At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Payment transaction processing using out of band authentication
Systems, apparatuses, and methods for increasing the security of electronic payment transactions, such as eCommerce transactions conducted over the Internet. A...
Analyzing security compliance within a network
A security policy database identifies the intended security policies within a network, a traffic generator provides test traffic that is configured to test each...
System and method of real-time change propagation and activation using a
distributed object cache
Embodiments of the invention provide systems and methods for using a distributed object cache to propagate and activate changes to security information across...
System and method for compressing secure E-mail for exchange with a mobile
data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
Method and apparatus for performing security communication
Provided is a method of performing secured communication. In the method, a secured communication request for performing secured communication is received from...
Method for ensuring security and privacy in a wireless cognitive network
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management...
Enabling/disabling display data channel access to enable/disable
high-bandwidth digital content protection
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from...
Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted...
Memory management method and computer
A memory management method is provided to manage a memory in which areas of a garbage collected Java heap memory and a non-garbage collected external heap...
Multi-bus architecture for mass storage system-on-chip controllers
Systems and methods that can facilitate an expedient and efficient transfer of data between memory components (e.g., flash memory) and host components (e.g.,...
Dynamic network link acceleration for network including wireless
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
Remote access to resources
The invention provides systems and for securely transmitting data between a roaming computer and a managed network service over a shared public network. A...
Prevention of eavesdropping type of attack in hybrid communication system
Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a...
Method and apparatus to enable use of motion to associate devices
A method and apparatus to provide easier pairing based on motion data is described. The method of associating two devices comprises receiving a signal to enter...
Storing secure information using hash techniques
Sensitive information is hashed using a hash key, salting key and additional logic. Upon receiving a credit card authorization request with a credit card number...
Security system with two-way communication and video
A security system has a camera; a sensor generating a signal in response to a triggering event, and a management module. The triggering event is one of an...
Method and apparatus for providing conditional access based on channel
A first network device may discover one or more values of one or more parameters corresponding to a plurality of links and/or devices of the network. The first...
Wire-array pressure and movement sensor
A multilayer wire array having an upper layer having a series wires arranged in an equally spaced, parallel relationship and a series of internal layers located...
Object detection method
A dummy target is set in a direction which is the same direction as that of a detected target and at the position whose distance is double that of the detected...
Device and system for electronic access control and surveillance
Described is a device for electronic access control (EAC) and surveillance. The device includes an EAC module and an imager integrated in a single unit. The EAC...
Self-modifying FPGA for anti-tamper applications
A self-modifying FPGA system includes an FPGA and a configuration memory coupled to the FPGA for providing the FPGA with configuration data including SAFE...
Secure point of sale presentation of a barcode at an information handling
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
Banking system controlled responsive to data bearing records
An automated banking machine operates using data read from user cards. The machine is operative to transfer funds in accounts. The machine includes a user...
Secure smartphone-operated gun trigger lock
A battery-powered trigger-locking device, which is configured to be disposed on a gun with a trigger for firing, includes a data receiver, a data memory and a...
Resource management and security system
A system to address resource management and security in a computer system may include an operating system kernel executing on a computer processor. The system...
Security systems and methods to reduce data leaks in enterprise networks
Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is...
Security through metadata orchestrators
A method of obtaining a service from a second cloud domain, the method being performed by a first cloud domain, includes identifying the second cloud domain...
Securing data using integrated host-based data loss agent with encryption
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization...
System for detecting vulnerabilities in applications using client-side
An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using...
Method and apparatus for predicting the impact of security incidents in
Systems or methods gathers information within a network of computers regarding the distribution of documents to calculate the impact of a cyber security...
Cross-VM network filtering
A security virtual machine inspects all data traffic between other virtual machines on a virtualization platform in order to prevent an inter-VM attack. Data...
System and method for secure control of resources of wireless mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Secure remote access public communication environment
A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is...
Dynamic insertion of service specific privacy proxy elements
A method for providing security for mobile device users, comprising a data service node receiving from a first device a first message directed to a web...
System and method for pool-based identity generation and use for service
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment...
Method for accessing a plurality of services by a mobile terminal user,
and related secure device
A method for enabling the user of at least one mobile terminal to access a plurality of services, includes: creating (E1) a user account containing user...
Method of securing access to a proximity communication module in a mobile
A method of securing access to a near-field communication module (30) included in a terminal (10) comprising a security device (20) adapted to be blocked...
Integrated system for electronic tracking and control of documents
Systems and methods are provided for electronic tracking and control of secure test documents. One aspect of the present subject matter is a method for...
Render service for remote access to applications
The present disclosure relates to providing remote access to applications with an increased level of security. A server for providing access to applications is...
Content transmission security protection device system and method
The invention relates to information security technologies, provides a content security transmission device and a content security transmission system which...
Split key secure access system
The present invention is a secure access system whereby the key that facilitates entrance to electronic data is split into at least two segments. Electronic...
System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
Method and device for accessing files of a secure file server
A method and a device are provided for accessing data files of a secure file server, wherein a user or a process is authenticated; wherein access to the data...
Secure redacted document access
Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for...
Hardening tokenization security and key rotation
A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is...
Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
Secure boot method for executing a software component including updating a
current integrity measurement based...
A method for executing a predetermined software component which is verifiable against integrity measurements, the method including (i) providing a first mapping...
Clearing secure system resources in a computing device
Systems and methods of clearing system resources are disclosed. One example method includes the step of detecting a failure to clear a secure portion of a...