At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and systems for secure in-network insertion of web content and web
A method of web content and web services insertion is provided. The method includes receiving response data sent in response to request data, wherein the...
System, method and computer program product for displaying one or more
data sets to a user
In accordance with embodiments, there are provided mechanisms and methods for displaying one or more data sets to a user. These mechanisms and methods for...
Mitigation of cyber attacks by pointer obfuscation
A method for protecting a computer includes identifying a first pointer in a data structure used by a computer program indicating a first memory address to be...
Secure memory system with fast wipe feature
A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data...
Service response detection and management on a mobile application
Techniques for detecting and addressing performance issues related to a mobile application are provided. Examples of performance issues include a backend...
Virtual machine usage data collection using securely loaded virtual
A computer-implemented method for collecting usage data includes running, by a computer processor, virtual firmware at least partially in a virtual hardware...
Isolating tenants executing in multi-tenant software containers
Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants...
Wireless firmware upgrades to an alarm security panel
A panel is described including stored data that is associated with the operation of the panel, and a server configured to provide a notification that an update...
Security for memory module data
A memory module contains a set of contacts configured to contact a second set of contacts on a memory module connector when the memory module is removed from...
Environmental control system including distributed control elements
An apparatus may include at least one sensor and a transmitter coupled to the at least one sensor and configured send data to a gateway through a wireless...
Techniques for securing live positioning signals
A pay television satellite broadcast includes validation data that can be used to validate authenticity of live global positioning system (GPS) data. The...
Systems and methods for creating and joining tournaments in a multi-tenant
database system environment
A system and method for creating and joining a tournament in multi-tenant database environment is provided. The system for creating a tournament, for example,...
Golf swing apparatus
A golf swing apparatus including a rotating drum that houses a swivel and an optical sensor to detecting a change in swivel angle; an elongated cord hanging...
Systems and methods for providing NFC secure application support in
battery-off mode when no nonvolatile memory...
Embodiments of the present invention provide systems and methods for NFC secure application support when an NFC device is executing in a battery-off or...
Method and system for location-based prearranged hand-off
Methods and systems for location-based prearranged hand-off are disclosed and may include pre-arranging hand-off of communication services with a mobile...
Method and apparatus for security communication of carrier aggregation
between base stations
This invention discloses a method for security communication of carrier aggregation between base stations, which method comprises receiving, by a user...
Determining usage predictions and detecting anomalous user activity
through traffic patterns
A system for selecting and monitoring data plans for telecommunications systems, and methods of determining, learning and estimating usage patterns in-order to...
Method and system for automatically managing secrets in multiple data
security jurisdiction zones
Data security jurisdiction zones are identified and data security policy data for the data security jurisdiction zones is obtained. The data security policy...
Context aware microsegmentation
Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Conjuring and providing profiles that manage execution of mobile
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
Generic proactively-secure secret-sharing protocol from any suitable
honest-majority secret-sharing protocol
Described is system for transforming a SHARE protocol into a proactively secure secret sharing (PSS) protocol. A PREFRESH protocol is performed that includes...
Authentication of warning messages in a network
There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification...
Information security attachment device for voice communication and
information security method for voice...
An information security attachment device for voice communication and an information security method for voice communication using the same are provided. The...
Service association model
Enabling associations between cloud services in a computer network cloud infrastructure system is described. Cloud services can include infrastructure as a...
Firewall security for computers with internet access and method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
Method and apparatus for providing secure streaming data transmission
facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one...
Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
Transmitter, receiver, quantum key distribution (QKD) system and quantum
key distribution method
According to an embodiment, a transmitter transmits first transmission key data and second transmission key data as quantum information. The transmitter...
Encryption scheme in a shared data store
An improved key encryption system is provided for encrypting sensitive data on a shared data store. Various embodiments contemplate a system where a plurality...
System for transferring electrical energy
A system for transferring electrical power, data or both, by way of magnetic induction between a first article and a second article. A first electrically...
Alarm device for securing a portable electronic device by detecting
removal of an attached electrical interface
An alarm device applied to a portable electronic device is provided. The alarm device includes a detection unit and a connecting unit. The detection unit...
False alarm avoidance in security systems
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which...
Methods and circuits for securing proprietary memory transactions
Described are systems and method for protecting data and instructions shared over a memory bus and stored in memory. Independent and separately timed stream...
Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
Methods, apparatuses, and computer-readable storage media for securely
accessing social networking data
An approach is provided for controlling access to social networking data for each of a plurality of members by issuing one or more first keys for at least one...
Dictionary generation for identifying coded credentials
Techniques are described for identifying security credentials or other sensitive information by creating a dictionary of data elements included in documents...
Systems, methods, and apparatus for securing user documents
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
Secure online gaming registration system with privacy controls
An online gaming registration system allows online gaming patrons to register once and use this registration to create online gaming accounts with gaming Web...
Methods for secure data distribution
A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and...
Methods and systems for optimizing text searches over structured data in a
Search systems and methods for searching structured data and enhancing the relevancy of search results provided to a requesting user or application. Enhanced...
Real-time security model providing intermediate query results to a user in
a federated data system
The subject technology provides configurations for receiving a query for data stored across data systems in which the query is associated with a user. It is...
Rebuilding an encoded data slice within a dispersed storage network
A method begins with a computing device of a dispersed storage network (DSN) determining that an encoded data slice of a set of encoded data slices requires...
Memory control method, memory control program, and semiconductor
integrated circuit device
A memory control method, which is configured to control data writing to a memory, includes securing a temporary write region in the memory; at the time of...
Over-the-air vehicle systems updating and associate security protocols
A method of updating a vehicle ECU includes establishing communication between a data communications module of a vehicle and an update server via a cellular...
Systems and methods for remote authorization of financial transactions
using public key infrastructure (PKI)
The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality...
Apparatus and methods for separated security implementations in wireless
Systems, methods, and devices for communicating MPDUs having a plurality of types are described herein. One aspect of the disclosure provides a method of...
Audiovisual distribution network
An audiovisual (AV) distribution network communicates via Internet Protocol and is implemented as a framework of local area networks (LANs). Transmitters and...
Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Cloud based virtual environment validation
Techniques for providing on-demand validation services for wager-based virtual machines deployed in a cloud based virtual environment. In some implementations,...