At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Power source for in-transit electronic media
Exemplary methods, systems and components are implemented on a multipassenger transit vehicle to provide passenger access to a pre-assigned interactive...
Authenticating a device and a user
A method of authenticating a device and a user comprises receiving a user input, generating a first key from the user input, performing a physical measurement...
Method and system for generating a secure key
A method, system on a chip, and computer system for generating more robust keys which utilize data occupying relatively small die areas is disclosed....
System for finding code in a data flow
A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences....
System and method of data security in synchronizing data with a wireless
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application....
Methods and systems for improving security in zero-power devices
Methods and systems for providing lime information in intermittently powered devices that are batteryless and operate purely on harvested energy (also referred...
Multi-stage security screening system and smart communication system
A multi-stage screening system for screening a container includes a pre-screening stage including a transmission X-ray device. The pre-screening stage is...
Conductive magnetic coupling system
Technologies are described herein for a conductive magnetic coupling system. The system includes a signal supply component that provides electrical and/or data...
Employing a home base station in a wireless communication environment
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec...
Security system for cloud computing
Security system for cloud computing that will improve the security of users' authentications to cloud data and resources. User authentication to cloud resources...
Zero configuration communication between a browser and a networked media
A method, apparatus and system related to zero configuration communication between a browser and a networked media device are disclosed. In one embodiment, a...
Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
Disabling operation of features on a mobile communication device based
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
Wireless data transmission with predictive transmission adjustment
The present disclosure provides a method wherein preceding and succeeding data elements of a data element to be sent next are analyzed in order to set a signal...
Method and system for securing multimedia data streamed over a network
There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the...
Information exchange apparatus, method and managing system applied thereto
An information exchange apparatus has a processing unit, a wireless communication unit, a storage unit, a mainframe connection port and an identification...
Systems and methods identifying and reacting to potentially malicious
Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are...
Intelligent electric device and network system including the device
A protection relay installed at a power system and a network system including the protection relay are disclosed, the protection relay storing a security level...
System and method for secure data generation and transmission
Systems and methods for secure generation and transmission of data over a communication network are described herein. In one example, the method comprises...
Secure data entry
In some embodiments, techniques for secure data entry comprise receiving request data, requesting secure data entry via a programmatic interface, and receiving...
Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
User authentication and authorization in distributed security system
Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions...
Communication security method and apparatus of first node and second node
communicating based on full duplex...
A communication security method and apparatus of a first node and a second node are provided. The first node and the second node communicate with each other...
Method and apparatus to control TX/RX AMSDU size based on the negotiated
maximum transmission unit in the...
A method includes selecting upstream and downstream aggregated MAC service data unit (AMSDU) sizes for communications between a client device, an access point,...
Resilient device authentication system
A resilient device authentication system and method comprising: one or more verification authorities (VAs) including a memory loaded with a complete...
Remote management of endpoint computing device with full disk encryption
Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint...
Securely storing data in a dispersed storage network
A method to securely store a data file in a dispersed storage network (DSN) in a manner to increase difficulty in hacking the data file begins by a dispersed...
Method for buying and selling stocks and securities
A computer-based method and system for buying and selling stocks and other securities. In general, the method creates an indicator for the purchase point or...
Data reporting framework across on-premise and hosted CRM services
A data reporting framework that works across on-premise and hosted Customer Relationship Management (CRM) platforms enabling definition and execution of secure...
Method for the production of a book cover insert and book-type security
document and book cover insert and...
The invention relates to a method for the production of a book cover insert (11) and to a method for the production of a book-type security document (30) and...
Secure, server-less print release
A print release environment includes a client computing device, an imaging device and an active directory. The client stores an imaging job on a local hard...
Using storage controller bus interfaces to secure data transfer between
storage devices and hosts
The disclosed embodiments provide a system that secures data transfer between a storage device and a host. During operation, the system obtains an input/output...
Method and apparatus for securing programming data of a programmable
Configuration data for a programmable integrated circuit device is at least partially encrypted according to at least one encryption scheme. A plurality of key...
Method, secure device, system and computer program product for securely
managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
A security device connected to a host device which includes a processor performing a scramble operation and a storage unit, the security device comprising: a...
System and method for allowing secure remote server access using data
Systems and methods are provided for providing users at remote access devices with conditional access to server-based applications. Requests for access to...
Device and method for secure memory access
In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a...
Protecting codes, keys and user credentials with identity and patterns
Machine and method of accessing information securely are disclosed. Two sets of user identifying data are acquired. A transformation is established by mapping...
Secure access-based enumeration of a junction or mount point on a
Embodiments described herein provide a technique for securely responding to an enumeration request of a data container stored at a location referenced by a...
Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
Securing data replication, backup and mobility in cloud storage
A technique secures data in cloud storage. The technique involves receiving, by processing circuitry, an input/output (I/O) request which includes host data....
Mode-based secure microcontroller
Various embodiments of the present invention are related to integrated circuits for processing data at a microcontroller interface. The microcontroller...
All invalidate approach for memory management units
An input/output memory management unit (IOMMU) having an "invalidate all" command available to clear the contents of cache memory is presented. The cache memory...
Verified hardware-based erasure of data on distributed systems
Systems, methods and related processes for securely erasing and/or rendering permanently inaccessible data stored on storage systems securely erased is...
Remote device filter
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one...
Self-aligning connection to a docking station
A docking station (2) system for a tablet (1) having a data connector, said docking station (2) comprising: a substantially planar docking platform (4) for...
Systems and methods for controlling flushing apparatus and related
A programmable automated water flushing system (PAWFS) allows for two way communication and remote flushing unit management through a secure web access point or...
Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...