At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data security apparatus and system for mobile terminal
In an information sharing system, a data security apparatus includes a location acquisition device for acquiring GPS location information of a current location...
Method and system for secure processing a stream of encrypted digital
Method and system to prevent control words sharing. The system comprises a receiver capable of processing a digital data stream. The receiver, having a video...
Method for securely distributing meeting data from interactive whiteboard
Distributing meeting data from an interactive whiteboard projector to at least one computer of a meeting member, comprises: in the interactive whiteboard...
Apparatus, systems, and methods for managing data security
Disclosed embodiments of a data protection mechanism can provide secure data management. In particular, the disclosed embodiments provide secure data management...
Systems and methods for distributed trust computing and key management
Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device...
Investigative and dynamic detection of potential security-threat
indicators from events in big data
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
Link aggregation system, protection system, and cross polarization
interference cancellation applications for...
System and method for implementing a link aggregation system, a protection system, and an XPIC application for an all outdoor radios system using a wireless...
Expressing intent to control behavior of application components
Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era...
Validating a system with multiple subsystems using trusted platform
modules and virtual platform modules
Software validation is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The software validation utilizes one or...
Method for the cryptographic protection of an application
A method is provided for cryptographic protection of an application associated with an application owner and executed in an external data processing center...
Achieving storage efficiency in presence of end-to-end encryption using
Embodiments of the invention relate to efficiently storing encrypted data in persistent storage or passing to another data processing component. A downstream...
Non-volatile memory for NFC router
A plurality of circuits in a same package including a first integrated circuit having at least one NFC-type communication interface and at least one...
A system 100 for securely storing digital data includes a data storage 110 and a physical uncloneable function 120 (PUF), including an input (122) for receiving...
Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
Adaptive policies and protections for securing financial transaction data
A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network...
Methods and systems for generating and authenticating barcodes and in particular generating secure barcodes are disclosed. In one embodiment, a method,...
Secure cloud database platform with encrypted database queries
A cloud computing service to securely process queries on a database. A security device and method of operation are also disclosed. The security device may be...
Securing user data in cloud computing environments
Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of...
Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
System and method for comprehensive general electric protection for
computers against malicious programs that...
In the prior art of computer security by default programs are allowed to do whatever they like to other programs or to their data files or to critical files of...
Dynamically scanning a web application through use of web traffic
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application...
Data processing apparatus and method for protecting secure data and
program code from non-secure access when...
A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region....
Security data aggregation and business intelligence for web applications
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources...
Methods and systems for improving the security of secret authentication
data during authentication transactions
A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret...
Securing displayed information
A method, system or computer usable program product for securing displayed information including establishing a session between a first data processing device...
Encrypted in-memory column-store
Embodiments relate to processing encrypted data, and in particular to identifying an appropriate layer of encryption useful for processing a query. Such...
Application recommendation system
Systems and method for receiving mobile device usage data from mobile electronic devices using security applications with enhanced access privileges. The mobile...
System, apparatus, and method of securely erasing cache
A computer-executable method, system, and computer program product for managing a data storage system, wherein the data storage system includes a cache and a...
Application quality parameter measurement-based development
A development environment provides warnings based on one or more application categories set for an application. Each warning has a trigger threshold and a...
System and method for communicating in a wireless communications system
A system and method for communicating in a wireless communications system are provided. A communications system includes a macro subnet, and a macro subnet...
Method and apparatus for registering a computing device with a service
A method and apparatus for providing authentication of a computing device with a communications service. A subscriber identity module image is transmitted to...
Secure wireless communication
A method in accordance with one embodiment of the invention may include receiving a first encryption key. A second encryption key may be generated, and a first...
Method and system for protecting data flow at a mobile device
A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access...
Leveraging digital security using intelligent proxies
A method for protecting data is disclosed that protects not only who may access data but also how it is used. This invention uses an intelligent proxy which...
System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
Determining the vulnerability of computer software applications to attacks
Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that...
Systems, methods, and computer medium to securely transfer business
transactional data between networks having...
Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are...
Secure content transfer using dynamically generated optical machine
Technologies are generally described for peer-to-peer or peer-to-server-to-peer communication systems based on mobile devices, servers, and personal computers,...
Secure relay system
A method and apparatus for use in securely relaying data. The data is received by a first relay unit from a data provider. The data is sent by the first relay...
Method and system of providing authentication of user access to a computer
resource via a mobile device using...
A method and system of authenticating a computer resource such as an application or data on a mobile device uses a contactless token to provide multi-factor...
Secure access of electronic documents and data from client terminal
An improved approach for secure access of electronic documents and data is provided.
Credit card security system and method
A transaction method, system and apparatus of the present invention employs two electromagnetically read cards. A first card is employed for accessing account...
Vehicle activity module
Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each...
Indicia decoding device with security lock
A securable indicia encoding system with a lock receiving portion is disclosed herein. In one illustrative embodiment, a securable indicia decoding device may...
Semiconductor device including encryption section, semiconductor device
including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
Securing data gathering devices of a personal computing device while
performing sensitive data gathering...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
Parallel data processing system based on location control and method
A parallel data processing system based on location control and a method thereof can divide a data into smaller data and store and manage the divided data using...
Space-time separated and jointly evolving relationship-based network
access and data protection system
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
Secure data recorder
A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk...