At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Automatic electronic communication system for tracking firearms
This invention provides a system, method and algorithm for automatic electronic communication between a firearm formed with a location tracking system and a...
Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
System and method for authentication and key exchange for a mobile device
via spectrally confined wireless...
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the...
Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Facilitating quality of service and security via functional classification
of devices in networks
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of...
Data analytics and security in social networks
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned...
Prioritizing security findings in a SAST tool based on historical security
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
System and device for consolidating SIM, personal token, and associated
applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
Secure data exchange technique
A technique for the secure exchange of data between multiple entities that use compatible business management systems utilizes serializable data transfer...
Dual layer transport security configuration
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
Multi-level key hierarchy for securing cloud-based data sets
A hierarchy is defined that includes encryption keys associated with different first and second levels of the hierarchy, where the second level includes fewer...
Method and apparatus for authenticating access to a multi-level secure
environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
System and method for securely managing delivery and redemption of
location-based incentives and customer...
A plurality of credentials is retrieved for a user by a computing device, wherein each of the plurality of credentials is associated with a loyalty program. For...
System and method for protecting electronic money transactions
Disclosed are systems and methods for protecting electronic money transactions from fraud and malware. An exemplary method include scanning a computer to detect...
Systems, architecture of the systems, and methods for generating alert message are disclosed. A user enrolls in an alert messaging service. Information that the...
Method and system to facilitate securely processing a payment for an
A computer-implemented method, to facilitate processing a payment for an online transaction, includes, responsive to receiving secure transaction data from a...
Method of securely reading data from a transponder
The invention discloses a method of reading data (dat) from a first transponder (TAG1) into a transceiver (REA). Said (dat) are only transmitted from the first...
Instructions processors, methods, and systems to process secure hash
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
System and method for deploying a form template on multiple platforms
The present embodiments are directed to systems and methods of creating and deploying electronic forms for collecting information from a user using a browser or...
Device side host integrity validation
Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a...
Efficient execution of parallel computer programs
The present invention, known as runspace, relates to the field of computing system management, data processing and data communications, and specifically to...
Configuring a data center
Embodiments of the present disclosure disclose a method and an apparatus for configuring a data center. The method comprises obtaining a function call...
Peer configuration analysis and enforcement
The states or configurations of peer hosts within a host class may be analyzed and enforced by comparing records of the respective systems' states or...
Methods and apparatus to protect memory regions during low-power states
A disclosed example involves managing power states, signing a suspend-to-RAM (STR) data structure by: generating a header key, a scatter/gather table key and a...
Apparatuses for securing program code stored in a non-volatile memory
An embodiment of an apparatus for securing program code stored in a non-volatile memory is introduced. A non-volatile memory contains a first region and a...
Method for selectively performing a secure data erase to ensure timely
A method and computer program product are provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a...
Secure KM switch
A system enabling a computer user to securely share a single set of keyboard and mouse (KM) among multiple isolated computers. The system enables one set of...
System for implementing internet-based games with a core platform, game
modules, and protected game outcome...
An internet gaming system includes a core platform, and a vertical extension functionality configured with the core platform and having a first application...
File sharing with client side encryption
Technology is disclosed herein for sharing encrypted data within a client-server distributed data storage system. According to at least one embodiment, a first...
Shared security utility appliance for secure application and data
A method is disclosed that includes registering an application with a security information technology element (ITE), where the security ITE includes a secure...
System and method for securing use of a portable drive with a computer
Solution for autonomously securing the use of a portable drive with a computer network. A data store is written and maintained that contains entries...
Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
Methods, systems, and devices for detecting and isolating device posing
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
Cyber security monitoring system and method for data center components
A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to...
Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing...