At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data application method and system of RFID tags
A data application method and system of radio-frequency identification (RFID) tags are provided. The method includes: when a first-type RFID tag is within a...
Disposable multivariable sensing devices having radio frequency based
A multivariable sensing device for sensing one or more parameters of a process fluid disposed in a container is provided. The multivariable sensing device...
Semiconductor device and chip identifier setting method
A semiconductor chip transmits a request signal which requests notification of the setting state of a chip identifier to another semiconductor chip connected to...
Method for enhancing stability of communication between a contactless card
and a card reader
The invention discloses a method for enhancing stability of communication between a contactless card and a card reader, relating to communication field. In the...
Network cable tracking system
Embodiments relate to a system and method of identifying a cable terminal plug and port on a computer system. An aspect includes a method having a step of...
Card reader and method of operating the same
A card reader performing a wireless communication with a card includes a first pulse generation unit generating a first detection pulse for detecting the card,...
Pluggable small form-factor UHF RFID reader
Systems and methods for reading Radio Frequency Identified (RFID) tags. In an embodiment, an enclosure having, within it, an antenna and processor is provided....
Active component embedded in cable
Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission....
Electronic device and method for unlocking the electronic device
In a method for unlocking an electronic device with a touch screen and a distance sensor, a triggering signal to unlock the electronic device is received....
Secure mobile proactive multiparty computation protocol
Described is system for secure mobile proactive multi-party computation. The system securely evaluates a circuit in the presence of an adversary. The circuit...
Information processing apparatus, information processing system, and
computer program product
According to an embodiment, an information processing apparatus includes a main processor, a secure operating system (OS) module, a non-secure OS module, a...
Delaying or deterring counterfeiting and/or cloning of a component
In an embodiment, to deter or delay counterfeiting/cloning of a replacement component of a host device, the replacement component is provided with a code value....
Secure processing unit systems and methods
A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of...
Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
Method and system for administering a secure data repository
A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an...
Method and apparatus for generating privacy profiles
A privacy processing system may use privacy rules to filter sensitive personal information from web session data. The privacy processing system may generate...
System and method enabling multiparty and multi level authorizations for
accessing confidential information
Disclosed is a method and system for enabling multi-party and multi level authorizations for accessing confidential information. A first set of access privilege...
System and method for the display of restricted information on private
The present invention is directed to a system and method for restricting data, or portions thereof, to specific display devices when accessed by a user....
Method and apparatus for providing data access via multi-user views
An approach is provided for providing data access via multi-user views. An access management platform determines at least one view of data, wherein the at least...
Managing global cache coherency in a distributed shared caching for
clustered file systems
Various embodiments are provided for managing a global cache coherency in a distributed shared caching for a clustered file system (CFS). The CFS manages access...
Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
Privacy-protective data transfer
A method receives authentication credentials for a user from a client device and receives a request from the user for content stored on a remote storage system....
System and method for controlling access to data using API for users with
Disclosed are systems and methods for controlling access to data on mobile devices using an accessibility API for users with disabilities. An exemplary method...
Scalable secure execution
In one embodiment a controller comprises logic configured to establish a pairing with a remote processor in a second electronic device, create a first secure...
Information processing apparatus and method of setting security thereof
An information processing apparatus includes an accepting unit that accepts from a user a command relating to security; a setting unit that makes a setting...
Methods and systems for concealing information
A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and...
Method and apparatus for secure display of visual content
Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system...
Presenting visualizations of business intelligence data
A system and method for managing business intelligence data is described. In some example embodiments, the system extracts data and metadata from a business...
System for booting and dumping a confidential image on a trusted computer
A computer system for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected...
Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
Automated verification of a software system
Software code of a software system (e.g., a software stack) may be verified as conforming to a specification. A high-level language implementation of the...
Method, system, and program product for remotely attesting to a state of a
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
System and method for detecting time-bomb malware
According to one embodiment, a system comprises one or more counters; comparison logic; and one or more hardware processors communicatively coupled to the one...
Method of defending a computer from malware
To defend a computer against malware, first executable code, of the computer, that includes a signature that identifies an address, in the computer's memory, of...
Atomic detection and repair of kernel memory
A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting...
System and method for protection of memory in a hypervisor
Disclosed are systems and methods for enabling secure execution of code in hypervisor mode. An exemplary method comprises: loading a hypervisor configured to...
Controlling malicious activity detection using behavioral models
Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based...
Circuit arrangement, a method for forming a circuit arrangement, and
method for integrity checking
A circuit arrangement is provided, the circuit arrangement including a processor; a memory circuit connected to the processor, wherein the processor is...
Data management of potentially malicious content
In a data management system, examination of first data for malicious content by a malicious content scanner is initiated in response to a request to write first...
Systems and methods for delivering event-filtered introspection
Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some...
Securing data on untrusted devices
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
Isolated program execution environment
Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer...
System and process for managing network communications
A communication protocol and system is disclosed for network communications between a data service residing on a client that provides network communications...
Method for validating dynamically loaded libraries using team identifiers
According to one embodiment, in response to a request received from an application by a launch module hosted by an operating system and executed by a processor...
Safely executing an untrusted native code module on a computing device
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of...
Integrated circuit for cyber security processing
In one aspect, an integrated circuit (IC) includes a secure router configured as a trust anchor, a non-volatile random access memory (RAM) direct memory access...
Method for detecting attacks and for protection
A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said...
Software verification for automatic train operation
An automatic train operation system includes a first control system configured to run a first software for controlling a first vehicle subsystem and a second...
Dynamic resource sharing
Representative implementations of devices and techniques provide dynamic secure sharing of resources. A resource module can be partitioned into a plurality of...
Method and apparatus for providing single sign-on for computation closures
An approach is provided for providing single sign-on for computation closures. A single sign-on management platform determines to create a single sign-on...