At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
Technologies for secure input and display of virtual touch user interfaces
Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory regions...
Device and methods for management and access of distributed data sources
A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and...
Method for simulation aided security event management
A method for simulation aided security event management, the method comprises: generating attack simulation information that comprises multiple simulation data...
Analysis tool for data security
Technologies are described herein for an analysis tool for data security. An analysis tool can be configured to analyze data using a dynamic analysis and a...
Real-time code and data protection via CPU transactional memory support
A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking...
Mobile communications device providing heuristic security authentication
features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
Cognitive information security using a behavioral recognition system
Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the...
Automated controlling of host over network
The provisioning of a host computing system by a controller located over a wide area network. The host computing system has power-on code that automatically...
Secure virtual machine memory allocation management via memory usage trust
Embodiments are disclosed for recycling memory among virtual machine instances in the same memory usage trust group. Memory scrubbing can be ordinarily...
Apparatus and method for determining one or more characteristics of a
The disclosed apparatus may include a mounting structure. A first arm may be secured to the mounting structure and may extend from the mounting structure. A...
Method of manufacturing dye-sublimation printed elements
A method for manufacturing printed elements may include receiving an order including data representing indicia. The indicia may be printed by dye-sublimation on...
Method for addressing medical conditions through a wearable health monitor
with the aid of a digital computer
Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless...
Server and method for remotely controlling working of communications
terminal, and communications terminal
The present invention discloses a method for remotely controlling working of a communications terminal, and the method includes: receiving, in a push service...
Proximity-based system that secures linked IP enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
Secure wireless communication apparatus
Aspects of various embodiments are directed to the communication of wireless data. In a particular embodiment, an apparatus includes a master/wireless...
Method and apparatus for delivering keying information
A method of delivering an application key or keys to an application server for use in securing data exchanged between the application server and a user...
Secure data entry system
Data signals (e.g DTMF tones) transmitted on a telephone call between a customer terminal (1) and a call center platform (4) are diverted at the call center...
Profiling cyber threats detected in a target environment and automatically
generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
Distributed agent based model for security monitoring and response
An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly...
Apparatus for secure hearing device communication and related method
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
Single-pass data compression and encryption
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically,...
Secure device and proxy for secure operation of a host data processing
Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the...
Apparatus, systems, platforms, and methods for securing communication data
exchanges between multiple networks...
Apparatus, systems, network platforms, and methods of providing secure communication between multiple networks, and program product for managing heat exchanger...
Scheduler and context cache controller and storage for security context
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
Multi-core processor for performing energy-related operations in an
industrial automation system using energy...
A system may include a multi-core processor that may include a first core configured to determine structured energy data associated with one or more assets in...
Validating an electronic order transmitted over a network between a client
server and an exchange server with a...
Methods and systems for performing risk checks on electronic orders for securities. According to one embodiment, the method comprises performing risk checks on...
Security domain prediction
A data processing apparatus supports operation in both a secure domain and a less secure domain. The secure domain has access to data that is not accessible...
Validating sensitive data from an application processor to modem processor
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
Systems and methods for determining potential impacts of applications on
the security of computing systems
A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application...
Calculating and benchmarking an entity's cybersecurity risk score
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
Generating a distrubition package having an access control execution
program for implementing an access control...
A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client...
Systems, methods and devices for anonymously collecting personal data
using a mobile device
One embodiment of the invention relates to methods and systems for using secure biometric parameters to remotely access electronic databases while rendering the...
Secure handle for intra- and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
Method and apparatus for secure image data processing
An image processing apparatus includes an image data acquiring unit that acquires image data, and a transmitting unit that, if a first destination specified as...
Solid-state drive data security enhancement
Embodiments of the present disclosure provide a method and apparatus for storage control. The method comprises: in response to having received a data deletion...
Secure KVM system having multiple emulated EDID functions
The present invention discloses a KVM (Keyboard Video Mouse) device for operation in high security environments. More specifically, this invention discloses a...
Adjustable ergonomic keyboard
An adjustable ergonomic keyboard includes keyboard segments coupled by a joint allowing the keyboard segments to pivot relative to one another. A retainer...
Methods and apparatus for using black box data to analyze vehicular
Disclosed are methods and apparatus for using black box data to analyze vehicular accidents. The methods include obtaining information from an event data...
System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
Method and system for implementing smart card remote operation based on
smart card web server
A method and system for implementing a smart card remote operation based on a smart card web server is provided. As a mobile phone is prompted to activate...
Method and system for providing communication services to a roaming
Method and system for optimizing the roaming mechanism through handling by the visited network the data that are sent by the wireless devices without routing...
Security protocols for unified near field communication infrastructures
One feature pertains to a near field communication (NFC) target device comprising a memory circuit adapted to store sensitive data, an NFC interface adapted to...
Disk mirroring for personal storage
Embodiments of the present invention provide a system for backing up personal data between two mated (i.e., paired) network attached storage (NAS) devices. The...
Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
System and method for configuring a computer system according to security
Method and system for configuration of a computer system according to security policies. The configuration of an employee's personal computer system according...
Dynamically generating perimeters
Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile...
System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...