatus, including medium-encoded computer program products, for mapping cognitive to functional ability include receiving data...
Management of pharmacy kits
A system for managing pharmacy kits comprises a reading station configured to read tag information from a plurality of radio frequency identification (RFID)...
Mobile apparatus for executing sensing flow for mobile context monitoring,
method of executing sensing flow...
A mobile apparatus includes a sensing handler and a processing handler. The sensing handler includes a plurality of sensing operators. The sensing operator...
Methods and processes for non-invasive assessment of genetic variations
Provided herein are methods, processes and apparatuses for non-invasive assessment of genetic variations.
Fault injection of finFET devices
A device layout tool includes a gate electrode layer, wherein the gate electrode layer is configured to define a three dimensional gate structure over a fin...
Apparatus and method for e-beam writing
A method of preparing mask data, the method begins with performing a logic operation to a design layout, and an optical proximity correction (OPC) is performed...