At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for providing NFC secure application support in
battery-off mode when no nonvolatile memory...
Embodiments of the present invention provide systems and methods for NFC secure application support when an NFC device is executing in a battery-off or...
Method and system for location-based prearranged hand-off
Methods and systems for location-based prearranged hand-off are disclosed and may include pre-arranging hand-off of communication services with a mobile...
Method and apparatus for security communication of carrier aggregation
between base stations
This invention discloses a method for security communication of carrier aggregation between base stations, which method comprises receiving, by a user...
Determining usage predictions and detecting anomalous user activity
through traffic patterns
A system for selecting and monitoring data plans for telecommunications systems, and methods of determining, learning and estimating usage patterns in-order to...
Method and system for automatically managing secrets in multiple data
security jurisdiction zones
Data security jurisdiction zones are identified and data security policy data for the data security jurisdiction zones is obtained. The data security policy...
Context aware microsegmentation
Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a...
Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
Conjuring and providing profiles that manage execution of mobile
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
Generic proactively-secure secret-sharing protocol from any suitable
honest-majority secret-sharing protocol
Described is system for transforming a SHARE protocol into a proactively secure secret sharing (PSS) protocol. A PREFRESH protocol is performed that includes...
Authentication of warning messages in a network
There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification...
Information security attachment device for voice communication and
information security method for voice...
An information security attachment device for voice communication and an information security method for voice communication using the same are provided. The...
Service association model
Enabling associations between cloud services in a computer network cloud infrastructure system is described. Cloud services can include infrastructure as a...
Firewall security for computers with internet access and method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
Method and apparatus for providing secure streaming data transmission
facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one...
Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
Transmitter, receiver, quantum key distribution (QKD) system and quantum
key distribution method
According to an embodiment, a transmitter transmits first transmission key data and second transmission key data as quantum information. The transmitter...
Encryption scheme in a shared data store
An improved key encryption system is provided for encrypting sensitive data on a shared data store. Various embodiments contemplate a system where a plurality...
System for transferring electrical energy
A system for transferring electrical power, data or both, by way of magnetic induction between a first article and a second article. A first electrically...
Alarm device for securing a portable electronic device by detecting
removal of an attached electrical interface
An alarm device applied to a portable electronic device is provided. The alarm device includes a detection unit and a connecting unit. The detection unit...
False alarm avoidance in security systems
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which...
Methods and circuits for securing proprietary memory transactions
Described are systems and method for protecting data and instructions shared over a memory bus and stored in memory. Independent and separately timed stream...
Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
Methods, apparatuses, and computer-readable storage media for securely
accessing social networking data
An approach is provided for controlling access to social networking data for each of a plurality of members by issuing one or more first keys for at least one...
Dictionary generation for identifying coded credentials
Techniques are described for identifying security credentials or other sensitive information by creating a dictionary of data elements included in documents...
Systems, methods, and apparatus for securing user documents
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
Secure online gaming registration system with privacy controls
An online gaming registration system allows online gaming patrons to register once and use this registration to create online gaming accounts with gaming Web...
Methods for secure data distribution
A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and...
Methods and systems for optimizing text searches over structured data in a
Search systems and methods for searching structured data and enhancing the relevancy of search results provided to a requesting user or application. Enhanced...
Real-time security model providing intermediate query results to a user in
a federated data system
The subject technology provides configurations for receiving a query for data stored across data systems in which the query is associated with a user. It is...
Rebuilding an encoded data slice within a dispersed storage network
A method begins with a computing device of a dispersed storage network (DSN) determining that an encoded data slice of a set of encoded data slices requires...
Memory control method, memory control program, and semiconductor
integrated circuit device
A memory control method, which is configured to control data writing to a memory, includes securing a temporary write region in the memory; at the time of...
Over-the-air vehicle systems updating and associate security protocols
A method of updating a vehicle ECU includes establishing communication between a data communications module of a vehicle and an update server via a cellular...
Systems and methods for remote authorization of financial transactions
using public key infrastructure (PKI)
The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality...
Apparatus and methods for separated security implementations in wireless
Systems, methods, and devices for communicating MPDUs having a plurality of types are described herein. One aspect of the disclosure provides a method of...
Audiovisual distribution network
An audiovisual (AV) distribution network communicates via Internet Protocol and is implemented as a framework of local area networks (LANs). Transmitters and...
Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Cloud based virtual environment validation
Techniques for providing on-demand validation services for wager-based virtual machines deployed in a cloud based virtual environment. In some implementations,...
Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
Secure authorization of modules running on virtualized hardware
A method is described that includes securing authorization for a control module to conduct a test using a plurality of test modules running on a plurality of...
Smartphone based identification, access control, testing, and evaluation
A suite of testing and evaluation tools that run in conjunction with a smartphone that can be used to both enroll, and for subsequent enrollees, to gain secure...
Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
Optional compression of secure network traffic
A system includes a shore based security proxy to transmit and receive encrypted network traffic on behalf of users who opt in. The shore-based security proxy...
Migration of complex applications within a hybrid cloud environment
A system and methods for the migration of complex computer applications and the workloads comprising them between physical, virtual, and cloud servers that span...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
System and method for key material protection on devices using a secret
Encryption key(s) and/or other protected material are protected on devices. A secret splitting scheme is applied to a secret, S, that protects at least one data...
A package is provided for use with a track-and-trace data management system. The package comprises a base defining a plurality of compartments, each compartment...
Establishing secure communication for vehicle diagnostic data
A vehicle diagnostic communication system and a method of establishing a secure diagnostic session at a vehicle is disclosed. The method includes the steps of:...
System, device and method for securing a user device component by
authenticating the user of a biometric sensor...
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
Data integrity protection from rollback attacks for use with systems
employing message authentication code tags
One feature pertains to an efficient procedure for storing data units in a storage device that allows for authentication of data units to prevent rollback...