At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for implementing security in a cloud computing
Computer systems and methods are provided in which an agent executive, when initially executed in a virtual machine, obtains an agent API key from a user. This...
Securing speech recognition data
Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more...
Confidential fraud detection system and method
Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a...
Products and processes for utilizing order data and related data
In an embodiment, an apparatus comprises a processor, and a memory that stores a program. The program, when executed by the processor, directs the processor to...
Semantically-aware behavioral security analysis system for security
information and event management
A behavioral security analysis system comprises a computational semantic parser configured to process data associated with a security information and event...
Method and apparatus of securely processing data for file backup,
de-duplication, and restoration
Disclosed are an apparatus and methods of determining if at least one data file has been de-duplicated. One example method may include receiving a filekey based...
Systems and methods for securing data in the cloud
A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing...
Techniques for security management provisioning at a data storage device
Techniques for a data storage device to locally implement security management functionality. In an embodiment, a security management process of the data storage...
Performing virus scan during decompression of an application installation
Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention...
Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
Selective monitoring of archive and backup storage
Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a...
Security in virtualized computer programs
In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating...
Policy-based secure information disclosure
Systems and methods for storing data and retrieving data from a smart storage device is provided, where smart storage includes processing capabilities along...
System and method for secure mode for processors and memories on multiple
semiconductor dies within a single...
A computing system comprising a processor having a first and second bus (the processor on a first semiconductor die mounted within a semiconductor package), a...
Micro-SD device loaded with a smart card
A Micro-Secure Digital ("SD") device loaded with a smart card that can be issued in bulk and in card form is provided. The device includes: a SD interface...
Data storage device mounting apparatus
A data storage device mounting apparatus includes a base, a securing member, and a cover engaged with the base. The base includes a receiving portion and a...
Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
Apparatus and method of providing medical data based on a handover of a
An apparatus and method are provided for providing medical data based on a handover of a medical sensor. The apparatus includes a medical data client that...
Multi-tier wireless home mesh network with a secure network discovery
An apparatus, system and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless...
Security event data normalization
Normalizing security event data from multiple different network agents. The data from the multiple different agents is categorized and tagged with a descriptor...
Network-extended data storage for mobile applications
Embodiments of the present invention are directed to methods and subsystems directed to increasing the amount of memory accessible to software and hardware...
Printing device capable of authorizing printing limitedly according to
user level, printing system using the...
A printing device which authorizes a printing limitedly according to a user level, a printing system using the same and a printing method thereof. The printing...
Methods for fraud detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
Secure mobile app connection bus
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile...
Systems and methods for secure voice communications
A secure voice solution for a PDA-type device is provided. Voice data is received from the user using the device microphone and built- in media player software...
Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
Method and system for enforcing security policies on network traffic
A computer readable medium that includes computer readable program code embodied therein. The computer readable medium causes the computer system to receive, by...
Secure access to applications behind firewall
A user having remote device wants to access an application executing on an application server computer that is behind a firewall. During set-up, another...
Data exchange technology
A data exchange adaptor that synchronizes data between an enterprise system operated by a company and a cloud-based system operated by a third party other than...
Method for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
Near field communication (NFC) device and method for selectively securing
records in a near field communication...
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
Providing security services on the cloud
Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a...
System and method for implementing a trusted dynamic launch and trusted
platform module (TPM) using secure enclaves
An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a...
Gaming terminal chair electrical interface
Gaming terminals, gaming systems, and electrical and mechanical connector assemblies for coupling a gaming terminal to a chair positioned in front of the gaming...
Method for securely delivering indoor positioning data and applications
Methods and devices are described for providing localized secure navigation in conjunction with near field communication access control systems. In one...
Using network security information to detection transaction fraud
A fraud management system is configured to store rules for detecting fraud. The fraud management system is further configured to receive a transaction involving...
Method for establishing a secure protocol for pairing an RFID tag and
asset monitoring device within a...
The present invention provides a method for automatically pairing a first container monitoring device equipped with a RFID reader and a second container in...
Systems and methods for secure storage on a mobile device
In one embodiment the present invention includes a computer-implemented method for a mobile device. An application security status is detected. When the...
Method and apparatus for inputting data
Embodiments of the present invention provide a method and an apparatus for inputting data. The present invention relates to the communications field and aims to...
Authorization system for heterogeneous enterprise environments
A unified authorization system for an enterprise that includes heterogeneous access control environments is provided. Components in the enterprise utilizing...
Computer relational database method and system having role based access
A computer method, system and apparatus control access to secured data in a plurality of databases. A repository is coupled to the databases and has a security...
Secure and reliable mechanism to provide a single object instance in a
An example system for transmitting data between applications may include an access module that accesses a data object associated with a first application...
Wireless fluid shut-off valve
A low-cost safety valve for gas lines and similar supply lines that can be remotely activated via a secure wireless link employing a low leakage sealing...
Resilient peer network with 802.11 technology
A Wi-Fi Direct Group Owner stores network parameters needed for proper operation of a peer-to-peer network. These include the network name and identifier, the...
Targeted muting for communication between electronic appliances
A method for controlling the flow of data in a near field communication appliance having an interposed element and a plurality of secure elements connected to...
Determining usage predictions and detecting anomalous user activity
through traffic patterns
A system for selecting and monitoring data plans for telecommunications systems, and methods of determining, learning and estimating usage patterns in-order to...
Method and system for delivering SMS (short message service) messages in a
mobile communication system
A method and system for delivering data are provided. The method includes sending, by a User Equipment (UE), to an evolved Node-B (eNB) a service request...
Near field communication security
In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one...
Social network scanning
A method includes identifying data on a social network that is associated with a social entity, and determining one or more characteristics of the identified...
Method, system and computer program product for detecting at least one of
security threats and undesirable...
Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes...