At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System for execution of security related functions
An apparatus having a first memory circuit, a plurality of arithmetic modules, and a plurality of second memory circuits. The first memory circuit may be...
Managing and predicting privacy preferences based on automated detection
of physical reaction
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
Code base partitioning system
The subject disclosure is directed towards partitioning a code base of a program into a trusted portion and an untrusted portion. After identifying sensitive...
System and method for securely managing enterprise related applications
and data on portable communication devices
A system and computer-implemented method for securely managing enterprise related applications and associated data on one or more portable communication devices...
Dynamically scanning a web application through use of web traffic
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application...
Policy-based control layer in a communication fabric
Presented herein are techniques for adding a secure control layer to a distributed communication fabric that supports publish-subscribe (pub-sub) and direct...
Medical professional application integration into electronic health record
Embodiments relate to integrating data collection and productivity applications with an EHR system. To integrate a patient's data collection application with...
Determining security holes of a backup image
A system and method provide for backing up and restoring using patch level data for operating system and application files. Patch level data for the files in...
Image forming apparatus that stores data of print job in memory area,
method of controlling image forming...
A image forming apparatus capable of performing reservation printing, even when incapable of storing print data in a memory unit due to an insufficient free...
Motion-based identity authentication of an individual with a
Systems, methods and computer storage mediums securely authenticate an identity of an individual based on a pattern that is traced by the individual....
Apparatus and method for characterizing a replica tape
An apparatus and method are provided for characterizing a replica tape which has been embossed, compressed or cast on a surface of a material to be measured to...
Sight adapter for handheld mortar system
A sight adapter for a handheld mortar that is secured directly to the mortar tube and provides a standardized mounting system for a weapon sight. The sight...
Intravenous medication delivery safety assembly
An intravenous medication delivery safety assembly insures proper medication is delivered to a patient. The assembly includes an IV bag holding a medication. A...
Method for transmitting data in a sensor network, sensor node and central
A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node...
Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
Securely and reliably storing data in a dispersed storage network
A method begins by ingesting distributed storage (DS) units of a set of DS units storing respective portions of data. The method continues with each of the...
Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
Redirection of data from an on-premise computer to a cloud scanning
An on-premise computer in the form of an on-premise gateway receives data transmitted by a client to an intended destination server. The on-premise gateway and...
Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
Token for securing communication
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest...
DTCP certificate authentication over TLS protocol
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
Systems and methods for secure third-party data storage
A computer-implemented method for secure third-party data storage may include (1) identifying, at a server-side computing system, a data access request from a...
Method and system for management of security rule set
There are provided a method of automated managing an ordered set of security rules implemented at a plurality of security gateways and a system thereof. The...
Storage gateway security model
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway...
Method, apparatus, and system for protecting cloud data security
The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent...
System for encrypting data with an error correction code
An encryption method and apparatus is provided for increasing the security of encrypted data by puncturing or repeating a part of coded data. The data...
Charged particle lithography system with a long shape illumination beam
A system includes an integrated circuit (IC) design data base having a feature, a source configured to generate a radiation beam, a pattern generator (PG)...
Method for checking the production quality of an optical security feature
of a value document
A method for checking the production quality of a prescribed optical security feature in or on a prescribed portion of a value document on the basis of pixel...
Secure electronic compartment identifier system
A latch, or tag that can be used on luggage, baggage, trunks, rail cars, trailers or any compartment that can be opened and closed that establishes profile data...
Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
Security facility for maintaining health care data pools
Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery,...
Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
Systems and methods for sharing data stored on secure third-party storage
A computer-implemented method for sharing data stored on secure third-party storage platforms may include (1) identifying a request from a client system for a...
Security measures for data protection
This document discusses, among other things, security measures for shielding or protecting data or sensitive signals on an integrated circuit (IC). The systems...
Exception handling in a data processing apparatus having a secure domain
and a less secure domain
A data processing apparatus and method are provided for handling exceptions, including processing circuitry configured to perform data processing operations in...
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output...
Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
Image communication apparatus, method and storage medium with archiving
There is provided with an image communication apparatus. A designation unit designates a destination of image data. A transmission unit transmits the image data...
Image forming device and method for displaying image information
A determination unit determines whether or not an image forming device is a pre-designated image forming device by using specifying information when security...
Automated coverage monitoring of mobile applications
Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security ...
Digital lanyard for securing data on portable devices
A data securing system includes a digital lanyard having a first end portion connected with a first line, having a first connector portion, and a second line...
Secure routing based on degree of trust
A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to...
Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
Network system with common secure wireless message service serving
multiple applications on multiple wireless...
Each of several mobile end-user devices contains a device messaging agent that securely communicates with a network message server over a wireless network. The...
Security techniques for device assisted services
Methods and systems for receiving a report from an end-user device, the report comprising information about a device service state; determining, based on the...
Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
Access control to files based on source information
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be...
Rootkit detection by using HW resources to detect inconsistencies in
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...