At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Advanced container security device network protocols
In one preferred embodiment, a set of air interface protocols (AIPs) provides a method for secure wireless-to-IP communication between conveyance-mounted...
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
Wireless architecture in support of voice and data communications
A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals...
Mobile, secure and customizable emergency service gateway system
A mobile, secure and customizable emergency communication gateway system for providing effective electronic data communications for emergency personnel in a...
Security device implementing flow lookup scheme for improved performance
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow to...
Apparatus and methods for network resource allocation
Methods and apparatus for allocating resources (such as communications bandwidth) using a network access device. In one embodiment, the network includes a...
Printing device and printing method generating watermark information
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
Method for a secure non-volatile logging in an active RFID tag of a
process in a tagged article
Prior to logging of a process flags for locking at all addresses of a logging area of a tag are set to state 1 by means of an interrogator. A high limit (h) and...
Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
Access control system
An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage...
Process, device, and system to cap and seal oil and gas in a riser pipe
A containment valve assembly using the upcoming pressures to control the flow of oil/gas through a riser pipe with a stop flow plug positioned within the valve...
Embedded ring oscillator network for integrated circuit security and
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method...
Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently...
Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
Systems and methods for using transport stream splicing for programming
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
Systems and methods for providing mobile security based on dynamic
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
Processor and data processing method with non-hierarchical computer
security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
Use of data links for aeronautical purposes without compromising safety
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
Adaptive policies and protections for securing financial transaction data
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
Method of performing a secure application in an NFC device
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is...
Dual cookie security system with interlocking validation requirements and
remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value....
System for data flow protection and use control of applications and
portable devices configured by location
The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed...
User transparent virtualization method for protecting computer programs
and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to...
Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user...
Method and apparatus for secure communications through a trusted
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a...
Data capture for secure protocols
This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface...
Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The...
Encapsulation of secure encrypted data in a deployable, secure
communication system allowing benign, secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
Managing security in solid-state devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
System and method employing an agile network protocol for secure
communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
Internet based data, voice and video alert notification communications
A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create,...
Architectural frameworks, functions and interfaces for relationship
Uniform subject and object oriented data structure adopted in computing device to efficiently store, distribute and process data in a variety of applications....
Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
Encrypting data for storage in a dispersed storage network
A method begins by a dispersed storage (DS) processing module encrypting a plurality of data segments of the data using a plurality of encryption keys to...
Lightweight data transmission mechanism
User plane data is sent between a user device and a network entity within a packet core network via a radio access network. The user device is authenticated to...
Mechanism for previewing secure print jobs
A computer generated method disclosed. The method includes receiving a print job data stream, determining if the print job data stream comprises a secure print...
Biometric security device
The invention relates to a security device (1) comprising at least one authentication device (17) and a locking device (18), which authentication device (17)...
Multi-directional optical reader for a patient support
A patient support apparatus includes a patient support, a multi-directional optical reader, and a control system. The multi-directional optical reader is...
Dispenser assembly for dispensing disinfectant fluid and data collection
and monitoring system for monitoring...
A dispenser assembly for dispensing disinfectant to a user and associated monitoring systems and methods. The dispenser assembly includes a main housing...
System, method, and device for communicating and storing and delivering
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller, executable sensors, and a virtual...
Double sand-boxing for flash library
A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first...
Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
Anti-virus protection system and method thereof
An anti-virus protection system and method including receiving an address of a data server from a user, writing and transmitting a request message including the...
Arrangement and methods for performing malicious data detection and
information leakage prevention
An integrated secured open database connectivity (ODBC) application programming interface (API) arrangement is provided. The arrangement includes a driver...
Resilient device authentication system
A resilient device authentication system comprising: one or more verification authorities (VAs) including a memory loaded with a complete verification set that...