At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
Data processing apparatus and method for managing access to a display
A data processing apparatus and method are provided for managing access to a display buffer. The data processing apparatus has a display buffer for storing an...
Access point, terminal, encryption key configuration system, encryption
key configuration method, and program
Configuration tasks needed to form a wireless LAN are performed using a simple method while increasing security during configuration. In a wireless network...
Method for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
Enforcing security based on a security state assessment of a mobile device
Security data generated by an application running on a mobile communications device is stored in a database. The security data is processed to assess a current...
Proxy registration and authentication for personal electronic devices
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include...
Method and appartus for network security using a router based
A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the...
System and method to provide added security to a platform using
In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure...
Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
Firewall for removable mass storage devices
A firewall device comprising a first connection device for connecting with a data device supporting transfer data with a removable mass storage device; second...
Systems and techniques for datapath security in a system-on-a-chip device
Various embodiments for providing datapath security in a system-on-a-chip (SOC) device are described. In one embodiment, an apparatus may comprise a security...
Secure session identifiers
An apparatus and a method for an authentication protocol. In one embodiment, a server generates a sequence number, and a server message authentication code...
Tamper proof location services
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location...
Method and apparatus for machine-to-machine communication
According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system...
Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
Trusted modular firmware update using digital certificate
An over-the-air firmware update is accomplished in a secure manner using a two-step process. The first step uses an initial boot using a fixed boot program and...
Techniques for providing multiple levels of security for a backup medium
Techniques for providing multiple levels of security for backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a...
Secure communication port redirector
A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data...
Location control service
In embodiments of a location control service, location data that identifies the location of a device is stored in a memory module, such as secured non-volatile...
Method and system of progress monitoring
It is possible to enable the secure, efficient, and synchronized transmittal of data between users, eliminate the need for a body-worn transmitting device, and...
Generating reports in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for...
System and method for an anonymous exchange of private data
Facilitating the purchase and sale of private data between anonymous entities based on the use of encryption and a centralized on-line entity to exchange the...
Method and apparatus for dynamic, real-time ad insertion based on
meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process...
System and method of reviewing and producing documents
A system and method of providing comprehensive document review, production and reporting is described. The system and method provide a total quality management...
Combination multimedia, brain wave and subliminal affirmation media player
System, method, and application to integrate a web browser and/or search engine with multiple media players-recorders into an Internet web virtual application,...
Wireless bidirectional communications between a mobile device and
associated secure element
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile...
Method and apparatus for secure cryptographic key generation,
certification and use
A confidential datum, such as a private key used in public key signature systems, is secured in a digital wallet using a "generation camouflaging" technique....
Securing information exchanged via a network
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in...
Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
Asset management for information technology resources
A method to identify information technology resources whereby a locator device is inserted into a communication port of each information technology resource,...
Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
Voltage regulator for merchandise display security device
A voltage regulator for a merchandise display security device provides an appropriate operating voltage through a power cable electrically connected between an...
Approaches for ensuring data security
Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent...
Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
Printhead assembly with multiple printhead modules and printed circuit
boards in single casing
A printhead assembly that has a casing with a series of module mounting sites, printed circuit board mounting sites and busbar support formations. A printhead...
Mounting apparatus for data storage device
A mounting apparatus for a data storage device comprises a bracket and a locking member attached to the bracket. A plurality of fixing holes is defined in one...
Consumer-controlled data access to shared RFID data
An electronic product code information service (EPCIS) interface is provided, where the EPCIS interface allows accessing applications residing on a variety of...
Automated testing for security vulnerabilities of devices
A method includes selecting an attack signature from an attack signature database; generating a fingerprint that includes parameters indicative of the attack...
Cloud computing as a security layer
A system includes a computing cloud comprising at least one data storage unit and at least one processing unit. The computing cloud is configured to connect to...
Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
Systems and methods for management of nodes across disparate networks
The present invention is directed generally to systems and methods for management of nodes, such as multimedia communication endpoints and/or intermediary...
Method and system for securely streaming content
A system and method for securely streaming media. The system includes a gateway server that receives requests for access to a secured data resource from an end...
Providing secure access to a set of credentials within a data security
mechanism of a data storage system
A technique provides secure access to a set of credentials within a data storage system. The technique involves obtaining a unique identifier (e.g., a hostname...
Securing distributed application information delivery
In an example implementation, a data structure comports with a secure application instruction protocol. The data structure includes a first application-level...
Method and apparatus for implementing secure and selectively deniable file
The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device...
Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
Securing external memory data
The present disclosure includes apparatus, systems, digital logic circuitry and techniques relating to data encoding. A method performed by a system on a chip...
Methods and systems for protect agents using distributed lightweight
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
Fast-reconnection of negotiable authentication network clients
Modern network communications often require a client application requesting data to authenticate itself to an application providing the data. Such...