At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,525,564 |
Secure virtual network platform for enterprise hybrid cloud computing
environments A secure virtual network platform connects two or more different or separate network domains. When a data packet is received at an end point in one network... |
US-9,525,548 |
Provisioning techniques Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request... |
US-9,524,477 |
Utilizing a secondary application to render invitational content in a
separate window above an allocated space... Methods and arrangements are provided for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be... |
US-9,524,407 |
Systems and methods for end-to-end secure link between a near-field
communication (NFC) chip and server Systems and method of the present solution are directed to authenticating and updating a near-field-communication (NFC) chip over a network. According to one... |
US-9,524,401 |
Method for providing controlled access to a memory card and memory card There is provided a method for providing access to data securely stored in memory card. An exemplary method comprises specifying first time information... |
US-9,524,399 |
Multi-level independent security architecture A system includes a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security... |
US-9,524,379 |
Security chip used in a contents data playing device, update management
method, and update management program A security chip is used in a contents data playing device. The security chip includes a storage unit configured to store firmware data including a firmware... |
US-9,524,308 |
System and method for providing pluggable security in an enterprise crawl
and search framework environment A system and method are described, wherein the system includes an enterprise crawl and search framework, abstracts an underlying search engine, provides a... |
US-9,524,005 |
Data center server racks An example data center server rack may generally include a cabinet, a mounting fixture, and a trough. The mounting fixture may support one or more server units... |
US-9,522,688 |
On-board device, signaling system, and control method of moving vehicle An on-board device is loaded in a moving vehicle traveling on a track. The on-board device determines whether or not a traveling route has been secured, based... |
US-9,521,546 |
Secure RF communication method, terminal and system A method, terminal and secure RF communication system are provided. The method for radio frequency secure communication of the invention comprises: generating... |
US-9,521,187 |
Managed filed transfer utilizing dynamic horizontal and vertical scaling An apparatus, methods, and computer program products are described which transfer files/data from one system to other. Source and target system can be external... |
US-9,521,172 |
Method and system for sharing online content A system and a computer-implemented method for sharing online content are provided. The method is implemented using a computer device coupled to a user... |
US-9,521,166 |
Systems and methods for testing online systems and content Systems and methods are provided for automatically monitoring a compliance of web pages and graphical user interfaces with governmental and self-regulatory... |
US-9,521,159 |
Cloud based logging service Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service... |
US-9,521,145 |
Methods and apparatuses to provide secure communication between an
untrusted wireless access network and a... A secure communication channel between an access point (AP) device associated with a wireless network and a mobile gateway (GW) device of a packet core network... |
US-9,521,135 |
Method and system for a computer-based, secured communication between data
processing units In a method and a system for a computer-based and secured communication between data processing units a sender selects an alphanumeric and/or image data set,... |
US-9,521,132 |
Secure data storage A method and apparatus for storing data and performing logical comparisons and other operations on said data, the results of said comparisons and operations... |
US-9,521,122 |
Intelligent security analysis and enforcement for data transfer An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level... |
US-9,521,120 |
Method for securely transmitting control data from a secure network This method securely transmits data from a secure control system [110] located on an isolated computer network [100] to a separate computer [210] outside the... |
US-9,521,118 |
Secure network privacy system The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure... |
US-9,520,999 |
Systems and methods for identifying an individual The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an... |
US-9,520,039 |
Method for securing an electronic device having a signal output against
removal from a carrying device, and... A method for securing an electronic device comprising a signal output and an input apparatus against removal from a carrying device. The method includes... |
US-9,519,847 |
Traceable labeling apparatus for containers of biological products An apparatus for identifying a patient and marking containers of biological products or test tubes (13) associated with said patient before collecting said... |
US-9,519,821 |
Methods and systems for capturing biometric data A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an... |
US-9,519,818 |
Methods and systems for capturing biometric data A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an... |
US-9,519,803 |
Secure environment for graphics processing units In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the... |
US-9,519,797 |
Secure database searching Methods and systems for securely storing data in a database are described herein. According to an aspect, a technique may include receiving data to be stored,... |
US-9,519,793 |
Secure document repository Embodiments for secure data storage that include systems and methods that receive, from a second system maintained by a second entity, a data payload to be... |
US-9,519,787 |
Secure creation of encrypted virtual machines from encrypted templates Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further... |
US-9,519,782 |
Detecting malicious network content Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a... |
US-9,519,776 |
Computer security system and method The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a... |
US-9,519,772 |
Relevancy improvement through targeting of information based on data
gathered from a networked device... A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with... |
US-9,519,759 |
Secure access to programming data Embodiments for preventing data loss and allowing selective data access are provided. In some embodiments, the system and method are configured to receive task... |
US-9,519,616 |
Secure archive Storage apparatus (20) includes a memory (30) and an encryption processor (28), which is configured to receive and encrypt data transmitted from one or more... |
US-9,519,554 |
Storage system with rebuild operations In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O... |
US-9,519,550 |
Persistent client-to-replication system communications In one aspect, a method includes generating a secure connection with a replication system using credentials, receiving a user-initiated command to control the... |
US-9,519,433 |
Secure virtual sector erasure method and system Systems and methods for sanitizing physical storage in cloud computing and virtual environments. When logical storage is decommissioned in a virtual... |
US-9,516,755 |
Multi-channel memory module Embodiments of the invention describe a motherboard PCB having a memory bus to receive signal data from a channel of memory chips/devices of a memory module.... |
US-9,516,607 |
Method for determining transmission power There is a provided a method for deciding transmission power to securely transmit data, the method comprising: determining a transmission rate toward an... |
US-9,516,505 |
Security mechanism for mobile users A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base... |
US-9,516,466 |
Establishing presence by identifying audio sample and position Systems and methods to capture, in a first device, a sample of audio data streaming from a server, transmit the sample to the server, and receive, in the first... |
US-9,516,460 |
Systems and methods for security checkpoint condition information and
sharing Various embodiments discussed herein disclose a system comprising a user location engine, a checkpoint identification engine, a checkpoint identification... |
US-9,516,364 |
Secure transcoding of content A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a... |
US-9,516,362 |
Devices, systems and methods for reducing switching time in a video
distribution network When switching sources, resolutions or refresh rates in a video distribution network, switching times are reduced by maintaining video lock and security... |
US-9,516,281 |
Systems and methods for automated cloud-based analytics for security
surveillance systems with mobile input... Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two input capture devices and at least one user device... |
US-9,516,083 |
Method and apparatus for providing enhanced streaming content delivery
with multi-archive support using secure... A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically... |
US-9,516,062 |
System and method for determining and using local reputations of users and
hosts to protect information in a... A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in... |
US-9,516,053 |
Network security threat detection by user/user-entity behavioral analysis A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security... |
US-9,516,049 |
Packet capture and network traffic replay Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity... |