At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Securing data in a dispersed storage network using an encoding equation
A method begins by dividing a data segment into data segment portions. The method continues by encoding the data segment portions to produce a plurality of sets...
Virtual security zones for data processing environments
A method, apparatus, and computer program product for providing security and network isolation for service instances comprising data processing resources...
Managing access to an address range in a storage device
Enhanced configuration of security and access control for data in a storage device is disclosed. A request is received to access an addressable memory location...
Wireless communication terminal and method for securely running industry
A method for securely running industry software. Industry software and data are stored in an internal storage medium of a wireless communication terminal. A...
System and method for automating and scheduling remote data transfer and
computation for high performance computing
The invention pertains to a system and method for a set of middleware components for supporting the execution of computational applications on high-performance...
Portable USB mass storage device
A new type of portable USB mass storage gadget is disclosed which provides the user with upgradeable high speed mass storage and processing for use with...
Transferring data over Bluetooth using intermediary bridge
In one or more embodiments, a first device such as a mobile phone can establish a wireless connection with second device, and the second device can act as a...
Management systems for multiple access control entities
Methods and apparatus for managing multiple user access control entities or clients. For example, in one embodiment, a "wallet" of electronic subscriber...
Audio delivery system for headsets
Methods and systems for delivering audio content to a headset are disclosed. A user taps a close proximity data exchange headset onto an device to download...
Methods and apparatuses for securing playback content
An apparatus for secured playback is presented. In one embodiment, the apparatus includes a controller that includes a key derivation module to manage...
Integrated circuit with secure metadata store
A semiconductor integrated circuit for processing content data by encrypting or decrypting the data has one or more inputs to received content and metadata. A...
Wearable personal digital device for facilitating mobile device payments
and personal use
Provided are a wearable personal digital device and related methods. The wearable personal digital device may comprise a processor, a display, biometric...
Method, system and apparatus for activation of a home security, monitoring
and automation controller using...
Embodiments of the present invention provide a single platform that provides controller functionality for each of security, monitoring and automation, as well...
Systems and methods for applying data loss prevention policies to
closed-storage portable devices
A computer-implemented method for applying data loss prevention policies to closed-storage portable devices may include (1) injecting a data loss prevention...
System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
Adaptive data verification for resource-constrained systems
A system and method for adaptively verifying data in resource constrain systems. The adaptive data verification mechanism employs the proper mode of...
Selectively wiping a remote device
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an...
Simulacrum of physical security device and methods
A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a...
Method and system for enrolling and authenticating computing devices for
data usage accounting
A method and system for authenticating a computing device for data usage accounting are described herein. As an example, the method can be practiced on a...
Method and apparatus for providing virtual Wi-Fi access
A method of providing virtual Wi-Fi service via a virtual Wi-Fi access network is provided. The method comprises: receiving data from an owner of an individual...
Method for managing remote upgrading keys in an information security
The present invention discloses a method for managing remote upgrading keys in an information security apparatus. A remote source apparatus generates key...
Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
Secure routing module
A routing module in a secure routing and communication architecture to receive and transmit data of varied protocols, convert the data protocols to an internet...
Client credentials data structure and method of employing the same
A client credentials data structure, a method of employing the same and a secure client-server communication system employing the data structure or the method....
Secure desktop applications for an open computing platform
Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein...
Secure file sharing method and system
Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set...
Instructions processors, methods, and systems to process BLAKE secure
A method of an aspect includes receiving an instruction indicating a first source having at least one set of four state matrix data elements, which represent a...
Security USB storage medium generation and decryption method, and medium
recorded with program for generating...
Disclosed is a security USB storage medium generation and decryption method. The method comprises outputting information for requesting an input of a user...
Method for interworking with trustzone between normal domain and secure
domain, and management method of...
The present invention provides a trusted application download management, authentication, and execution method and system. A trusted application download...
Systems and methods for physical security of information flows over a
power cable connection
An aircraft includes a first electrical connector configured to couple with a first power cable, a first data communication network and a first modem coupled to...
Method for strongly encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
Securing unrusted content for collaborative documents
A method and an apparatus that configure a sandbox document for secure presentation of a block of data stored in the sandbox document in response to an editing...
Systems and methods for securing data using multi-factor or keyed
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
System for selectively performing a secure data erase to ensure timely
A system is provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a plurality of physical volumes and...
Clipboard protection system in DRM environment and recording medium in
which program for executing method in...
Disclosed are a clipboard protection system in a DRM environment and a recording medium in which a program for executing the method in a computer is recorded....
Encrypting operating system
A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating...
Protection of user data in hosted application environments
A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application...
SOC with security function and device and scanning method using the same
A system-on-chip (SOC) for semiconductor intellectual property (IP), a device including the same, and a method of operating the same are provided. The SOC...
Smart television data sharing to provide security
A technique shares smart television data among subscribing organizations to provide security. The technique involves collecting, by an electronic server...
Secure electromagnetic data storage element having a selectively determind
switchable security mode
The apparatus of the present invention are directed to a selectively accessible electromagnetically resonant data storage element (implemented as a resonant...
Method and apparatus for encoding and decoding data transmitted to an
Methods and apparatus for encoding and decoding data transmitted acoustically and/or optically to strong authentication tokens to generate dynamic security...
Flexible method of user authentication
A method of authorizing a user at a location is disclosed. A user data input device is used for receiving of user information. In dependence upon stored policy...
Secure object having protected region, integrity tree, and unprotected
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
Fast secure erasure schemes for non-volatile memory
A method includes, in a memory with multiple analog memory cells, storing one or more data pages in respective groups of the memory cells using a first...
Modular arithmatic unit and secure system including the same
A modular arithmetic unit includes a first input generator receiving first data to generate a first operand; a second input generator receiving second data to...
Secure digital input/output low-power mode
A low-power mode for interfaces, such as secure digital input/output (SDIO) interfaces, is described. The low-power mode provides significant power savings...
Image forming apparatus, control method therefor, and storage medium
storing control program therefor
An image forming apparatus that facilitates management of information security policy even for an extended application installed from exterior. A scanning unit...
A luggage tracking assembly for tracking luggage during air travel and providing location information or other luggage related information to a remote device....
Security system and devices for musical instruments and firearms
A security system having a device that attach directly to and locks on or around an object to be secured, or one or more parts of the system are integrated into...
Data processing for securing local resources in a mobile device
A method of data processing for securing local resources in a mobile device. The method includes: a) when network connectivity is available: coupling the mobile...