At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Takeover processes in security network integrated with premise security
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
System and method for enabling integrated channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
Apparatus and methods for provisioning subscriber identity data in a
Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access...
System and method for limiting mobile device functionality
The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile...
Role based encryption without key management system
A role based security infrastructure for data encryption that does not require a key management system is provided. For each defined role, a unique key pair is...
Communication control method, mobile communication system and mobile
The present invention is designated to reduce the deterioration of transmission characteristics upon data transmission, even when soft buffer memory for...
Methods and systems for controlling traffic on a communication network
Mechanisms for controlling traffic on a communication network are described. The mechanisms can be implemented, for example, using signaling messages. For...
Modular mass storage system and method therefor
A modular mass storage system and method that enables cableless mounting of ATA and/or similar high speed interface-based mass storage devices in a computer...
Apparatus and method for characterizing a replica tape
An apparatus and method are provided for characterizing a replica tape which has been embossed, compressed or cast on a surface of a material to be measured to...
Data center equipment location and monitoring system
A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and...
Methods and apparatuses to secure data transmission in RFID systems
Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system against eavesdropping, using multiple communication...
Mounting system having a mounting plate with mounting studs and electrical
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
Security element for document of value
A security element is provided for a document of value. The security element includes an array of apertures through at least a portion of the document of value,...
Method for near field communication operation, a device and a system
A method, a user terminal and a system for performing a NFC operation by a NFC equipped user terminal. According to a method a common application residing in a...
Systems and methods for content management in an on demand environment
The technology disclosed relates to hosting legacy data sources in a cloud environment. In particular, it relates to providing users with flyweight access to...
Systems and methods for orchestrating runtime operational integrity
Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration...
Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution,...
Activity signatures and activity replay detection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating activity signatures and detecting activity...
Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of...
Creating a virtual private network (VPN) for a single app on an
internet-enabled device or system
An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or "app") has its own VPN...
Authentication of data communications
Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device...
Methods and systems for replacing shared secrets over networks
A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a...
Web-based security proxy for computing system environment scanning
Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data...
Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
Provisioning layer two network access for mobile devices
In general, techniques are described for provisioning layer two access in computer networks. A network device located in a public network comprising an...
Secure mechanisms to enable mobile device communication with a security
A method of arming or disarming a building security system includes transferring an electronic security credential file from an authorizing environment to a...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Quantifying risk based on relationships and applying protections based on
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are...
Interface for use with a video compression system and method using
differencing and clustering
The disclosure relates to a system and method having a common interface to manage and integrate secure information traversing a network with disparate domains....
Method and apparatus for secure transport and storage of surveillance
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network...
Method for selectively exposing subscriber data
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital...
Sending protected data in a communication network
A method and apparatus for sending protected data from a sender unit to a receiver unit via an intermediate unit. A Transfer Init message that contains a ticket...
Securing information in a cloud computing system
The method and system for secure data (information) inside a cloud computing system, allow data to be encrypted everywhere in the cloud on storage devices and...
Method and apparatus for integrating precise time protocol and media
access control security in network elements
A transmit portion of a network device including a medium access control (MAC) module configured to receive a frame of data to be transmitted from the network...
Systems and methods for searching media content based on an editing file
Various embodiments described herein provide users with a fast and efficient way for identifying scenes for editing purposes. At least one embodiment is a...
Parsimonious protection of sensitive data in enterprise dialog systems
In one embodiment, a method comprises classifying a representation of audio data of a dialog turn in a dialog system to a classification. The method may further...
Invisible mode for mobile phones to facilitate privacy without breaching
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a...
Method for detecting security error in mobile telecommunications system
and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
Method, apparatus, and system for data protection on interface in
A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are...
Association management in a wireless node network
Methods and systems for association management within a wireless node network of nodes and a server are described. A method may identify a first node as a...
System and method providing resilient data transmission via spectral
Systems, methods and apparatus for securely transmitting a data stream by dividing a data stream into a plurality of sub-streams; associating each substream...
Display device and method of driving the same
A display device is disclosed. According to some aspects, the display device includes a display panel for displaying an image, data drivers for supplying data...
Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Security document, security systems and methods of controlling access to a
A security document is provided comprising a first RFID tag readable only within a first range, and a second RFID tag readable within a second range, the first...
Optically readable identification security tag or stamp
The invention relates to a security tag made unique by randomly distributing a mixture of large numbers of multicolored small objects, such as two colored glass...
Secure payment card interface
The invention relates to a smartcard reader, and more particularly, to systems, devices and methods of creating a card input/output interface that allows the...
Sensing and control of a variable valve actuation system
A system for controlling variable valve actuation in an automobile engine is disclosed. A first cam has a first lift profile and a second cam has a second lift...
Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
Systems, methods, and computer readable media for security in profile
Security and distributed storage is described for systems using electronic profile information. Embodiments may be utilized for ID, data, and access analysis....