At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and device for communicating digital content
A method for establishing a secured communication channel, between a first processing component and a second processing component; the method comprising...
Content analytics system configured to support multiple tenants
Techniques are disclosed for a software as a service (SaaS) provider to host a content analytics tool used to evaluate data collections for multiple customers...
System and method for synchronizing and editing electronic documents
Embodiments described herein include a system and method for editing one or more electronic documents synchronized among multiple electronic devices. The...
Writing area security system
A writing area security system (10) includes a CPU (34), a flash memory (64), and a memory controller (62). The memory controller (62), when receiving a read...
Method and system for executing applications using native code modules
Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native...
Access using a mobile device with an accelerometer
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a...
Apparatus and method of vibration testing for manufacturing defect
detection in composite insulators
The present application relates to an apparatus and method for detecting defects in composite insulators used in power systems. The apparatus includes a test...
Secure pairing of electronic devices using dual means of communication
The present invention relates to secure paring of electronically controlled devices configured to communicate with each other. A medical system is provided...
Mobile device with device agents to detect a disallowed access to a
requested mobile data service and guide a...
An end-user mobile device has a cellular network modem that is capable of communication over multiple carrier access networks. Prior to activation of the device...
Method for updating a data carrier
The invention provides a method for updating a data carrier inserted in a telecommunication end device with regard to a data-carrier application executable in...
Methods and apparatus for use in transferring an assignment of a secure
chip subscription managers
Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network...
Internet protocol security camera connected light bulb/system
The present invention concerns an apparatus comprising an antenna module and a control module. The antenna module may be configured to connect and send data to...
Method for network access, related network and computer program product
A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security...
Method and system for improving website security
A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page...
Computer program and method for biometrically secured, transparent
encryption and decryption
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out...
System and method for key generation in security tokens
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used...
System for secure enrollment and secure verification of network users by a
centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
System and method for providing a secure book device using
cryptographically secure communications across...
A system for integrating access to separate and physically partitioned networks from a single client device is described. The system is interposed between the...
Systems and methods for enabling secure messaging, command, and control of
remote devices, communicated via a...
Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over potentially insecure text...
Selecting transceiver for wireless network based on security keys
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method is provided...
Method, apparatus, and network system for terminal to traverse private
network to communicate with server in...
Embodiments of the present invention provide a method, an apparatus, and a network system for a terminal to traverse a private network to communicate with a...
System and method for pool-based identity generation and use for service
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment...
Method and apparatus for allowing software access to navigational data in
a decrypted media stream while...
A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a...
Item identification using video recognition to supplement bar code or RFID
A method and system for confirming the identity of a product in a security system and for determining sales-related information pertaining to the products. One...
System and method for analysis and authentication of covert security
information using a smart device
A system and method for hidden security feature detection, analysis and authentication using a smart device is disclosed. The smart device can detect and...
Method for dynamic authentication between reader and tag, and device
The present disclosure discloses a method for dynamic authentication between a reader and a tag, and an implementing device therefor, to solve the technical...
Systems and methods for optimizing security controls for virtual data
A computer-implemented method for optimizing security controls for virtual data centers may include 1) identifying a security policy that applies to at least...
Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
Data programming control system with secure data management and method of
A method of operation of a data programming control system includes: providing a secure data management host server coupled to a network; encrypting a contract...
Data and key separation using a secure central processing unit
A computing system, comprising includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. The second...
Process and system for strengthening password security
A process and a system that create and encrypt rich formatted passwords that increase password strength and security in some embodiments are disclosed. The...
Securing a device and data within the device
Systems and methods are provided for securing a self-securing device and information that is stored in memory within the device. The self-securing device...
Method and system for configuring storage device in hybrid storage
The present invention provides a method and a system for configuring a storage device in a hybrid storage environment. The method includes: acquiring a...
Secure low pin count scan
A contactless smartcard type integrated circuit needing only two pins for performing a standard ATPG test is disclosed. A scan test may be performed using one...
Adhesively mounted apparatus for determining physiological and contextual
The invention comprises an apparatus for determining the contextual or physiological status of the individual wearing the apparatus. The apparatus is designed...
Method for detecting security error in mobile telecommunications system
and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
Wireless handheld configuration device for a securable wireless
self-organizing mesh network
A self-organizing mesh network is made up of individual devices configured to use other network devices to pass data from one point to another. The network also...
Battery monitoring system
A battery monitoring system including an on-site battery event monitor (BEM) that sends out battery-related data to a server over a wide area network (WAN). The...
Visual communications system employing video imagery
A system and method for platform independent LOS visual information transmission is disclosed. A transmitter consists of a series of sequential images that are...
Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
Security risk aggregation, analysis, and adaptive control
Methods and apparatuses, including computer program products, are described for transaction-based security risk aggregation and analysis. A server computing...
Storing log data efficiently while supporting querying
A logging system includes an event receiver and a storage manager. The receiver receives log data, processes it, and outputs a column-based data "chunk." The...
Authentication using an external device
In some embodiments, techniques for computer security comprise receiving request data, wherein the request data includes identity-related information relating...
Information processing apparatus, control method thereof, storage medium,
and image processing apparatus
A user credential sharing mechanism which can suitably implement a single sign-on function while preventing illicit accesses by accidental matches of...
Mobile communications device providing heuristic security authentication
features and related methods
A mobile communications device may include a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
Network location service
A method is provided for a network location service in which one or more packet forwarding devices in the network collect and maintain location data for the...
Communication network system and communication network configuration
A redundant path configuration method and a control method are disclosed. An intercommunication path for mutually transmitting and receiving a signal is...
Secure biometric cloud storage system
A secure and scalable data storage system that includes a server and a plurality of clients. The server maintains an access permission file that includes a...
Dynamic distributed key system and method for identity management,
authentication servers, data security and...
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by...
System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...