At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure virtual machine memory allocation management via memory usage trust
Embodiments are disclosed for recycling memory among virtual machine instances in the same memory usage trust group. Memory scrubbing can be ordinarily...
Apparatus and method for determining one or more characteristics of a
The disclosed apparatus may include a mounting structure. A first arm may be secured to the mounting structure and may extend from the mounting structure. A...
Method of manufacturing dye-sublimation printed elements
A method for manufacturing printed elements may include receiving an order including data representing indicia. The indicia may be printed by dye-sublimation on...
Method for addressing medical conditions through a wearable health monitor
with the aid of a digital computer
Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless...
Server and method for remotely controlling working of communications
terminal, and communications terminal
The present invention discloses a method for remotely controlling working of a communications terminal, and the method includes: receiving, in a push service...
Proximity-based system that secures linked IP enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
Secure wireless communication apparatus
Aspects of various embodiments are directed to the communication of wireless data. In a particular embodiment, an apparatus includes a master/wireless...
Method and apparatus for delivering keying information
A method of delivering an application key or keys to an application server for use in securing data exchanged between the application server and a user...
Secure data entry system
Data signals (e.g DTMF tones) transmitted on a telephone call between a customer terminal (1) and a call center platform (4) are diverted at the call center...
Profiling cyber threats detected in a target environment and automatically
generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
Distributed agent based model for security monitoring and response
An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly...
Apparatus for secure hearing device communication and related method
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
Single-pass data compression and encryption
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically,...
Secure device and proxy for secure operation of a host data processing
Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the...
Apparatus, systems, platforms, and methods for securing communication data
exchanges between multiple networks...
Apparatus, systems, network platforms, and methods of providing secure communication between multiple networks, and program product for managing heat exchanger...
Scheduler and context cache controller and storage for security context
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
Multi-core processor for performing energy-related operations in an
industrial automation system using energy...
A system may include a multi-core processor that may include a first core configured to determine structured energy data associated with one or more assets in...
Validating an electronic order transmitted over a network between a client
server and an exchange server with a...
Methods and systems for performing risk checks on electronic orders for securities. According to one embodiment, the method comprises performing risk checks on...
Security domain prediction
A data processing apparatus supports operation in both a secure domain and a less secure domain. The secure domain has access to data that is not accessible...
Validating sensitive data from an application processor to modem processor
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
Systems and methods for determining potential impacts of applications on
the security of computing systems
A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application...
Calculating and benchmarking an entity's cybersecurity risk score
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
Generating a distrubition package having an access control execution
program for implementing an access control...
A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client...
Systems, methods and devices for anonymously collecting personal data
using a mobile device
One embodiment of the invention relates to methods and systems for using secure biometric parameters to remotely access electronic databases while rendering the...
Secure handle for intra- and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
Method and apparatus for secure image data processing
An image processing apparatus includes an image data acquiring unit that acquires image data, and a transmitting unit that, if a first destination specified as...
Solid-state drive data security enhancement
Embodiments of the present disclosure provide a method and apparatus for storage control. The method comprises: in response to having received a data deletion...
Secure KVM system having multiple emulated EDID functions
The present invention discloses a KVM (Keyboard Video Mouse) device for operation in high security environments. More specifically, this invention discloses a...
Adjustable ergonomic keyboard
An adjustable ergonomic keyboard includes keyboard segments coupled by a joint allowing the keyboard segments to pivot relative to one another. A retainer...
Methods and apparatus for using black box data to analyze vehicular
Disclosed are methods and apparatus for using black box data to analyze vehicular accidents. The methods include obtaining information from an event data...
System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
Method and system for implementing smart card remote operation based on
smart card web server
A method and system for implementing a smart card remote operation based on a smart card web server is provided. As a mobile phone is prompted to activate...
Method and system for providing communication services to a roaming
Method and system for optimizing the roaming mechanism through handling by the visited network the data that are sent by the wireless devices without routing...
Security protocols for unified near field communication infrastructures
One feature pertains to a near field communication (NFC) target device comprising a memory circuit adapted to store sensitive data, an NFC interface adapted to...
Disk mirroring for personal storage
Embodiments of the present invention provide a system for backing up personal data between two mated (i.e., paired) network attached storage (NAS) devices. The...
Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
System and method for configuring a computer system according to security
Method and system for configuration of a computer system according to security policies. The configuration of an employee's personal computer system according...
Dynamically generating perimeters
Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile...
System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...
Method of encrypting and transferring data between a sender and a receiver
using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
Method and system for selective protection of data exchanged between user
equipment and network
A method and system for providing selective protection of data exchanged between user equipment (UE) and network is disclosed. The selective protection is...
Identifying malicious devices within a computer network
This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more...
Bi-directional data security for supervisor control and data acquisition
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
System and method for secure storage, transfer and retrieval of content
An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is...
System and method of masking electromagnetic interference (EMI) emissions
of a circuit
A system is provided for securing information residing on a circuit (e.g., processor). In particular, a system and method is provided for masking...
Secure contactless data communication
In one embodiment, a method includes receiving, at a first device, a first signal transmitted from a first antenna and receiving a second signal after receiving...
Aircraft power and data distribution system and methods of performing the
A electrical distribution unit comprising a housing, a securing unit connected to the housing and to a seat track in an aircraft, at least one outlet unit on...
A system and method for managing a value of a descending register of a postal security device (PSD) in accordance with a guarantee is disclosed. Mailing data...