At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
Security communication apparatus and security communication method
A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network...
System and method for intelligent coordination of host and guest intrusion
prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is...
IF-MAP provisioning of resources and services
A method may include receiving a request from an endpoint to access a network; granting access to the network; and subscribing to an IF-MAP server for updates...
Management and delivery of profile data
Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one...
Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help...
Image forming apparatus to restrict use of a hard disc drive and a method
An image forming apparatus capable of restricting use of a hard disc drive and a method of restricting the use of the hard disc drive of the image forming...
Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon...
Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to...
Public cloud data at rest security
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service....
Speed up secure hash algorithm (SHA) using single instruction multiple
data (SIMD) architectures
A processing apparatus comprises logic to, according to a selected secure hash algorithm (SHA) algorithm, generate hash values by preparing message schedules...
Speed up secure hash algorithm (SHA) using single instruction multiple
data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of...
Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of...
Method and apparatus for secure scan of data storage device from remote
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include...
System and method for cognizant transport layer security (CTLS)
A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic...
Onboard access control system for communication from the open domain to
the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end...
Secure identity and personal information storage and transfer
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with...
Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the...
Method and device for utilizing application-level prior knowledge for
selectively storing data in higher...
A method for selectively storing data identified by a software application in higher performance media may include executing control programming for an...
Device and method for facilitating secure communications over a cellular
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device...
Secure data transfer in a virtual environment
In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context...
System and method for providing an enterprise deployment topology with
thick client functionality
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to...
Multi-modality, multi-resource, information integration environment
A multi-modality, multi-resource, information integration environment system is disclosed that comprises: (a) at least one computer readable medium capable of...
Ensuring integrity of security event log upon download and delete
A cloud deployment appliance includes a mechanism to enable permitted users to move event records reliably from an internal event log of the appliance to a data...
Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface...
Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is...
Systems and methods for regulating the receipt of data transmitted from a
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a...
Method and apparatus for auxiliary communications with mobile
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden...
Master key generation and distribution for storage area network devices
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation...
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
Advanced container security device network protocols
In one preferred embodiment, a set of air interface protocols (AIPs) provides a method for secure wireless-to-IP communication between conveyance-mounted...
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
Wireless architecture in support of voice and data communications
A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals...
Mobile, secure and customizable emergency service gateway system
A mobile, secure and customizable emergency communication gateway system for providing effective electronic data communications for emergency personnel in a...
Security device implementing flow lookup scheme for improved performance
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow to...
Apparatus and methods for network resource allocation
Methods and apparatus for allocating resources (such as communications bandwidth) using a network access device. In one embodiment, the network includes a...
Printing device and printing method generating watermark information
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
Method for a secure non-volatile logging in an active RFID tag of a
process in a tagged article
Prior to logging of a process flags for locking at all addresses of a logging area of a tag are set to state 1 by means of an interrogator. A high limit (h) and...
Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
Access control system
An access controlled storage device may include multiple doors, each having a different lock, to insure safety and security of the contents of the storage...
Process, device, and system to cap and seal oil and gas in a riser pipe
A containment valve assembly using the upcoming pressures to control the flow of oil/gas through a riser pipe with a stop flow plug positioned within the valve...
Embedded ring oscillator network for integrated circuit security and
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method...
Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently...
Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
Systems and methods for using transport stream splicing for programming
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
Systems and methods for providing mobile security based on dynamic
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
Processor and data processing method with non-hierarchical computer
security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
Use of data links for aeronautical purposes without compromising safety
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
Adaptive policies and protections for securing financial transaction data
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...