At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,792,637 |
Downloading of data to secure devices An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some... |
US-8,792,626 |
Transmission of utility data Certain embodiments are directed at methods and systems for transmitting utility usage data using a public switched telephone network ("PSTN"). The methods and... |
US-8,792,115 |
System and control method for securing information between image
processing device and image forming device A system includes an image processing device configured to output image data to an image forming device and the image forming device is configured to form an... |
US-8,792,114 |
System, method and recordable medium for previewing a document over the
network The invention generally relates to sending data (e.g. print data or a document), in a network environment, to a port monitor, and to upload the data to an... |
US-8,791,984 |
Digital security camera The systems and methods described herein provide imaging systems for imaging a scene. The imaging system includes an optical head, a processor, and an analog... |
US-8,791,791 |
Sea-based security arch for identifying shipping contraband The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed... |
US-8,791,665 |
Energy storage device security Exemplary embodiments are directed to energy storage device security. An energy storage device may include at least one energy storage cell and a controller.... |
US-8,789,201 |
Secure personal content server A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in... |
US-8,789,195 |
Method and system for access control and data protection in digital
memories, related digital memory and... A digital memory such as a memory card for mobile communication equipment, is adapted to be accessed by a plurality of users and have protected data stored... |
US-8,789,181 |
Flow data for security data loss prevention There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data... |
US-8,789,166 |
Verification method and system thereof The invention discloses an authenticating method and a system thereof, which relates to information security field and solves the problem that the user... |
US-8,789,161 |
Device and method for authenticating a transaction with a data processing
apparatus A device or "dongle" (30) is provided for controlling communications between a Subscriber Identity Module (for SIM) (12), such as of the type used in a GSM... |
US-8,789,160 |
Function-based authorization to access electronic devices Systems and methods to secure authorized access are disclosed. A method includes receiving, an electronic device, a request to generate function-authorization... |
US-8,789,149 |
Method and apparatus for communicating between a user device and a user
device locating module to allow a... A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with the user device... |
US-8,789,148 |
Systems and methods for deployment of secure shell devices A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell... |
US-8,789,140 |
System and method for interfacing with heterogeneous network data
gathering tools A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server... |
US-8,789,136 |
Securing a device based on atypical user behavior A system and method for securing the mobile device applies the rules to determine if an event associated with an application is a secure event. If the event is... |
US-8,789,027 |
Software analysis framework Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying... |
US-8,788,971 |
Methods and arrangements for composing information-carrying artwork Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements... |
US-8,788,850 |
Systems and methods for using a security circuit to monitor a voltage of
an integrated circuit to counter... One embodiment, having a corresponding method, features an integrated circuit comprising: a power supply terminal configured to receive electrical power; a core... |
US-8,788,847 |
Secure data processing method and associated device A secure data processing method includes the following steps: padding (E206) a memory area (MAC') with a pad value (A); writing (E208) a first datum in the... |
US-8,788,845 |
Data access security An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a... |
US-8,788,840 |
Secure processor A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common... |
US-8,788,819 |
System and method for a cloud-based electronic communication vault Disclosed is a system and method for securely, conveniently and effectively storing information in a secure data repository or database, and securely delivering... |
US-8,788,814 |
Secure data transfer using an embedded system A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a... |
US-8,788,805 |
Application-level service access to encrypted data streams Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications... |
US-8,788,786 |
Storage system creating cache and logical volume areas in flash memory The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency... |
US-8,788,705 |
Methods and apparatus for secure routing of data packets Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical... |
US-8,788,532 |
Firewalls for securing customer data in a multi-tenant environment Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to... |
US-8,788,428 |
Multimode retail system Embodiments of a multimode system for use in, for example, a fuel dispenser, are configured for receiving data in a retail environment. The multimode system can... |
US-8,788,427 |
Limiting data exposure in authenticated multi-system transactions The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured... |
US-8,788,399 |
Systems and methods for trading a trade list in financial markets Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one... |
US-8,788,398 |
Method and apparatus for automated trading of equity securities using a
real time data analysis A system and method for buying and selling securities based on volatility and liquidity rather than other fundamentals is demonstrated. The method involves:... |
US-8,788,071 |
Security for objects in a process plant configuration system A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring,... |
US-8,787,973 |
Device and method for controlling usage of a memory card A memory card includes a memory for storing data and a controller that is operative to control access to storage of at least a portion of storage conditional... |
US-8,787,626 |
OMNIGENE software system A software system which employs a special set of simulated electrical circuits to generate user-specific textured and signature color images based on DNA,... |
US-8,787,583 |
Systems and methods for distributing and securing data A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A... |
US-8,787,581 |
Teired key communication system and method in support of controlled vendor
message processing A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a... |
US-8,787,571 |
Wired communications systems with improved capacity and security Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication... |
US-8,787,569 |
System and method for secure communication of components inside
self-service automats Method to secure the communication of components within self-service automats that are linked to each other by a bus system, having a transmitter and a... |
US-8,787,568 |
Data transformation apparatus, data transformation method, and computer
program A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using... |
US-8,786,521 |
Representation system The present invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a... |
US-8,784,310 |
Vascular pressure sensor with electrocardiogram electrodes Devices, systems, and methods for sensing cardiac electrical activity and blood pressure within a blood vessel are disclosed. A vascular sensor includes a... |
US-8,782,874 |
Railway tie automated preplating apparatus The invention is an apparatus for pre-plating railway ties, including switch ties of varying lengths. An infeed deck and singulator feeds individual ties, each... |
US-8,782,869 |
Unlocking tool for male connector A connector of a cable (e.g., a 30-pin connector) can be used to facilitate various security-related and other functionalities. For example, a connector can... |
US-8,782,796 |
Data exfiltration attack simulation technology Novel systems and methods for testing network security are disclosed. In one example, at least one specified data message and at least one specified access... |
US-8,782,790 |
Signature creation for malicious network traffic An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a... |
US-8,782,785 |
System, method and computer program product for rendering data of an
on-demand database service safe In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods... |
US-8,782,780 |
Hierarchical organization of data associated with events Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related... |
US-8,782,777 |
Use of synthetic context-based objects to secure data stores A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to... |