At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Extraction of code level security specification
A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is...
Method and apparatus of encrypting content delivery
A method for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data...
Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
Malware containment and security analysis on connection
Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time...
IP multimedia security
A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second...
Method and integrated circuit for protecting against differential power
In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a...
System and method for securing information by obscuring contents of a
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file...
Secure, two-stage storage system
A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a...
Authenticated nonvolatile memory signing operations
A wireless device includes a nonvolatile memory that handles the task of securely performing integrity checks that do not expose the authentication private key...
Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
System for securing virtual machine disks on a remote shared storage
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
System-on-a-chip (SoC) security using one-time programmable memories
A system-on-a-chip including a first one-time-programmable memory, a second memory, a test interface, an input circuit, and a processor. The input circuit is...
Memory cards including a standard security function
A memory card of one published standard, such as the Multi-Media Card (MMC) or Secure Digital Card (SD), is modified to include the function of a Subscriber...
Method, device, and communications system for managing querying mapping
The present invention discloses a method, a device, and a communications system for managing and querying mapping information. The method for managing mapping...
Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
Method for searching a database or data sharing system for the presence of
A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database...
Contextual gravitation of datasets and data services
Through proactive structured dataset management, suggestions are made for dataset enrichment, cleansing, and other enhancements. Users need not go looking for...
Method for generating a secure copy of media data
A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a...
Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
System, method, and program product for unit transfer fee processing
A method, system and program product, the method comprising: accessing Transfer Fee data to be paid to a third party that is not the borrower or the lender of a...
Communications devices comprising NFC communicators
A communications device has a NFC communicator (15) having a coupler (17) to couple with a coupler of a near field RF communicator in near field range to enable...
Data security in optical communications systems
A method of encrypting an optical communications signal involves determining an encryption function, filtering an electrical input signal using the encryption...
Image processing device and image processing method
An image processing device includes: a plurality of encoding units that encode image data; a shared memory that stores reference image data which is used for...
Method and apparatus for configuring nodes in a wireless network
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the...
Systems, methods and devices for trusted transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for...
Method and system for a gigabit ethernet IP telephone chip with integrated
A method for processing Ethernet data and may include receiving Ethernet data via at least one Ethernet physical interface transceiver (PHY) integrated within a...
System and method for enabling VPN-less session setup for connecting
mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
Method and system for secure data transmission
A method and system are disclosed that secure data transmission in a communications system employed to control safety-relevant processes, through the provision...
Rapid deployment mobile data center
A portable air cooled data center can include interior fans, a heat sink integrally serving as part of a wall or ceiling, and an outer heat pipe assembly in...
The invention relates to apparatus such as a broadcast data receiver which can selectively receive a data storage item therewith to allow the passage of data...
Wireless patient monitoring using streaming of medical data with
The invention relates to a system and method for wirelessly monitoring a patient (4), the system comprising a medical sensor (1) for collecting medical data and...
Method for manufacturing a precursor lens for a rim-shaped lens
A method for manufacturing an externally circular precursor lens that is processed into a rim-shaped lens includes inputting processing data to specify the...
Network for blood pressure data management and rechargeable smart card
Enabling the management of biometric data, including and not limited to blood pressure readings taken on automated kiosks, which is stored on personal Smart...
Method for measuring tension in an anchored rod at an accessible end
The present invention may be used for measuring the tension in an elongated rod like body that may be fastened at an anchor end to an anchor element and that...
Financial transaction machine
Method and system for securely communicating between a primary service
provider and a partner service provider
A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a...
Fraudulent manipulation detection method and computer for detecting
A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent...
System and method for security data collection and analysis
Disclosed herein is a system and method for efficiently gathering information about applications for mobile communication devices (e.g., smartphones, netbooks,...
Method and system of quantifying risk
The method of quantifying risk, implemented as a computerized program, quantifies the risk of releasing security sensitive words, data objects, characters or...
System and method for source IP anti-spoofing security
A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to...
Profiling backup activity
Mitigating a network security threat is disclosed. Information associated with a data protection event is received. The received information is evaluated for an...
Network security smart load balancing using a multiple processor device
A method for protecting data communications using a multiple processor device in which multiple processors are operatively connected by a transport mechanism...
System and method for binding a subscription-based computing system to an
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the...
Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
Location-aware security and access system
An invention is afforded for providing security for a protected network resource. The system includes a network access apparatus in communication with a...
Sharing management program, sharing management method, terminal apparatus
and sharing management system
A sharing management method for sharing a terminal with plural users includes: after completion of login to an operating system of the terminal or after booting...
Health integration platform API
An application program interface (API) is provided for requesting, storing, and otherwise accessing data within a health integration network. The API...
Application programming interface for managing time sharing option address
A method includes receiving a start request from a client at a launcher application programming interface (API), determining whether an existing time sharing...
Methods and system for global real-time transaction tracing
Methods and systems for out-of-application bytecode instrumentation and performance monitoring of applications, such as globally-distributed applications,...