At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Identifiers for mass serialization
An example method includes generating a set of identifiers for a mass serialization; associating one or more of the identifiers of the set of identifiers with...
Device lock for transit
Generally, this disclosure describes providing theft deterrence for a device while in transit. The system may include lock state circuitry configured to receive...
Privacy protection for participatory sensing system
Provided is a method that may be used for privacy protection. The method comprises: generating a pseudonym at a user equipment in association with sensed data;...
System, method and computer program product for controlling access to
protected personal information
A computer-based system, method and computer program product for controlling access to protected personal information is disclosed. Protected personal...
Recommendation system for protecting user privacy
One embodiment of the present invention sets forth a technique for providing application command recommendations to a privacy-sensitive client device. The...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving,...
Protection of designs for electronic systems
In one approach for protecting a design, a plurality of implementations of the design are generated. Each implementation includes an identification function....
Portable recording medium, system including the portable recording medium,
and data recovery method of the...
A technique of the present invention includes a storage section for storing contents data and an encryption flag indicating that any one of an encryption...
Use of freeform metadata for access control
Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or...
Encapsulated simulation components
Systems and methods are provided for providing protected three-dimensional components for simulation. A three-dimensional component may be accessed, wherein the...
Information processing apparatus, information processing system, and
non-transitory computer readable medium...
An information processing apparatus includes a file acquiring unit, a generating unit, a data processing unit, and an output unit. The file acquiring unit...
Secure printing between printer and print client device
Systems and methods of operating a computing system may involve securely printing a print document sent from a client device to a target printer. In one...
Using source taint analysis to reduce false positives in an advanced
persistent threat (APT) protection solution
In response to a local Advanced Persistent Threat (APT) agent identifying a potential data exfiltration attack, the binary identified in the attack is sent to a...
System, method and computer program product for messaging in an on-demand
In accordance with embodiments, there are provided mechanisms and methods for messaging in an on-demand database service. These mechanisms and methods for...
Method and a device for making a computer application secure
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method...
Supporting the use of a secret key
A first installation stores key identifications with allocation to a respective user and a second installation stores secret keys which each can be found by...
Processing extensible markup language security messages using delta
Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security...
Method and system for provision of cryptographic services
An encryption service system comprises an API for receiving requests from one or more calling applications. Each request comprises information identifying the...
Energy usage data management
A method including receiving energy usage data representative of energy usage of a customer during a particular time period. The energy usage data is sign with...
Secure execution and update of application module code
A dynamic root of trust can be injected in an application module on a client device using a backend server and can be continuously monitored to ensure...
System and method for a processing device with a priority interrupt
In accordance with an embodiment, a method of operating a processor includes operating in a first operating mode that prohibits access to a protected memory...
Identifying tamper-resistant characteristics for kernel data structures
Techniques for identifying tamper-resistant characteristics for kernel data structures are disclosed herein. A set of kernel data structures is received, the...
Method and system for performing a memory safety check of a program
written in an unmanaged programming language
A method for performing a memory safety check of a program coded in an unmanaged programming language includes receiving an intermediate representation (IR) of...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
Secure boot method, semiconductor device and recording medium
A secure boot method for a system, the system including a processor and a storage medium configured to store a program, a plurality of first partial hash values...
Computer system and method of securely booting a computer system
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data...
Verifying the integrity of a computing platform
Systems and techniques are described for verifying the integrity of a computing platform. Specifically, a software image can be generated that, when executed at...
System and method for below-operating system trapping and securing loading
of code into memory
A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a...
Secure privilege level execution and access protection
The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user...
Method and system of distinguishing between human and machine
A method and a system of distinguishing between a human and a machine are disclosed. The method includes: when a request for accessing a designated network...
Systems and methods for securing virtual machine computing environments
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
Centralized platform settings management for virtualized and multi OS
A processing device may include a first processor executing an operating system including a configurable setting and an isolated execution environment including...
Controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
Auto discovery of virtual machines
A method and apparatus is disclosed herein for performing auto discovery of virtual machines. In one embodiment, the method includes monitoring, using an...
Call stack integrity check on client/server systems
Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server...
Policy-driven approach to managing privileged/shared identity in an
Access to a privileged account is managed by first requiring authentication of a user logging into the account and then performing a policy evaluation to...
Security information caching on authentication token
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody...
Systems and methods for multi-factor remote user authentication
What is disclosed is a handheld multi-factor remote user authentication card device in the form factor of a prior art one factor of "what you have" security...
Systems and methods for validating login attempts based on user location
A computer-implemented method for validating login attempts based on user location may include (1) detecting a login attempt by a user to log into a user...
Access requests at IAM system implementing IAM data model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM data...
The subject technology discloses configurations for receiving a request from a user to log into a communications server in which the request includes user...
Behavioral authentication system using a behavior server for
authentication of multiple users based on their...
A method and a corresponding device for authenticating a user for access to protected information, the method comprising generating a behavioral user profile...
Utilizing multiple computing devices to verify identity
A tool for identify verification using computing device collaboration. The tool generates a hash based, at least in part, on device specific information for one...
Global authentication service using a global user identifier
An authentication device may provide an authentication code to a third party device. The third party device may provide a third party service to which a client...
System and method for verification of user identification based on
multimedia content elements
A method and system for verifying an identity of a user accessing a user device are provided. The method includes receiving a request to verify the user...
Solid state memory unit and method for protecting a memory including
verification of a sequence of requests for...
A solid state memory unit and method for protecting a solid state memory having a microprocessor are disclosed. The method may include receiving user-input...
Method and apparatus to manage user account of device
A method and apparatus to manage a user account. The method includes: setting a plurality of authorization accounts defining usage right regarding functions of...
Methods and systems for setting access to a list of class entities
In an embodiment, a feature is an aspect of a class which represents information, data, behaviors, or capabilities encapsulated by the class. An accessing class...
Deduplication of end user license agreements
In a computer-implemented method for deduplicating a plurality of instances of end user licensing agreements (EULAs), an end user licensing agreement (EULA)...
Providing content items from alternate sources
Systems and methods for providing content items to users. A computer system may provide to a first user an indication of a plurality of available content items....