At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Automated message transmission prevention based on environment
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
Systems and methods for using transport stream splicing for programming
Apparatus and methods for indicating the identity of a device for receiving and retransmitting programming information. The device, which may be a set-top box...
Systems and methods for providing mobile security based on dynamic
Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security...
Intrusion detection using secure signatures
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way...
Processor and data processing method with non-hierarchical computer
security enhancements for context states
Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a...
Use of data links for aeronautical purposes without compromising safety
A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground...
Adaptive policies and protections for securing financial transaction data
A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a...
Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
Method of performing a secure application in an NFC device
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is...
Dual cookie security system with interlocking validation requirements and
remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value....
System for data flow protection and use control of applications and
portable devices configured by location
The present invention relates to a system for implementing a firewall service on portable devices such as mobile phones, tablets or notebooks, which has changed...
User transparent virtualization method for protecting computer programs
and data from hostile code
A secure computing environment that prevents malicious code from "illegitimately" interacting with programs and data residing on the computing platform. While...
Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to...
Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user...
Method and apparatus for secure communications through a trusted
A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a...
Data capture for secure protocols
This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface...
Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The...
Encapsulation of secure encrypted data in a deployable, secure
communication system allowing benign, secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
Managing security in solid-state devices
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a...
Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
System and method employing an agile network protocol for secure
communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
Internet based data, voice and video alert notification communications
A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create,...
Architectural frameworks, functions and interfaces for relationship
Uniform subject and object oriented data structure adopted in computing device to efficiently store, distribute and process data in a variety of applications....
Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
Encrypting data for storage in a dispersed storage network
A method begins by a dispersed storage (DS) processing module encrypting a plurality of data segments of the data using a plurality of encryption keys to...
Lightweight data transmission mechanism
User plane data is sent between a user device and a network entity within a packet core network via a radio access network. The user device is authenticated to...
Mechanism for previewing secure print jobs
A computer generated method disclosed. The method includes receiving a print job data stream, determining if the print job data stream comprises a secure print...
Biometric security device
The invention relates to a security device (1) comprising at least one authentication device (17) and a locking device (18), which authentication device (17)...
Multi-directional optical reader for a patient support
A patient support apparatus includes a patient support, a multi-directional optical reader, and a control system. The multi-directional optical reader is...
Dispenser assembly for dispensing disinfectant fluid and data collection
and monitoring system for monitoring...
A dispenser assembly for dispensing disinfectant to a user and associated monitoring systems and methods. The dispenser assembly includes a main housing...
System, method, and device for communicating and storing and delivering
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller, executable sensors, and a virtual...
Double sand-boxing for flash library
A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first...
Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
Anti-virus protection system and method thereof
An anti-virus protection system and method including receiving an address of a data server from a user, writing and transmitting a request message including the...
Arrangement and methods for performing malicious data detection and
information leakage prevention
An integrated secured open database connectivity (ODBC) application programming interface (API) arrangement is provided. The arrangement includes a driver...
Resilient device authentication system
A resilient device authentication system comprising: one or more verification authorities (VAs) including a memory loaded with a complete verification set that...
Information transmission method, system and data card
The disclosure provides an information transmission method, system and data card, wherein the method comprises: a sender scrambling original information in a...
Methods and apparatus to detect carrying of a portable audience
Methods and apparatus to detect carrying of a portable audience measurement device are disclosed herein. An example portable audience measurement device...
Collecting debug data in a secure chip implementation
Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of...
Secure memory transaction unit
A method for providing security for plaintext data being transferred between units in a computer system includes steps of dividing a memory into a series of...
Cryptographic system for performing secure iterative computations and
signal processing directly on encrypted...
Disclosed embodiments include a cryptographic system implemented in at least one digital computer with one or more processors or hardware such as FPGAs for...
One time PIN generation
A method and system is provided for generating a one-time passcode (OTP) configured for use as a personal identification number (PIN) for a user account from a...
Multi-factor device authentication
A method and system for the secure delivery of data to a remote device that has been registered and which requires authentication through the use of a...
Hypervisor security using SMM
Methods, systems, apparatuses and program products are disclosed for protecting computers and similar equipment from undesirable occurrences, especially attacks...
TLS abbreviated session identifier protocol
A method, system and computer program product related to an authentication security protocol, which associates a unique Abbreviated Session Identifier (ASI)...
Method and apparatus of communicating security/encryption information to a
physical layer transceiver
An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog...
Reversible write-protection for non-volatile semiconductor memory device
A serial memory device having a non-volatile memory array including a plurality of memory blocks, one or more said plurality of blocks being capable of being...
Transmitting device, transmitting method, receiving device, receiving
method, transmitting/receiving system,...
To enable signal transmission at a high data rate while securing backward compatibility. A source device 110 and a sink device 120 are connected by an HDMI...
Managed peer-to-peer content backup service system and method using
dynamic content dispersal to plural storage...
Systems, method, computer program stored on computer readable media, and business method for providing and operating a distributed network based secure storage...