At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dual bypass module and methods thereof
A dual bypass module for managing an integrated secured network environment is provided. The module includes network ports that receive and transmit data...
File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
Ensuring network connection security between a wrapped app and a remote
A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
Systems and methods for secure file transfers
Embodiments of the disclosure can include systems and methods for secure file transfers. The onsite monitoring system secure file transfer solution can allow...
Securing software defined networks via flow deflection
A flow deflection capability is provided for deflecting data flows within a Software Defined Network (SDN) in order to provide security for the SDN. A flow...
IEEE 802.11U failover for a mesh network
The present invention provides IEEE 802.11u failover for a mesh network that contains a root node coupled to a network operations center through a backhaul...
Video cryptography system and method
A system and method implementing stenographic cryptography in a video data stream (VDS) is disclosed that embeds secret video data (SVD) in a graphical user...
Managed secure computations on encrypted data
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
Systems and methods for secure handling of data
The methods and systems described herein provide for secure implementation of external storage providers in an enterprise setting. Specifically, the present...
Apparatus, system and method of establishing communication between an
application operating on an electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
Wedge shaped corner transmitter
A corner mounted device is provided. The corner mounted device includes a housing and a data transmitter within the housing. The housing may include a first...
Computing device connectors
Computing device connectors are described. In one or more implementations, a connector includes one or more communication contacts configured to support...
Real-time 3-D video-security
An image analysis technology that enables real-time fully 3-dimensionally integrated reconstruction of the live video-data derived from CCTV system's multiple...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Ruggedized, compact and integrated one-way controlled interface to enforce
confidentiality of a secure enclave
A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor,...
Data security management systems and methods
Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input...
Method and apparatus for securing programming data of a programmable
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
Packet-processing scheduler, security context, authentication, packet
header, air cipher subsystem
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
Multi-ring encryption approach to securing a payload using hardware
Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key...
Synchronizing parallel applications in an asymmetric multi-processing
A method for synchronizing parallel applications in a partitioned asymmetric multi-processing system having multiple independent levels of security is provided....
Secure memory access controller
A memory access circuit and a corresponding method are provided. The memory access circuit includes a crypto block in communication with a memory that encrypts...
System and method for collaborative programming of data entry workflows
between system developers, end users,...
The present invention is a system for collaborative programming of data entry workflows between end users, Electronic Health Record (EHR) system developers, and...
Power management for a wearable apparatus
Apparatus, systems, and/or methods may provide power management. An attachment portion may secure an apparatus to a user. In one example, an apparatus includes...
Systems and methods for packaging high density SSDS
In various embodiments, a high-density solid-state storage unit includes a base section and a cassette section having plurality of flash cards. The cassette...
Secure smartphone-operated gun lock with means for overriding release of
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
Radio remote control system for controlling vehicle functions of a motor
A radio remote control for controlling at least one first vehicle function that is relevant for functional safety, and further vehicle functions not related to...
Method, apparatus, and system for data protection on interface in
A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are...
Multiple network, shared access security architecture supporting
simultaneous use of single SIM multi-radio...
A method and system is presented for a mobile wireless communication device that may communicate information to a first network device for enabling...
Behavioral authentication system using a secure element, a behaviometric
server and cryptographic servers to...
Embodiments of the disclosed technology are directed to methods and/or systems for using behavioral authentication for authenticating particular users of...
Security key generation for dual connectivity
Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a...
System and method for implementing data migration while preserving
security policies of a source filer
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for...
System and method for monitoring computing servers for possible
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
Data security system
A method, computer system, and computer program product for validating data contained in a request sent by a requestor to a server application. A computer...
Credential authentication methods and systems
Methods and systems are provided for performing and verifying transactions involving authentication with a secure credential, such as a smart card, in an...
Method and apparatus for providing adaptive self-synchronized dynamic
address translation as an intrusion...
A translator is provided for translating predetermined portions of packet header information including an address of a data packet according to a cipher...
Secure data exchange technique
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the...
Network communication method, network communication system, network
communication apparatus and program using...
A method for network communication under SNMP includes: producing an access request when a first device accesses management information stored in a second...
Module for "machine-to-machine" communications using public key
Methods and systems are provided for efficient and secure "Machine-to-Machine" (M2M) between modules and servers. The module and server can utilize public key...
Secure computing system, secure computing method, secure computing
apparatus, and program therefor
A third secure computing apparatus generates data Wb associated with each bit b of a segment t that satisfies a relation m.sub.A=s*t for a first input value...
DRAM security erase
A memory includes a DRAM array having memory cells, wordlines and bitlines coupled to the memory cells, and sense amplifiers. The memory can be configured to...
Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
Guiding a user to safety from the premises of an industrial plant
A method, safety route guiding device and a computer program product enables users in the premises of an industrial plant to reach safety in case of an...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Image forming apparatus equipped with secure print function, method of
controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...