At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Image forming apparatus capable of sychronizing personal setting
Permission of an extension program is checked, the data of an extension program having authority is distinguished from the data of an extension program having...
Apparatus and method for efficiently and securely exchanging connection
In the described embodiments, a connection data exchange ("CDX") service serves as an exchange point for connection data for establishing peer-to-peer ("P2P")...
Systems and methods for self-tuning network intrusion detection and
Systems and method of the present disclosure are directed to a network security tool. In some embodiments, the tool identifies a current vulnerability of a...
Security management for cloud services
A cloud management node (102) in a public cloud (100) works together with a private management system (116) in a private cloud (114) to manage provisioning and...
Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
Secure spin torque transfer magnetic random access memory (STTMRAM)
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to...
Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
Security infrastructure for cloud services
A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during...
Controlling access based on recognition of a user
Approaches to enable a computing device, such as a phone or tablet computer, to compute a probability that the user currently using the device matches a profile...
A method of securely communicating a data chirp signal from a transmitter to a receiver, the chirp signal comprising at least one symbol, each symbol comprising...
Vibrating, pulse-monitored, alarm bracelet
A vibrating pulse monitored alarm bracelet consists of control panel/display/capacitive touchscreen, a flash memory to collect and communicate data, two...
Access control system and method
An access control system is provided for controlling access between a secured side and a non-secured side of an access control point. A reader module is...
System and method for remote management of sale transaction data
This invention discloses a novel system and method for providing retail point of sale terminals that are connected securely over the Internet to a back-office...
Method, system, and program for securely providing keys to encode and
decode data in a storage cartridge
Provided is a method, system, and program for enabling access to data in a storage medium within one of a plurality of storage cartridges capable of being...
Security device with programmable systolic-matrix cryptographic module and
programmable input/output interface
A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface...
Providing secure communication and/or sharing of personal data via a
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway...
Hardware trust anchors in SP-enabled processors
A trust system and method is disclosed for use in computing devices, particularly portable devices, in which a central Authority shares secrets and sensitive...
Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
System and method for initially establishing and periodically confirming
trust in a software application
Systems and methods for providing trust provisioning are disclosed. A utilization request requesting to utilize data stored by a secure element associated with...
Security methods and systems
A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in...
Library-based method for information flow integrity enforcement and robust
information flow policy development
Described is a system, method, and computer program product for preventing security flaws in untrusted computer source code by implementing information flow...
Security based on usage activity associated with user device
A method includes receiving usage data associated with a user device. The usage data includes information based on at least one usage activity associated with...
Data security system for natural language translation
A method, computer system, and computer program product for translating information. The computer system receives the information for a translation. The...
Secure erase of data in electronic device
A method of secure erase of an electronic device that applies a predetermined voltage to a device. The voltage is selected to be high enough to quickly destroy...
Management of a secure delete operation in a parity-based system
Embodiments of the disclosure can include a method, system, and computer program product for using a secure delete operation within one or more storage devices...
Secure smartphone-operated gun lock with means for overriding release of
A gun lock device, which may be configured to be disposed on or adjacent a gun to alternatively prevent or enable firing, includes a data receiver, a data...
Vehicle security system and method
A security system and method for monitoring the inside a vehicle includes a cabin module positioned inside the vehicle having a camera to record video and a...
A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having...
Method of protecting a mobile-telephone-type telecommunication terminal
A method of protecting a telecommunication terminal having a chip-card-type personal component which is required for telecommunication network access. The...
Apparatus and method for secure provisioning of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that includes programming data for use...
Method and system for creating a mobile internet protocol version 4
A method for creating a unique and secure mobile internet protocol version 4 connection for a packet data network is provided. The method includes generating an...
Method and system for securely performing callbacks in a content
A system for securely communicating callback signals to a head end includes a callback server and a user device communicating a request to open a callback...
Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
Output system for secure image processing, image processing apparatus, and
output method thereof
An output system includes an identification information registration unit configured to register identification information of a terminal device; a transmission...
Proximity access and/or alarm apparatus
A method and system for securing portable electronic devices as well as access to data on the portable electronic device is described. The method consists of a...
System and method for data mining and security policy management
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data...
Gateway-based audit log and method for prevention of data leakage
A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection...
System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software...
Mixing secure and insecure data and operations at server database
Processing a query, includes, at a client, receiving a user-generated query having a plurality of recognizable terms, securing the user-generated query to...
Method and system for mapping between connectivity requests and a security
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an...
Path selection in a multi-service and multi-tenant secure cloud
A device and method are provided to provide multi-exit firewall capabilities for cloud server or cloud service deployments without prior knowledge of...
Method and apparatus for secure ad hoc group device-to-device
communication in information-centric network
Various disclosed embodiments include methods, devices and systems establishing secure discovery and secure communication in an ad hoc information-centric...
Homomorphic cryptography modeling in support of privacy policies
Data privacy is becoming increasingly important and, in some jurisdictions, required. Access to private data can be controlled by forcing all access to go...
Method and apparatus for data security and automatic repeat request
implementation in a wireless communication...
A method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed. Cipher entities are...
System and method for NFC peer-to-peer authentication and secure data
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
Protecting data from decryption from power signature analysis in secure
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
Rotatable power center for a work surface
A rotatable power center is configured for installation along a work surface or the like, and includes an outer housing and a pivotable inner housing having one...
A semiconductor device with a novel structure in which storage capacity needed for holding data can be secured even with miniaturized elements is provided. In...