At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Wireless data transmission with predictive transmission adjustment
The present disclosure provides a method wherein preceding and succeeding data elements of a data element to be sent next are analyzed in order to set a signal...
Method and system for securing multimedia data streamed over a network
There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the...
Information exchange apparatus, method and managing system applied thereto
An information exchange apparatus has a processing unit, a wireless communication unit, a storage unit, a mainframe connection port and an identification...
Systems and methods identifying and reacting to potentially malicious
Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are...
Intelligent electric device and network system including the device
A protection relay installed at a power system and a network system including the protection relay are disclosed, the protection relay storing a security level...
System and method for secure data generation and transmission
Systems and methods for secure generation and transmission of data over a communication network are described herein. In one example, the method comprises...
Secure data entry
In some embodiments, techniques for secure data entry comprise receiving request data, requesting secure data entry via a programmatic interface, and receiving...
Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
User authentication and authorization in distributed security system
Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions...
Communication security method and apparatus of first node and second node
communicating based on full duplex...
A communication security method and apparatus of a first node and a second node are provided. The first node and the second node communicate with each other...
Method and apparatus to control TX/RX AMSDU size based on the negotiated
maximum transmission unit in the...
A method includes selecting upstream and downstream aggregated MAC service data unit (AMSDU) sizes for communications between a client device, an access point,...
Resilient device authentication system
A resilient device authentication system and method comprising: one or more verification authorities (VAs) including a memory loaded with a complete...
Remote management of endpoint computing device with full disk encryption
Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint...
Securely storing data in a dispersed storage network
A method to securely store a data file in a dispersed storage network (DSN) in a manner to increase difficulty in hacking the data file begins by a dispersed...
Method for buying and selling stocks and securities
A computer-based method and system for buying and selling stocks and other securities. In general, the method creates an indicator for the purchase point or...
Data reporting framework across on-premise and hosted CRM services
A data reporting framework that works across on-premise and hosted Customer Relationship Management (CRM) platforms enabling definition and execution of secure...
Method for the production of a book cover insert and book-type security
document and book cover insert and...
The invention relates to a method for the production of a book cover insert (11) and to a method for the production of a book-type security document (30) and...
Secure, server-less print release
A print release environment includes a client computing device, an imaging device and an active directory. The client stores an imaging job on a local hard...
Using storage controller bus interfaces to secure data transfer between
storage devices and hosts
The disclosed embodiments provide a system that secures data transfer between a storage device and a host. During operation, the system obtains an input/output...
Method and apparatus for securing programming data of a programmable
Configuration data for a programmable integrated circuit device is at least partially encrypted according to at least one encryption scheme. A plurality of key...
Method, secure device, system and computer program product for securely
managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
A security device connected to a host device which includes a processor performing a scramble operation and a storage unit, the security device comprising: a...
System and method for allowing secure remote server access using data
Systems and methods are provided for providing users at remote access devices with conditional access to server-based applications. Requests for access to...
Device and method for secure memory access
In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a...
Protecting codes, keys and user credentials with identity and patterns
Machine and method of accessing information securely are disclosed. Two sets of user identifying data are acquired. A transformation is established by mapping...
Secure access-based enumeration of a junction or mount point on a
Embodiments described herein provide a technique for securely responding to an enumeration request of a data container stored at a location referenced by a...
Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
Securing data replication, backup and mobility in cloud storage
A technique secures data in cloud storage. The technique involves receiving, by processing circuitry, an input/output (I/O) request which includes host data....
Mode-based secure microcontroller
Various embodiments of the present invention are related to integrated circuits for processing data at a microcontroller interface. The microcontroller...
All invalidate approach for memory management units
An input/output memory management unit (IOMMU) having an "invalidate all" command available to clear the contents of cache memory is presented. The cache memory...
Verified hardware-based erasure of data on distributed systems
Systems, methods and related processes for securely erasing and/or rendering permanently inaccessible data stored on storage systems securely erased is...
Remote device filter
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one...
Self-aligning connection to a docking station
A docking station (2) system for a tablet (1) having a data connector, said docking station (2) comprising: a substantially planar docking platform (4) for...
Systems and methods for controlling flushing apparatus and related
A programmable automated water flushing system (PAWFS) allows for two way communication and remote flushing unit management through a secure web access point or...
Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...
Method of managing sensitive data in an electronic token
A method of managing data in an electronic token includes an initial step of storing a first data into the electronic token and into a secured site. Secret...
Method and apparatus for secure data transmission
A method and apparatus for secured data transmission is provided. The base station determines a first precoding matrix based on channel information of an...
Remotely defining security data for authorization of local application
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing...
System and method for configuring devices for secure operations
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data...
Safe services framework
Providing security-related services for enterprise service requests includes receiving a service request from an endpoint, determining the transaction parameter...
Selective modification of encrypted application layer data in a
transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
Enhanced security and safety in telerobotic systems
Methods and systems for securing remotely-operable devices are provided. A security device can receive a plurality of commands to control a remotely-operable...
Systems and methods for IP-based intrusion detection
Systems and methods for account security are provided. In one example embodiment, a first login request including a username and a password is analyzed to...
Computerized method and system for managing amendment voting in a
networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for managing amendment voting in a networked secure collaborative computer data...
Controlling exposure of sensitive data and operation using process bound
security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
Method and system for logging security event data
Through the use of a persistent connection between security, monitoring and automation controller devices and provider supported servers in an operator domain,...
Method for checking an optical security feature of a value document
A method for checking a prescribed optical security feature on a prescribed portion of a value document based on pixel data of pixels of an image of the portion...
Method and apparatus for securing CPUS booted using attached flash memory
The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more...