At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Sovereign information sharing service
Embodiments herein provide a method, system, etc. for a sovereign information sharing service. More specifically, a method for secure distributed query...
System, method, and computer program product for initiating a security
action at an intermediate layer coupled...
A system, method, and computer program product are provided for initiating a security action at an intermediate layer coupled between a library and an...
Method and system for preserving security of sensor data and recording
medium using thereof
A method and a system for preserving sensor data based on a time key, and a recording medium thereof are provided. The time key based sensor data security...
Radio frequency identification (RFID) security apparatus having security
function and method thereof
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader...
Deploying group VPNS and security groups over an end-to-end enterprise
Group Virtual Private Networks (Group VPNS) are provided for different types of machines in a data processing network. Security groups are defined by a security...
Method and system for enforcing a security policy via a security virtual
A method and system for enforcing a security policy encoded in an instruction set of a security virtual machine is provided. A security system provides a...
Solution for locally staged electronic software distribution using secure
A method, information processing system, and computer program storage product, are provided for creating a Removable Installation Kit ("RIK") for locally staged...
Circuit apparatus with memory and power control responsive to
circuit-based deterioration characteristics
Power-backup capabilities are provided by implementing a variety of different methods, systems and devices. According to one such implementation, a memory...
Secure storage system and method of use
A secure storage system is disclosed. The secure storage system comprises a crypto engine and a storage device. The crypto engine comprises a random number...
Secure outsourced aggregation with one-way chains
Secure outsourced aggregation of data using one-way chains is discussed in this application. Each input data source such as a sensor generates a Verifiable...
Data processing apparatus and method
Generating a cryptographic key, for example using a received external key. A system to generate a cryptographic key may include a first data store which may...
Method and apparatus for binding multiple authentications
Techniques for binding multiple authentications for a peer are described. In one design, multiple authentications for the peer may be bound based on a unique...
Mobile system, service system, and service providing method to securely
transmit private information for use in...
A mobile system, a service system, and a service providing method for securely transmitting private information for use in a service are provided. The mobile...
System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
Method for supporting management and exchange of distributed data of user
or an entity
A method for supporting management and exchange of distributed data of a user or an entity, in particular user profile information data, is characterized in...
POS payment terminal and a method of direct debit payment transaction
using a mobile communication device, such...
A payment terminal using a mobile communication device (4), such as a mobile phone, is located on a removable memory card (1), e.g. type microSD card, which is...
Management system for the protection of mortgage equity
A computer system for managing mortgages of mortgage holders with a no foreclosure rule interconnected to funding institutions maintained as a club. The system...
Digital content distribution and subscription system
A digital content distribution and subscription system for digital data files provides subscribers with music or video from streaming digital data or...
Differential commission and electronic order matching process for the
distribution of primary market fixed...
An apparatus and process (collectively the "system") for conducting and managing the primary offering of fixed income securities, specifically, but not...
Escrowing digital property in a secure information vault
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow...
Systems and methods for client screening in the financial services
Systems, methods, and interfaces for screening clients for security compliance with a Customer Identification Program are disclosed. An illustrative system for...
Vehicle activity module
Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each...
Method, user network equipment and management system thereof for secure
A method for secure data transmission, and the method includes: after a Home (evolved) Node-B (H(e)NB) establishes a connection with a H(e)NB Management System...
Secure access to restricted resource
Devices, systems and methods are disclosed which relate to restricting access to a secure resource by requiring a multimodal input sequence as a passkey to...
Method and device for obtaining security key in relay system
A method and a device for obtaining a security key in a relay system are disclosed in the embodiment of the present invention. A node in the relay system...
Apparatus and method for protecting data in flash memory
An apparatus for securely protecting data in a flash memory upon power off is disclosed. In the apparatus, a power detector monitors a voltage output from a...
Trusted display based on display device emulation
An integrated circuit has a keypress entry interface and a pass-through data path. In a pass-through mode, the keypress entry interface is disabled and the...
Data storage medium provided with a security characteristic
A multilayer data carrier having a substrate on which there is formed a security element having a metal layer, the element showing an optical effect from a...
Secure information transmission over a network
Architecture for secure transmission of data from a sender to a receiver can include multiple network server nodes and a processor that contains computer...
Off-premise encryption of data storage
A system that enables a cloud-based data repository to function as a secure `drop-box` for data that corresponds to a user is provided. The `drop box` can be...
Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
Secure operating system/web server systems and methods
Systems and methods for securely operating web servers, operating systems, etc. Methods of embodiments include creating virtual roots for executive jails and...
White-list firewall based on the document object model
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to...
Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
System and method for a business data provisioning for a pre-emptive
Embodiments of the present invention may provide a system and method for business data provisioning for a pre-emptive security audit. In one aspect, a method...
Systems and methods for managing user permissions
Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for...
System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
Bus monitor for enhancing SOC system security and realization method
The present invention discloses a bus monitor for enhancing SOC system security and a realization method thereof. The bus monitor disposed between a system bus...
Method and system for provisioning portable desktops
A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data...
Accelerator system for use with secure data storage
Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and...
Computer architectures using shared storage
A method includes providing a persistent common view of data, services, and infrastructure functions accessible via one or more shared storage systems of a...
Method for operating a sensor apparatus and sensor apparatus
A sensor apparatus includes a housing with a security device, a secure first computation device, a second computation device and a sensor element. The sensor...
Method and system for improving storage security in a cloud computing
A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client...
System and method of accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the...
Securing data in a dispersed storage network using security sentinel value
A sentinel value is combined with a data segment, and encrypted. A digest of the encrypted combined data segment is calculated, and used in conjunction with an...
In-band security protocol decryptor and scanner
An in-band decryptor and scanner (IBDS) for monitoring data packets or frames of an encrypted communication session. The IBDS may reroute or process the data...
Secure publishing of data to DMZ using virtual hard drives
A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is...
TCP/IP processor and engine using RDMA
A TCP/IP processor and data processing engines for use in the TCP/IP processor is disclosed. The TCP/IP processor can transport data payloads of Internet...
Server apparatus, mail server apparatus and fax server apparatus
A memory section of a server apparatus stores a security information table storing a plurality of pieces of destination management information, a trust...
Crawling secure data sources
It is desirable to provide a secure search mechanism to provide for searching over any and all content, such as across an enterprise. A secure search, however,...