At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for protecting security of the third layer mobility user
plane data in NGN
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing...
Backup apparatus, backup method and computer-readable recording medium in
or on which backup program is recorded
Upon production of a backup of a first generation, all of an operation volume is stored. However, upon production of a backup of a second or later generation,...
Scalable network apparatus for content based switching or validation
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
Method and system for secure digital file sharing
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
Multi-way transaction related data exchange apparatus and methods
Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a...
Vehicle collision shield
In the present disclosure, systems and methods for preventing collisions between a ground services vehicle and other objects are described. In one embodiment, a...
System and method for speeding call originations to a variety of devices
using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
Method of personalizing a NFC chipset
The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a...
Method and system for the secure distribution of audiovisual data by
A process for distributing a marked audiovisual sequence from a nominal audiovisual sequence towards a receiver, said nominal audiovisual sequence having a...
Generating a session key for authentication and secure data transfer
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner,...
Device management in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Video recording system, method, and computer program for memory space
distribution in a video recording system
In the present digital age, the storage of data and the administration of the stored data is a problem area which, despite rapidly dropping prices for storage...
Method and system for the secure detection of an RFID electronic tag
The invention relates to a method and a system for the secure detection of an RFID electronic tag (ET1). This detection system comprises a read/write station...
Protecting data from decryption from power signature analysis in secure
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
System for generating an incrementally completed 3D security mark
A system (10) for generating an incrementally completed 3D security mark (20''') includes a computer-readable medium encoded with a computer program. The...
Data recording device
Security filter for context-based data gravity wells
A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled...
Automatic synthesis of unit tests for security testing
Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities...
Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the...
System and method of securely processing lawfully intercepted network
A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and...
Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
Security communication apparatus and security communication method
A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network...
System and method for intelligent coordination of host and guest intrusion
prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is...
IF-MAP provisioning of resources and services
A method may include receiving a request from an endpoint to access a network; granting access to the network; and subscribing to an IF-MAP server for updates...
Management and delivery of profile data
Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one...
Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
Image forming apparatus to restrict use of a hard disc drive and a method
An image forming apparatus capable of restricting use of a hard disc drive and a method of restricting the use of the hard disc drive of the image forming...
Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon...
Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to...
Public cloud data at rest security
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service....
Speed up secure hash algorithm (SHA) using single instruction multiple
data (SIMD) architectures
A processing apparatus comprises logic to, according to a selected secure hash algorithm (SHA) algorithm, generate hash values by preparing message schedules...
Speed up secure hash algorithm (SHA) using single instruction multiple
data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of...
Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of...
Method and apparatus for secure scan of data storage device from remote
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include...
System and method for cognizant transport layer security (CTLS)
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic...
Onboard access control system for communication from the open domain to
the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end...
Secure identity and personal information storage and transfer
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with...
Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the...
Method and device for utilizing application-level prior knowledge for
selectively storing data in higher...
A method for selectively storing data identified by a software application in higher performance media may include executing control programming for an...
Device and method for facilitating secure communications over a cellular
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
Secure data transfer in a virtual environment
In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context...
System and method for providing an enterprise deployment topology with
thick client functionality
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to...
Multi-modality, multi-resource, information integration environment
A multi-modality, multi-resource, information integration environment system is disclosed that comprises: (a) at least one computer readable medium capable of...
Ensuring integrity of security event log upon download and delete
A cloud deployment appliance includes a mechanism to enable permitted users to move event records reliably from an internal event log of the appliance to a data...
Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface...
Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is...
Systems and methods for regulating the receipt of data transmitted from a
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a...
Method and apparatus for auxiliary communications with mobile
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden...
Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...