At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for fully encrypted remote web-based voting
The presented invention discloses an electronic web-based election system and method for fully encrypted secure remote voting, wherein the voting data is fully...
Secured storage container
A secured storage container for transporting storage devices from a data center to a destruction center for degaussing or other destruction techniques. The...
Human security and survival system
The invention relates to a method and system of filling and maintaining a database containing geo-localized user data comprising the following steps:...
Management of drone operations and security in a pervasive computing
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
Dynamic switching of security configurations
Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first...
Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
Matrix code for encryption, storage, and transmission of data
A computing device utilizes matrix codes to securely communicate information with a variety of servers. The computing device receives public user data, and...
Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
Virtual key management and isolation of data deployments in multi-tenant
Tenants in a multi-tenant shared deployment are provided their own distinct key spaces over which they control a key management system. In this manner, virtual...
Method and system for detecting movement of a signed element in a
A sending entity creates a structured document and communicates it to a receiving entity includes a transform to ensure document elements are not moved during...
System for providing power and data transmission between a door and a
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
Trusted sensor data unaffected when an application processor operates in
an unlocked state
Arrangements described herein relate to controlling RF communications by a communication device. Raw sensor data from one or more sensors can be received by a...
Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
Method for recoverable message exchange independent of network protocols
A method is described to allow a device to retrieve a message, that is separated into a plurality of fragments, from a data source, wherein the method involves:...
Device association via video handshake
A method of pairing a first device with a second device is disclosed. Accordingly, an image that include encoded data is generated by the first device. The...
Authentication and authorization methods for cloud computing platform
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information...
Secure communications smartphone system
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a...
Network access control with compliance policy check
Embodiments of the present invention involve a method and system including a network access control server, an authentication application running on a...
System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
Positionparameterized recursive network architecture with topological
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
Computer system and virtual computer management method
A computer system, comprising: a virtual computer system and a verification system, the virtual computer system including: a deployment request reception part...
Communication system and transmission unit employed in same
Transmission and reception of data can be performed between first terminal communicating by transmission signal and second terminal communicating by...
Safe communication method with card
Disclosed is a safe communication method with a card, comprising: conducting mutual authentication between a card and an entity other than the card; and after...
Access-controlled data storage medium
The invention relates to a data carrier having a semiconductor chip. In order to prevent an attacker from determining secret data of the chip from intercepted...
Protection and security system including three-dimensional virtual reality
A system of electronic devices for the detection and location of changes in a predetermined space for the protection and security of places, persons, and goods,...
Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
Method for displaying information
The invention relates to a method for displaying information, using a mobile identification provider (10) and an independent display unit (20), wherein said...
Systems and methods for providing conditional access to transmitted
This disclosure relates to systems, methods, computer program products, and means that control access to position information at a receiver, or at another...
Secure app ecosystem with key and data exchange according to enterprise
information control policy
Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing...
Systems and methods for enforcement of security profiles in multi-tenant
Embodiments relate to systems and methods for the enforcement of security profiles in a multi-tenant database. A multi-tenant database can be populated with...
Efficient packet handling, redirection, and inspection using offload
A packet handling system is disclosed that can include at least one main processor, a plurality of offload processors connected to a memory bus and configured...
Rules based detection and correction of problems on mobile devices of
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
Method and system for providing password-free, hardware-rooted, ASIC-based
authentication of a human to a...
Biometric data are obtained from a biometric sensor on a mobile device, containing an ASIC, which is connected to or incorporated within it. The mobile device...
Real identity authentication
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored...
Information processing apparatus and program execution method
According to one embodiment, an information processing apparatus includes a processor, a main memory, and a memory controller. The memory controller executes an...
Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
End-to-end trusted communications infrastructure
A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being...
Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
Near-field communication authentication
Various aspects are directed to circuit apparatuses, portable electronic devices, and executable applets pertaining to storing and providing secure access to...
Molecular receptor-based chemical field-effect transistor (CHEMFET)
devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
Proctored performance analysis
Systems and methods described herein provide for administering and proctoring of a secure online exam that allows for complex testing utilizing practical...
Secure point of sale presentation of a barcode at an information handling
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
Printing device, printing control method and recording medium capable of
interruption printing with high security
A LAN control unit receives print data from a client device or the like. An input job storage unit registered on a hard disk a series of PDL commands included...
Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...