At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
Method and system for managing data in a communication network
A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving (502) metadata associated with a...
Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
Client-configurable security options for data streams
A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a...
Blacklisting and whitelisting of security-related events
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
Border property validation for named data networks
One embodiment provides a system for distributing packets within a trust domain. During operation, the system receives, by an ingress node in the trust domain,...
Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
Integrity protection and/or ciphering for UE registration with a wireless
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a...
Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries...
Method and apparatus for transmitting and receiving data based on secured
path bandwidth in network established...
A method and apparatus for transmitting and receiving data. The method and apparatus previously determines a validity of a data transmission path for...
Systems and methods for "machine-to-machine" (M2M) communications between
modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the...
Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Method and apparatus for remotely communicating vehicle information to the
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
Identifying participants for collaboration in a threat exchange community
Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat...
Secure communication architecture
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
Method and apparatus for data security reading
A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a...
Method and apparatus for privacy and trust enhancing sharing of data for
One embodiment of the present invention provides a system for privacy-preserving sharing of data for secure collaboration. During operation, the system obtains...
Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
Linear address mapping protection
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
Context-aware permission control of hybrid mobile applications
Controlling access to secure resources of a data processing system is provided. An input-to-output mapping of an application installed on the data processing...
Method and system for securing the entry of data to a device
A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device...
System and method of enhancing security of a wireless device through usage
A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data...
Security in enterprise level business information networking
Systems, apparatus, and methods for implementing enterprise level social and business information networking are provided. Users can receive relevant...
Systems and methods for secure remote storage
Systems and methods are provided for transmitting data to at least one storage system. A request is received to store a data set in a storage location. In...
Hybrid firewall for data center security
A system and method for managing a hybrid firewall solution, employing both hardware and software firewall components, for a cloud computing data center is...
Code tampering protection for insecure environments
In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow...
Print function system and method for secure cloud data storage
A system and method of transferring data between human readable documents using a virtual print driver is disclosed. A first user's computer has a standard text...
Managing hidden security features in user equipment
A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first...
Mobile messaging hub enabling enterprise office telephone numbers
A messaging hub provides communication services for user devices associated with an enterprise office telephone number. The messaging hub establishes a secure...
Social media and data sharing controls for data security purposes
Social media and data sharing controls may be provided. Upon receiving a request to transmit an element of data to a recipient, a determination may be made as...
Security for network delivered services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
Systems and methods for improved multisite management and reporting of
converged communication systems and...
The present invention discloses improved systems and methods for multisite management of computer server systems and in particular converged communication...
Security protocols for mobile operator networks
Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media...
Tool for the centralized supervision and/or hypervision of a set of
systems having different security levels
A tool for the supervision and/or hypervision of a set of systems of different security levels, the systems transmitting messages, includes a display system,...
Method and system for securing user identities and creating virtual users
to enhance privacy on a communication...
A method of enabling a real entity to access a service on a communication network using a virtual entity, the method including the steps of establishing a user...
System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device operated by a second user includes a database that is in...
Secure software authenticator data transfer between processing devices
A method comprises establishing a network connection between the first processing device and the second processing device for transfer of data associated with a...
Client/server security by an intermediary rendering modified in-memory
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
Load balancing among a cluster of firewall security devices
A method for balancing load among firewall security devices in a network is disclosed. Firewall security devices are arranged in multiple clusters. A switching...
Method and system for traffic isolation in a network
One embodiment of the present invention provides a system that facilitates traffic isolation (TI) in a network. During operation, the system configures a set of...
System and method for providing network support services and premises
gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
System and method for temporary secure boot of an electronic device
The invention discloses system and method of temporary secure boot process of an electronic device. The method comprises: generating a first token according to...
Encryption processing device, encryption processing method, and program
An encryption processing device including an encryption processing part configured to divide configuration bits of data to be data processed into plural lines,...
Optimizing security bits in a media access control (MAC) header
A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol...
Secured communication in network environments
A computing device can obtain a session key for encrypting data that is communicated between a client device and the computing device. The computing device can...
Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
FPGA configuration data scrambling using input multiplexers
Circuits, methods, and apparatus that provide for protection of configuration bitstreams from theft. One exemplary embodiment receives a scrambled configuration...
Battery management for a breathing assistance system
A method for providing battery security in a breathing assistance system configured to provide breathing assistance to a patient is provided. A battery security...