At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data import/export architecture between online properties
A secure architecture can provide a bridge between the utility and entertainment value of online properties. An architecture that employs an internal entity...
Apparatus and method for locating, tracking, controlling and recognizing
tagged objects using active RFID...
A real-time automated data security system protects both data and devices from loss, theft, and unauthorized access or activity. A miniature active RFID circuit...
Storing and transmitting sensitive data
A method for storing and transmitting data across a computer network to one or more destinations is disclosed including storing source data on a secure data...
Method and apparatus for providing abstracted user models
An approach is provided for providing abstracted user models in accordance with one or more access policies. A model platform determines an ontology for...
Anti-identity-theft method and hardware database device
A hardware device (TCK) for securing data in a database accessed through an Internet server is presented. The TCK controls access to its internal database...
Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
Data security system and with territorial, geographic and triggering event
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a...
Privacy screen-based security
A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication...
Secure search method and secure search device
In search that uses searchable code, the search query and the secure index is collated in round-robins fashion, registering the required secure index and a...
Systems, methods, and computer program products for securely managing data
on a secure element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
Virtual masked database
Systems, methods, and other embodiments associated with virtual masked databases are described. One example system includes a masking logic to mask an unmasked...
Infrastructure identification of available platforms for migration in
Technologies related to migration in place are generally described. In some examples, software and/or data associated with a platform customer can be "migrated"...
Multi-layer content protecting microcontroller
The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a...
Method and apparatus for an improved access system
A method and apparatus to enable a user to send an action message including secure credential is described. The system comprises a receiving logic to receive...
System and method for managing flash memory
A system and method for flash memory management is provided. In particular, the system and methods herein provide for management of flash memory, particularly...
Method for generating universal objects identifiers in distributed
multi-purpose storage systems
A computer implemented method and system for generating secure universal object identifiers on a multipurpose storage system is disclosed. According to one...
Approach for printing policy-enabled electronic documents using locked
printing and a shared memory data structure
According to approach for printing policy-enabled electronic documents, when a locked print module determines that an electronic document contained in the PDF...
Multi-channel rotary encoder
Method for operating a multi-channel rotary encoder comprising at least one printed circuit board on which one or a plurality of functional units (1, 1a, 1b,...
Secure smartphone-operated gun trigger lock
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
System and method for NFC peer-to-peer authentication and secure data
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
Wireless programmable microphone apparatus and system for integrated
surveillance system devices
A wireless programmable microphone apparatus and related devices are disclosed. The programmable wireless microphone apparatus may be used by a law enforcement...
Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
System and method for utilizing a secured service provider memory
A system and method for utilizing a secured service provider memory are disclosed. An electronic device is associated with a subscriber and is in communication...
Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
Device for archiving handwritten information
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
Image processing apparatus that configures settings of information
security policy, method of controlling the...
An image processing apparatus which enables a user to change the user mode while maintaining the state compliant with the information security policy. A network...
Defending against browser attacks
In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data...
Method and system for prevention of malware infections
A system and method for prevention of malware infections, the system comprising: a secured server configured to authenticate a user and issue an identifier (ID)...
Systems and methods for classifying malicious network events
A system for classifying events on a computer network includes an event clustering engine for receiving event and log data related to identifiable actors from a...
Dual bypass module and methods thereof
A dual bypass module for managing an integrated secured network environment is provided. The module includes network ports that receive and transmit data...
File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
Ensuring network connection security between a wrapped app and a remote
A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
Systems and methods for secure file transfers
Embodiments of the disclosure can include systems and methods for secure file transfers. The onsite monitoring system secure file transfer solution can allow...
Securing software defined networks via flow deflection
A flow deflection capability is provided for deflecting data flows within a Software Defined Network (SDN) in order to provide security for the SDN. A flow...
IEEE 802.11U failover for a mesh network
The present invention provides IEEE 802.11u failover for a mesh network that contains a root node coupled to a network operations center through a backhaul...
Video cryptography system and method
A system and method implementing stenographic cryptography in a video data stream (VDS) is disclosed that embeds secret video data (SVD) in a graphical user...
Managed secure computations on encrypted data
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
Systems and methods for secure handling of data
The methods and systems described herein provide for secure implementation of external storage providers in an enterprise setting. Specifically, the present...
Apparatus, system and method of establishing communication between an
application operating on an electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
Wedge shaped corner transmitter
A corner mounted device is provided. The corner mounted device includes a housing and a data transmitter within the housing. The housing may include a first...
Computing device connectors
Computing device connectors are described. In one or more implementations, a connector includes one or more communication contacts configured to support...
Real-time 3-D video-security
An image analysis technology that enables real-time fully 3-dimensionally integrated reconstruction of the live video-data derived from CCTV system's multiple...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Ruggedized, compact and integrated one-way controlled interface to enforce
confidentiality of a secure enclave
A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor,...
Data security management systems and methods
Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input...
Method and apparatus for securing programming data of a programmable
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...