At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure method of synchronizing cache contents of a mobile browser with a
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
High performance secure data access in a parallel processing system
A mechanism is provided for secure data access in a parallel processing system. A database having two tables is provided. A subset of the tables' primary key...
Method and system for scrubbing information from heap dumps
In production applications that process and transfer secure and sensitive customer data, the heap dump files of these applications, which may be useful for...
System and method for managing replication in an object storage system
An object storage system, such as a content addressed storage system, manages replication of objects across network locations to balance storage space and data...
Claim and progression management
The present invention is a computer implemented method and system for gathering information from a user related to, filing for, and obtaining government...
Methods of operation for plug-in wireless safety device
An aftermarket plug-in safety device that allows a vehicle to communicate with other vehicles or infrastructures in a V2X communications system. The device...
Electronic information and cryptographic key management system
Systems and methods of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through...
Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose...
Content transmitting apparatus for transmitting content with copy control
information, content identification...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
Method of creating non-patterned security elements
Described herein is a method to encode infrared (IR) security watermarks using a named color dictionary within a PDL in a device independent manner. A set of...
Auxiliary user input device
Systems and methods for providing an auxiliary user input device (101, 501, 601) for use with a mobile electronic device (181, 681). The methods involve:...
Mechatronic locking apparatus
The mechatronic locking apparatus comprises a control circuit (4), from which information signals can be transmitted to a control circuit (6) of the lock...
Mount for telemetry receiver
A mount for a telemetry receiver having a data connector and used in conjunction with a cage for housing animals and having at least one wall. The mount...
Securing communications with a pin pad
Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The...
Data security and access tracking in memory
A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the...
System and method for a distributed application of a network security
A widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information...
Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
System and method for performing remote security assessment of firewalled
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
Cyber security in an automotive network
Preventing spoofing in an automotive network includes monitoring, by electronic control unit, data packets on a bus in the automotive network. Upon determining,...
Cooperative intrusion detection ecosystem for IP reputation-based security
An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation...
Mobile devices with inhibited application debugging and methods of
Applications that have the ability to be debugged also provide an access to violate the security of the application. The present invention provides a means to...
Security method of mobile internet protocol based server
A security method in a server-based mobile IP system is provided. Specifically, in the security method, general data is securely exchanged in addition to a...
System and method of selectively applying security measures to data
Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is...
Securing data caches through encryption
Encryption techniques for securing data in a data cache are generally disclosed. Example methods may include one or more of reading the cache to identify data,...
Multi-level data storage
Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be...
Instruction and logic to provide SIMD secure hashing round slice
Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an...
Encryption key transmission with power analysis attack resistance
Methods and mechanisms for transmitting secure data. An apparatus includes a storage device configured to store data intended to be kept secure. Circuitry is...
Digital watermarking for secure transmission between a source component
and a node device
A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The...
Document encryption and decryption
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its...
Method and system to securely migrate and provision virtual machine images
A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is...
Method and system for state machine security device
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
Systems and methods using one time pads during the exchange of
A solution that enables the exchange of information in a secure manner over an insecure text messaging infrastructure provides part of the exchange as...
Secure virtualization environment bootable from an external media device
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment...
System and method for protecting content
A method, computer program product, and computing system for storing an unsecure data portion within a temporary storage device. An indication of a power...
Emergency response center
The present invention is an Emergency Response Center (ERC) which provides a variety of emergency and information functions in public environments. The ERC...
Methods for geotemporal fingerprinting
Records of geotemporal data for a plurality of users from a database associated with on-line and/or mobile cellular activities are used to generate a...
Dynamic pairing system for securing a trusted communication channel
A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a...
Generalized grid security framework
The subject specification comprises a generalized grid security platform (GGSP) that can control power distribution and operations in a power transmission and...
Anticipatory location-based mobile communication media transfer
Methods and systems for anticipatory location-based mobile communication media transfer are disclosed and may include pre-planning communication of information...
Modified messaging server call flow for secured mobile-to-mobile messaging
Systems and techniques are provided for transmitting a secured message from an originating device to a recipient mobile device through a mobile communication...
Mobility device security
The present disclosure provides a system to establish a stable ownership relationship between an online identity and a mobile device. This relationship is...
Method for detecting changes in security level in mobile networks
A system and method for detecting changes in security level of mobile networks. The system can be used with any mobile devices having a network module or a...
Methods and apparatuses for reducing the nonvolatile memory used to
support application identifier routing in...
The present application presents example data routing methods and apparatuses for reducing the amount of nonvolatile memory required to store secure element...
Dynamically provisioning middleboxes
Hybrid security architecture (HSA) provides a platform for middlebox traversal in the network. The HSA decouples the middlebox control from network forwarding....
Method and apparatus for multiplexing a host identity protocol security
Embodiments of the present invention relate to the field of security channel multiplexing, and disclose a method and an apparatus for multiplexing a HIP...
Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
Meteorology and oceanography geospatial analysis toolset
System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing...
System and method for home automation and security
A home automation and security system is provided in which a home automation and security controller in a customer premises is coupled with a remotely located...
Secure smartphone-operated gun trigger lock
A gun trigger-looking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
Connection device authentication
A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus...