At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Authority trusted secure system component
One embodiment is in the form of a Self-Service Terminal (SST), such as an automated teller machine (ATM). The SST includes a peripheral device, such as a cash...
Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
Secure communication paths in data networks with tethered devices
A communication network processes intermediate security data from intermediate access nodes on a communication path between a network access node and an...
Object level encryption system including encryption key management system
A symmetric PGP encrypted communications path is provided in which the recipient may be identified with only publicly available information. Data to be...
System and method of user authentication using digital signatures
The present disclosure pertains to data security, and more specifically, to a method and system of user authentication using an electronic digital signature of...
Device, system, and method for registering and authenticating handwritten
signatures and archiving handwritten...
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
Optical transceiver and data mapping method using thereof
Disclosed is an optical transceiver. The optical transceiver includes a decoder for decoding an 8B10B line-coded signal; a data mapper for separating the...
Systems and methods for a safety status indicator system
The present invention provides systems and methods for tracking a safety status of a number of individuals, and providing pro-active security and response based...
Secure online distributed data storage services
The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such...
Efficient and secure data storage utilizing a dispersed data storage
A method of securely storing data to a dispersed data storage system is disclosed. A data segment is arranged along the columns or rows of an appropriately...
Data exfiltration prevention from mobile platforms
Technology is disclosed for preventing an exfiltration of a data associated with an application executing on a mobile device. The technology can migrate the...
Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
System and method for remotely assigning and revoking access credentials
using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
Grid data management
Systems and methods are provided for managing data in a grid. In one example approach, a method comprises importing data from a data source to a range of cells...
Method for correcting memory error of application program
A method for correcting a memory error of an application program are provided, which includes: when an error occurs in a memory occupied by an application...
Trusted client-centric application architecture
Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
On-board applet migration
An electronic device (such as a cellular telephone) automatically installs and personalizes updates to an applet on a secure element in the electronic device....
File processing method and apparatus, and storage device
A file processing method and a storage device for storing a file in a redundant array of independent disks (RAID) are disclosed. In this method, the storage...
Seat belt buckle incorporating a display
A seat belt buckle for receiving a latch plate of a vehicle seat belt includes a housing having a slot for receiving the latch plate, a locking mechanism within...
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
Using a wireless beacon to provide access credentials to a secure network
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi...
Terminal based on conditional access technology
The terminal comprises a tuner, a security chip and a digital television terminal main chip. The tuner is used to receive cable television broadcast data...
Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
Systems, methods, and computer program products for interfacing multiple
service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
Polymorphic security policy action
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
Dynamic comparative analysis method and apparatus for detecting and
preventing code injection and other network...
A security appliance includes a vulnerable testbed that simulates at least one known vulnerability, and a secure testbed that simulates not having that...
Interacting with a remote server over a network to determine whether to
allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
Communication terminal and secure log-in method acquiring password from
server using user ID and sensor data
A communication terminal is provided with functions to redirect authentication data, make a substitute reply of a password to a biometric authentication part,...
Security key generation for simultaneous multiple cell connections for
A first security context is established between a given user computing device and a first network computing device to enable a secure data connection between...
Network security method and network security servo system
A network security method and a network security servo system are provided. The method includes: decrypting a plurality of encrypted data points from an...
Computer system and network interface with hardware based packet filtering
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
System and method for data center security enhancements leveraging managed
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
XML based generic UNIX discovery framework
Services that support recovery of a data center require collecting information concerning the service customer's physical and virtual infrastructure, and...
Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
Encrypted mass-storage device with self running application
An encrypted mass-storage drive device with self-running application is disclosed. The encrypted mass-storage drive device allows storage of vital documents and...
Asset security management system
Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received. The face print...
Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
Maintaining secure data isolated from non-secure access when switching
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
System for transparent authentication across installed applications
A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from...
Cloud control system and method for LAN-based controlled apparatus
A cloud control system for LAN-based controlled apparatus and method for the same is disclosed. The cloud control system includes a cloud server and a LAN...
Systems and methods for using unique device identifiers to enhance
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
Parallel processing of data for an untrusted application
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
Methods and apparatus for managing data within a secure element
Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise...
Dynamic transmission of personal data to only trusted entities
Secure storage of important/relevant information on a device and/or internet cloud is facilitated, and enables automatic transmission of that important/relevant...