At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
LCD driver IC
A liquid crystal display driver IC includes a plurality of communication interface circuits, a plurality of driving circuits which drive a plurality of source...
Method and apparatus for onsite distribution of medications and medical
Secure access distribution machines and methods for distributing a plurality of medical items to an authorized user. The distribution machine includes a housing...
Secure media container
Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power...
Device security using an encrypted keystore data structure
Apparatus and method for data security through the use of an encrypted keystore data structure. In accordance with some embodiments, first and second sets of...
A method and system for retrieving a current and previous timestamp value, retrieving a previous accumulator value reflecting a previous state of the...
Filtering means for tracking information flow in android operated devices
Security features of an ANDROID.RTM. operating system device using a data flow tracking filter are described. The data flow tracking filter uses a message...
Tokenization of structured data
Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more encoding...
Security mechanism for increased personal data protection
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include...
Method and apparatus for accessing secure data in a dispersed storage
A method begins with a first computing device receiving a first request from a user device to access secure data. The method continues with the first computing...
Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
System and method for matching data sets while maintaining privacy of each
A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third...
System for the distribution and deployment of applications, with
provisions for security and policy conformance
A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications...
Event triggered data lockbox capable of anonymous revelation
An event triggered data lockbox is capable of anonymous revelation. The personal information for a person is saved in a secure memory. A lockbox condition for...
Modular data center deployment method and system for waterborne data
A modular data center build method and system including pre fabricated data center modules comprised of a plurality of racks, a plurality of rack mounted...
Method and device for power saving mode control in mobile communication
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
Secure sharing of device voice and data services with fee based policies
Methods and systems may provide for conducting an authentication of an external card associated with a borrower of a device, and tracking a usage of the device...
Systems and methods for automated cloud-based analytics for security
surveillance systems with mobile input...
Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two input capture devices and at least one user device...
Data communication protocol
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when...
Method and system for fast access to advanced visualization of medical
scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
Enabling secure remote assistance using a terminal services gateway
A secure remote assistance session between computers that are behind firewalls and/or NAT devices is provided by an arrangement that uses a terminal services...
Microsegmented networks that implement vulnerability scanning
Systems for providing vulnerability scanning within distributed microservices are provided herein. In some embodiments, a system includes a plurality of...
Sensitive information leakage prevention system, sensitive information
leakage prevention method, and...
A client device (100) determines whether or not access is allowed, based on security levels that are set for an application program and data held in a server...
Shared security utility appliance for secure application and data
A security information technology element (ITE) is disclosed for secure application and data processing, the security ITE including a physical enclosure...
Security risk management
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
Method and apparatus for establishing tunnel data security channel
Sending an authentication request message to an authentication device, receiving an authentication response message sent by the authentication device, where the...
Secured embedded data encryption systems
Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share...
Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
Systems and methods for automatically applying firewall policies within
data center applications
The disclosed method may include (1) identifying a data center application whose functionality is provided by a set of systems, (2) organizing, automatically by...
Uniform policy for security and information protection
System and methods for the implementation and/or enforcement of an email policy for an organization's email system are presented. A Data Loss Prevention (DLP)...
Secure, multi-tenancy aware and bandwidth-efficient data center multicast
Methods and arrangements for providing multicast communication. There is defined a first multicast tenant group comprising a plurality of hosts distributed over...
Method for authentication and electronic device for performing the
An authentication method (100) for a secure data transmission is provided, the method comprising performing a first authentication protocol (101) by using a...
Chaotic-based synchronization for secure network communications
In an embodiment, an apparatus includes a first logic to receive from a first node a synchronization portion of a message and to generate a set of state...
Embedded secure element for authentication, storage and transaction within
a mobile terminal
Various embodiments of the present invention relate to incorporating an embedded secure element into a mobile device, and more particularly, to systems, devices...
Method of incorporating an element in a data carrier
A method of placing an element onto a data carrier, where there is a placement actuator arranged to be able to secure the element. A transport layer is advanced...
Enhanced system security
Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data...
Secure local web application data manager
Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the...
System and method for virtual image security in a cloud environment
Systems and methods enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to...
Secure erase in a memory device
The various implementations described herein include systems, methods and/or devices used to enable secure erase in a memory device. In one aspect, the method...
Systems and methods for detecting attempts to transmit sensitive
information via data-distribution channels
The disclosed computer-implemented method for detecting attempts to transmit sensitive information via data-distribution channels may include (1) identifying an...
Controlling access to resources in a network
A computerized device transmits an access request to a data communications device of a network in an attempt to access network resources within the network. The...
Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
Sharing a plug-in instance in a web client
Configurations for sharing an instance of an executing process for a plug-in based on a session and a cookie data store associated with the session are...
Techniques for managing deduplication of data
Techniques for detecting advanced security threats may be realized as a method for detecting a security threat including generating a resource at a client,...
Honeyport active network security
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
Multi-level, hardware-enforced domain separation using a separation kernel
on a multicore processor with a...
A separation kernel isolating memory domains within a shared system memory is executed on the cores of a multicore processor having hardware security...
Computer memory data security
A memory module determines that the memory module is connected to a memory module connector. The memory module receives the connector ID from the connector and...
Transient storage device configuration silo
A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the...
Mechanisms to save user/kernel copy for cross device communications
Central processing units (CPUs) in computing systems manage graphics processing units (GPUs), network processors, security co-processors, and other data heavy...
Secure redundant storage device and secure read/write method on such a
Redundant storage devices in particular suitable for so-called SSD electronic disks. A data storage system is proposed based on a plurality of redundant...