At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Time-varying security code for enabling authorizations and other uses of
A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the...
Hardware access and monitoring control
Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies...
Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
Implementing conductive microcapsule rupture to generate a tamper event
for data theft prevention
A method and circuit for implementing conductive microcapsule rupture to generate a tamper event for data theft prevention, and a design structure on which the...
Microprocessor having a secure execution mode with provisions for
monitoring, indicating, and managing security...
An apparatus including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application...
Assured pipeline threat detection
Devices, methods, and systems for assured pipeline threat detection are described herein. One method for assured pipeline threat detection includes receiving a...
Security method for detecting intrusions that exploit misinterpretation of
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by scanning an...
Security capability reference model for goal-based gap analysis
Gap analysis is performed on security capabilities of a computer system compared to a desired or targeted security model according to one or more security...
Systems and methods for secure and efficient enrollment into a federation
which utilizes a biometric repository
A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method...
Method and system for providing security data to security stations
There is provided a system and method of selectively directing collected security data that may be displayed concurrently at a first security station and at a...
Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
Method for securing data and/or applications in a cloud computing
A method for securing data and/or applications within a cloud computing architecture is provided. According to the invention, a security module is provided, the...
Network security monitor apparatus and network security monitor system
A network security monitoring apparatus and a network security monitoring system manages "permitted" or "not permitted" communication between nodes based on an...
Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code. The method includes obtaining identification of a code block...
Secure storage of protected data in a wireless communication device
A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to...
Support for secure objects in a computer system
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected...
Assessing risk associated with a computer technology
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a...
Protection method, decryption method, recording medium and terminal for
said protection method
Protecting data transmission, either multimedia or a control word, between a security processor and a terminal includes, at the security processor, building a...
Method and processing unit for secure processing of access controlled
A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word...
Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
Distribution system and method for distributing digital information
A distribution system and method for distributing digital information is provided, which has high recoverability from a security breach. The distribution system...
Remote access to a mass memory and a security memory in a portable
The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the...
Method and device for performing communication on a bus structured network
The invention refers to a method for performing communication on a bus structured network between master device and slave devices using a bi-directional data...
Relevancy improvement through targeting of information based on data
gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
Network message generation for automated authentication
A message generation mechanism for a network interface is provided. The message generation mechanism is operable to generate a message which includes data for...
Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
Supplying data storage services
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each...
System, method and apparatus for traffic mirror setup, service and
security in communication networks
The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be...
Controlling data routing in integrated security systems
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
Systems and methods for performing authentication of a customer
interacting with a banking platform
The invention provides systems and methods of authenticating a customer device, in conjunction with a requested interaction, the customer device associated with...
Modular object and host matching
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
Personal event data recorder
A personal event data recorder (PEDR) is provided. The PEDR may be integrated within a mobile communications device or may be provided as a separate add-on...
Method for a secure detach procedure in a radio telecommunications network
The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for...
Method and apparatus for tracking a transported item while accommodating
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
Secure data exchange with identity information exchange
Systems and methods for authenticating authorized users of electronic communication devices, such mobile communication devices, for a secure data exchange...
Wavelength sensing lighting system and associated methods for national
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
Method of providing security for transmitting a digital medical image
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible...
Cryptographic security functions based on anticipated changes in dynamic
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
Distributable, scalable, pluggable conferencing architecture
Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the...
Dynamic information radio-frequency identification (RFID) card with
Embodiments of the present invention implement dynamic elements within a RFID card. Specifically, the embodiments update card information dynamically, using a...
Methods and apparatus for securing a portable device
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding...
Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an...
Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and...
Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored...
Methods and systems for internet protocol (IP) packet header collection
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The...
Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...