At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Intravenous medication delivery safety assembly
An intravenous medication delivery safety assembly insures proper medication is delivered to a patient. The assembly includes an IV bag holding a medication. A...
Method for transmitting data in a sensor network, sensor node and central
A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node...
Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
Securely and reliably storing data in a dispersed storage network
A method begins by ingesting distributed storage (DS) units of a set of DS units storing respective portions of data. The method continues with each of the...
Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
Redirection of data from an on-premise computer to a cloud scanning
An on-premise computer in the form of an on-premise gateway receives data transmitted by a client to an intended destination server. The on-premise gateway and...
Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
Token for securing communication
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest...
DTCP certificate authentication over TLS protocol
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
Systems and methods for secure third-party data storage
A computer-implemented method for secure third-party data storage may include (1) identifying, at a server-side computing system, a data access request from a...
Method and system for management of security rule set
There are provided a method of automated managing an ordered set of security rules implemented at a plurality of security gateways and a system thereof. The...
Storage gateway security model
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway...
Method, apparatus, and system for protecting cloud data security
The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent...
System for encrypting data with an error correction code
An encryption method and apparatus is provided for increasing the security of encrypted data by puncturing or repeating a part of coded data. The data...
Charged particle lithography system with a long shape illumination beam
A system includes an integrated circuit (IC) design data base having a feature, a source configured to generate a radiation beam, a pattern generator (PG)...
Method for checking the production quality of an optical security feature
of a value document
A method for checking the production quality of a prescribed optical security feature in or on a prescribed portion of a value document on the basis of pixel...
Secure electronic compartment identifier system
A latch, or tag that can be used on luggage, baggage, trunks, rail cars, trailers or any compartment that can be opened and closed that establishes profile data...
Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
Security facility for maintaining health care data pools
Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery,...
Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
Systems and methods for sharing data stored on secure third-party storage
A computer-implemented method for sharing data stored on secure third-party storage platforms may include (1) identifying a request from a client system for a...
Security measures for data protection
This document discusses, among other things, security measures for shielding or protecting data or sensitive signals on an integrated circuit (IC). The systems...
Exception handling in a data processing apparatus having a secure domain
and a less secure domain
A data processing apparatus and method are provided for handling exceptions, including processing circuitry configured to perform data processing operations in...
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output...
Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
Image communication apparatus, method and storage medium with archiving
There is provided with an image communication apparatus. A designation unit designates a destination of image data. A transmission unit transmits the image data...
Image forming device and method for displaying image information
A determination unit determines whether or not an image forming device is a pre-designated image forming device by using specifying information when security...
Automated coverage monitoring of mobile applications
Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security ...
Digital lanyard for securing data on portable devices
A data securing system includes a digital lanyard having a first end portion connected with a first line, having a first connector portion, and a second line...
Secure routing based on degree of trust
A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to...
Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
Network system with common secure wireless message service serving
multiple applications on multiple wireless...
Each of several mobile end-user devices contains a device messaging agent that securely communicates with a network message server over a wireless network. The...
Security techniques for device assisted services
Methods and systems for receiving a report from an end-user device, the report comprising information about a device service state; determining, based on the...
Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
Access control to files based on source information
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be...
Rootkit detection by using HW resources to detect inconsistencies in
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
Method for detecting anomalies in a control network
A method for monitoring and controlling, industrial or building automation to detect anomalies in a control network, wherein a technology of an intrusion...
System and method for verifying the identity of an internet user
A system and method for verifying the identity of an Internet user are disclosed. In at least one embodiment, a central computing system is configured for...
System and method for multitenant management of domains
In one embodiment, a method is performed on a multitenant shared-resources system for each managed domain of a plurality of managed domains. The method includes...
Method for sharing data of device in M2M communication and system therefor
The present invention relates to a method for sharing data of a device in M2M communication and a system therefor. The invention comprises: a step of allowing a...
Remote verification of user presence and identity
A system for verifying the presence and identity of a user on a remote computer having a server connected to a network, the network being connected to one or...
Methods and apparatuses for securely operating shared host computers with
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
System and method for account access
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
Management of multiple devices registered to a user
A system and method for managing electronic devices based on user identity information is presented. An authenticating entity authenticates and provides secure...
Method and system for providing access-specific key
An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile...
Cloud based logging service
Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. According to one...
Security system for data stored in the cloud
A cloud access security system provides security to data stored in the cloud. The cloud access security system maintains version service information that...
Hybrid secure communication system and method
Systems and methods for securely communicating between a mobile computing device and a vehicle system are provided. A method includes receiving authentication...
Systems and methods for providing a secure data exchange
A system, a method, and a computer program product for a data exchange are provided. A first application generates a first key for exchange of data between the...