At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
A system for secure printing is disclosed herein. An example of the system includes a client that initiates a print request, creates an identifier, transmits...
Device and method for secure user interface gesture processing using
A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor...
Method for displaying information from an ID transmitter
The invention relates to a method for displaying a piece of information, using a mobile ID transmitter (10) and a cellular telephone (20) having a display (21),...
Modular plug and play connectivity platform
Disclosed are exemplary embodiments of a modular plug and play connectivity platform, system and method. The disclosed modular plug and play connectivity...
In-vehicle network system
Provided is an in-vehicle network equipped with a function whereby configuration verification is performed while preventing an increase in the processing load...
Pooled transport and control functions in a 3GPP LTE network
Presented are methods and apparatus for decoupling transport and control (T&C) functions from a plurality of eNBs and collecting the T&C functions in a...
Method for positioning target terminal while protecting privacy of user
A method of providing location information of a target Secure User Plane Location (SUPL) Enabled Terminal (target SET) while protecting privacy of a user of the...
Mobile device auto wipe
A mobile computing device may automatically determine an occurrence of a security event associated with the device, and automatically erase all software and...
Method for creating an enhanded data stream
The present invention provides a method for secure communication of digital information between a transmission entity and at least one reception entity. The...
Method and apparatus for visualizing network security state
A network security state visualization scheme is suitable for collecting security events existing in a network, analyzing the security events, categorizing and...
Online secure device provisioning framework
A method for updating network-enabled devices with new identity data includes generating a plurality of new identity data records and loading the new identity...
Cross-domain identity management for a whitelist-based online secure
device provisioning framework
A method for managing identifiers associated with network-enabled devices and used in an identity data system provisioning the network-enabled devices with...
Transmitting device, receiving device, and operation method thereof
In a transmitting device, a receiving device, and an operation method thereof according to the present invention, in relation to a simultaneous link...
Method and apparatus for automated secure one-way data transmission
The present disclosure relates to a method and system for one-way data transmission from an open network to a closed network. A data transmission controller on...
Externally and internally accessing local NAS data through NSFV3 and 4
A method for secure external access to a collaborative design system is provided that includes establishing a virtual private network (VPN) tunnel between an...
Circuit for secure provisioning in an untrusted environment
Embodiments of electronic circuits enable security of sensitive data in a design and manufacturing process that includes multiple parties. An embodiment of an...
DNA sample data in a transponder transaction
The present disclosure relates to the use of DNA sample data as part of a biometric security system in a transponder transaction. The biometric security system...
Emergency operation of elevators
An access control system includes at least one door fitting to a secured area of a building and at least one identification code on a mobile data carrier. The...
Accessing confidential data securely using a trusted network of mobile
A system including a managing device communicatively coupled to a keyholding device. The managing device includes a data manager executing on the processor...
Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
Methods and systems for a portable data locker
The embodiments provide for binding files to an external drive, a secured external drive, or portable data locker. The files are bound in order to help restrict...
Dynamic de-identification and anonymity
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to...
Reporting and management of computer systems and data sources
A system and method are provided for managing data, such as for example security or other business data. For the example of security data, security data is...
Systems and methods for data verification and replay prevention
A system and method are provided for the secure sharing of information stored using cloud storage services and for performing data verification and replay...
Automatic data protection in a computer system
Techniques are provided for a data security system that includes two mappings: a first mapping that maps a security policy to sensitive type and a second...
Secure mobile interface access system
A method performed by one or more server devices connected to a mobile device via a network, the mobile device being connected to an electronic device is...
Updating changes to caches
Embodiments relate to systems and methods for updating changes to caches. In aspects, a provisioning server can receive by a hardware processor a security data...
Systems and methods of secure domain isolation involving separation kernel
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
Systems, methods and computer programs providing impact mitigation of
Disclosed is a method and system to operate a governed data processing system in concert with a governing data processing system. The method includes operating...
Document encryption and decryption
A document encryption and decryption system and method for selectively encrypting and decrypting files and attachments, electronic mail, text messages, and any...
System and method of security management for a virtual environment
A system and method can support security management in a computing environment that includes one or more virtualized machines to which one or more applications...
Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who...
Systems, methods and computer program products including features of
transforming data involving a secure...
Systems and methods for transforming data involving a secure format from which the data is recoverable. In one implementation, there is provided a method of...
Dividing a power input and directly providing divided power to an output
terminal in a power control circuit
A memory card with a smart card function including a flash memory unit, a data processing control unit, and a power control unit is provided. The data...
Distributed virtual storage cloud architecture and a method thereof
The present disclosure relates to a distributed information storage system which functions as virtual cloud storage overlay on top of physical cloud storage...
Apparatuses, methods and systems for a virtual security camera
The APPARATUSES, METHODS AND SYSTEMS FOR AN ONLINE BEHAVIOR MONITOR ("OBM") transform user social-gaming behavioral pattern data via various OBM components into...
Wi-Fi access point and system for establishing data transmission channel
A Wi-Fi access point (AP) is provided. The Wi-Fi AP includes a femtocell signaling interface, a WAN interface, a Wi-Fi AP radio access interface, and a...
Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
In-circuit security system and methods for controlling access to and use
of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
Content-based security processing using distributed scan management
A method and apparatus is provided for processing acquired document data, using distributed scan management protocols, according to a security classification of...
Valid replacement data in encoded video
A security method for H.264 video streams and the like is provided that comprises: coding video data with incorrect or missing bytes, whereby the coded video is...
Method and system for prevention of control word sharing
A method and system of preventing control word sharing, the method and system including receiving a temporal key, denoted TK.sub.i, at a removable security...
Portable electronic entity capable of receiving broadcast multimedia data
A portable electronic entity includes a communication interface (110) with a host terminal (TH), a conversion system (170) for a signal received in a secure...
System and method for securing the data and information transmitted as
A system for securing data and information transmitted via entails is disclosed. The system includes a sender-side device from which an email including a first...
Systems and methods for implementing computer security
A computing device includes a security control module to monitor and control security of the operating system and security of one or more applications executing...
Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
Detecting computer security threats in electronic documents based on
In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages,...
Directing audited data traffic to specific repositories
Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules...