At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for data center security enhancements leveraging managed
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
XML based generic UNIX discovery framework
Services that support recovery of a data center require collecting information concerning the service customer's physical and virtual infrastructure, and...
Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
Encrypted mass-storage device with self running application
An encrypted mass-storage drive device with self-running application is disclosed. The encrypted mass-storage drive device allows storage of vital documents and...
Asset security management system
Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received. The face print...
Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
Maintaining secure data isolated from non-secure access when switching
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
System for transparent authentication across installed applications
A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from...
Cloud control system and method for LAN-based controlled apparatus
A cloud control system for LAN-based controlled apparatus and method for the same is disclosed. The cloud control system includes a cloud server and a LAN...
Systems and methods for using unique device identifiers to enhance
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
Parallel processing of data for an untrusted application
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
Methods and apparatus for managing data within a secure element
Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise...
Dynamic transmission of personal data to only trusted entities
Secure storage of important/relevant information on a device and/or internet cloud is facilitated, and enables automatic transmission of that important/relevant...
Wireless telecommunications network, and a method of authenticating a
A method is provided of authenticating a message from a femtocell base station in a wireless telecommunications network comprising a security gateway and a...
Personal security alert and monitoring apparatus
A personal monitoring apparatus and methods of using the personal monitoring apparatus for contacting one or more third parties through wireless signals and/or...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Data loss prevention (DLP) methods by a cloud service including third
party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
Secure data communication
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
Method and system for configuring and securing a device or apparatus, a
device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
Scalable network apparatus for content based switching or validation
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
System and method for automated provisioning of a wireless device
A processor and a system for automated provisioning of one or more wireless devices are provided. The processor includes one or more processing subsystems...
Computer program and method for biometrically secured, transparent
encryption and decryption
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out...
Authenticated sensor interface device
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data...
Simplifying IKE process in a gateway to enable datapath scaling using a
two tier cache configuration
Computational complexity, specifically, cryptographic operations, is removed from the IKE(Internet Key Exchange) process in a VPN gateway appliance, thereby...
Achieving storage efficiency in presence of end-to-end encryption using
Embodiments of the invention relate to efficiently storing encrypted data in persistent storage or passing to another data processing component. A downstream...
Interchangeable intelligent accessories for mobile devices
Techniques for an interchangeable modular design for mobile device accessories by separating a mobile device accessory into two modules are disclosed herein....
Reusable bolt electronic seal module with GPS/cellular phone
communications and tracking system
An electronics circuit first portion is entirely within an electronics module housing, sensing and transmitting a tamper condition of a normally locked bolt....
Security devices and related features
Aspects of the present disclosure are directed to security-based apparatuses and methods. As may be implemented in accordance with one or more embodiments, an...
Security kiosk and system and method of controlling access using thereof
A security kiosk for controlling access to an area, includes a housing, a visitor identification reader, a data storage device, a controller, and a visitor...
Wireless establishment of identity via bi-directional RFID
A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID)....
Selective encryption of data stored on removeable media in an automated
data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
Securing visual information on images for document capture
Techniques to provide secure access to data are disclosed. An indication that an operator is assigned to index a data value extracted from a document image is...
Method for privileged mode based secure input mechanism
A system and method are disclosed for securely receiving data from an input device coupled to a computing system. The system includes an interface configured to...
System and method providing permission based access to automotive
A Link device has a processor connected to an internal Link bus, a non-transitory memory, a digital device ID, one or both of firmware or software executing...
System on chip with embedded security module
An embedded security module includes a security processor, volatile and non-volatile memory, and an interface. The security processor includes transistors...
Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
Systems and methods for secure boot ROM patch
A data processing system includes a boot read only memory (ROM) configured to store boot code; one time programmable (OTP) storage circuitry configured to store...
Method for increasing the security level of a user device that is
searching and browsing web pages on the internet
A character string which is set in advance is stored (S4), and display data are obtained (S5), and link information is extracted from the obtained display data...