At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Peer-to-peer transfer between mobile devices with coupled secure elements
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
System and method for globally and securely accessing unified information
in a computer network
A smartphone that includes a communications interface to communicate via one or more Internet communications channels is provided. The smartphone also includes...
Systems and methods for contextualized data protection
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to...
Method and system for granting access to secure data
Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved...
Privacy-enhanced car data distribution
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges...
Associating a signing key with a software component of a computing
A method and system is provided for operatively associating a signing key with a software component of a computing platform. The computing platform includes a...
Methods for restricting resources used by an application based on a base
profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
Secure off-chip processing such as for biometric data
In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing...
Method and device for integrating a device into a network
A method and a server for integrating a device into a network, a first device identification of the device is detected being a reading device authorized for...
Method and device for improving the data transmission security in a serial
data transmission having flexible...
A method is provided for serial data transmission in a bus system having at least two bus subscribers, which exchange messages via the bus, the send access to...
Method for checking data consistency in a system on chip
The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving...
Secure patch updates of a virtual machine image in a virtualization data
Virtual Machine (VM) images in a virtualized environment are updated through the use of patches. A virtualization data processing system includes a hypervisor...
Systems and methods for intercepting, processing, and protecting user data
through web application pattern...
Systems and methods of intercepting user data of a web application are provided. After web application resources are obtained for execution on a client device,...
System and method for selecting means for intercepting network
Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to...
Security management in M2M area network
The disclosure is related to a machine to machine (M2M) device and a security management method thereof. The M2M device includes an identification circuit. The...
Near field communication application identification routing in card
A near field communications (NFC) device is disclosed that interacts with other NFC devices to exchange information and/or the data. The NFC device can include...
Systems and apparatuses for a secure mobile cloud framework for mobile
computing and communication
Systems and apparatuses for a secure mobile cloud framework (referred to as MobiCloud) for mobile computing and communication are disclosed. Embodiments of...
Systems and methods of securing operational information associated with an
The invention is directed to a tamper-evident method of encrypting data relating to one or more print cartridges installed in an imaging device that includes...
Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
Secure on-demand supply method and system and traffic type acquisition
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a...
Security and access system based on multi-dimensional location
An invention is provided for system security and access based on multi-dimensional location characteristics. The invention includes collecting contextual...
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
Apparatus and method for providing location based security for
communication with a remote device
A method for providing location based security for communication between a remote device and a mobile device having a global positioning system receiver for...
Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
Secure communication architecture including sniffer
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
Method for encrypting a plurality of data in a secure set
A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an...
Methods and apparatus for authenticating data as originating from a
storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
Secure optionally passive RFID tag or sensor with external power source
and data logging
A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and...
Hardware-enforced, always-on insertion of a watermark in a video
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
System and method for providing contactless payment with a near field
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
Using multiple display servers to protect data
A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in...
Apparatus and method for providing hardware security
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of...
A system includes a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources (e.g., data from...
Security configuration systems and methods for portal users in a
multi-tenant database environment
A computer-implemented system and method includes method includes receiving a data request for data in a database from a user; determining if the user is an...
Secure data management
The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory...
Method and system for securing access to configuration information stored
in universal plug and play data models
A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a...
Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
Method and system for rapidly scanning files
The present embodiments provide a method and system for rapidly scanning a file, wherein the method includes obtaining a data packet, the data packet comprising...
System and method for dynamic adjustment of expiration date for
authorization key for antivirus products
A system for a dynamic adjustment of expiration date of an authorization key, the system comprising: a security product that will be installed on a...
Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
Method for implementing secure data channel between processor and devices
Apparatuses, systems, and methods are directed to securely store, transfer, and/or process data especially sensitive data sent from input devices to processors....
Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
Securing virtual machine data
One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of...
Transportation, storage and stabilization device for electronic equipment
An equipment saddle is provided. The equipment saddle may include a plurality of cases attached to a drapable skirt. Each case forms a compartment for retaining...
SMS botnet detection on mobile devices
Technologies for mobile device security are disclosed. A described technique includes launching a monitoring application that has a priority receiver attribute...
Automatic sanitization of data on a mobile device in a network environment
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a...
Headset computer with handsfree emergency response
Operating conditions for a headset computer are used to detect a situation where an emergency response mode should be activated. In emergency response mode, the...