At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for detecting anomalies in a control network
A method for monitoring and controlling, industrial or building automation to detect anomalies in a control network, wherein a technology of an intrusion...
System and method for verifying the identity of an internet user
A system and method for verifying the identity of an Internet user are disclosed. In at least one embodiment, a central computing system is configured for...
System and method for multitenant management of domains
In one embodiment, a method is performed on a multitenant shared-resources system for each managed domain of a plurality of managed domains. The method includes...
Method for sharing data of device in M2M communication and system therefor
The present invention relates to a method for sharing data of a device in M2M communication and a system therefor. The invention comprises: a step of allowing a...
Remote verification of user presence and identity
A system for verifying the presence and identity of a user on a remote computer having a server connected to a network, the network being connected to one or...
Methods and apparatuses for securely operating shared host computers with
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
System and method for account access
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
Management of multiple devices registered to a user
A system and method for managing electronic devices based on user identity information is presented. An authenticating entity authenticates and provides secure...
Method and system for providing access-specific key
An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile...
Cloud based logging service
Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. According to one...
Security system for data stored in the cloud
A cloud access security system provides security to data stored in the cloud. The cloud access security system maintains version service information that...
Hybrid secure communication system and method
Systems and methods for securely communicating between a mobile computing device and a vehicle system are provided. A method includes receiving authentication...
Systems and methods for providing a secure data exchange
A system, a method, and a computer program product for a data exchange are provided. A first application generates a first key for exchange of data between the...
System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
Global state synchronization for securely managed asymmetric network
The present invention provides a system and method is disclosed for the development and maintenance of a globally distributed state session table wherein a...
Mobile communications device providing secure element data management
features and related methods
A mobile communications device may include a near field communications (NFC) device, an input device configured to generate a memory wipe command, a memory, and...
A semiconductor device with a novel structure in which storage capacity needed for holding data can be secured even with miniaturized elements is provided. In...
Securing gaming transactions
Providing tamper-evident transaction data for transactions relating to a draw or game event such as a lottery or other game of chance or skill. The...
System and method for dynamic FOB synchronization and personalization
A system generally for personalizing and synchronizing fob data in the context of a distributed transaction system is disclosed. A dynamic fob synchronization...
Apparatus and method of maintaining and repairing banknote validator using
There is provided an apparatus and a method of maintaining, repairing and/or optimizing a banknote validator using a network. The apparatus includes a banknote...
System and method for a secure cardholder load and storage device
A system for a secure cardholder and storage device includes a mobile communication device and a secure card transporter (SCT). The SCT includes a Near Field...
Selectively securing a hot-swappable data storage device to prevent data
A method and computer program product secure a hot-swap data storage device against being manually physically removed from an operable position within a chassis...
Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
System and method for securing sensitive data
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first...
Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
Method and system for securely transmitting deterrent data
A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
System and method for unattended computer system access
A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local...
Familiar dynamic human challenge response test content
Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are...
Security server for configuring and programming secure microprocessors
A security server for programming configuration settings and application images into a target device is disclosed. The security server includes two secure...
Systems, methods, and apparatuses for testing mobile device applications
Aspects of the present disclosure generally relate to systems and methods for facilitating optimization of mobile application testing. In one embodiment, a...
Information processing method and apparatus for recovering state of system
A disclosed information processing method is executed by a computer and includes: storing context representing a state of a processor in the computer into a...
Secure system time reporting
Technologies related to secure system time reporting are generally described. In some examples, responses to some system time requests may be manipulated to...
Systems and methods for environmental testing and evaluation of
non-destructive inspection sensors
A system and method for environmental testing and evaluation of non-destructive inspection (NDI) sensors is provided. The system has a structure having a...
Bandwidth guaranteed system, radio node device and bandwidth guaranteeing
To establish an alternative path without giving an influence on signal continuity to a data transmission line to which a communication bandwidth cannot be...
Mobile device and method to monitor a baseband processor in relation to
the actions on an applicaton processor
A method and device to analyze the security of a mobile terminal having application and baseband processors are described. Various information may be acquired...
Security method for the verification of an information retrieval request
The invention is related to security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a...
Methods and devices for OTA management of subscriber identity modules
Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a...
System and method for managing OTA provisioning applications through use
of profiles and data preparation
A method using a non-transitory processor for providing an application product including receiving an application profile, a key profile, a secure element (SE)...
Method and apparatus for handling handover procedure
The present invention provides a method for handling a handover procedure for a Radio Resource Control (RRC) layer in a user equipment (UE) of a wireless...
Method and system for global navigation satellite system configuration of
wireless communication applications
Methods and systems for global positioning navigate satellite system configuration of wireless communication applications may comprise in a wireless...
Billing varied service based on tier
A mobile communication device that monitors and reports consumption of multi-tiered communication services is disclosed. The mobile communication device...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for backing up data include securely connecting at least first and second privately addressed computers over a network,...
Method and apparatus for enhancing communication security
A method and apparatus can be configured to transmit indicators to a network entity. The indicators indicate whether security will be applied to a media data,...
Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
Cross-domain object models for securely sharing information between
network security domains
Techniques are described for controlling transfer of information in a secure manner across multiple network security domains. As described herein, cross-domain...
Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...