At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for robotic launch and capture of a UAV
An apparatus and system for launching and/or capturing an unmanned aerial vehicle (UAV). The apparatus includes a moving substrate having an electromagnetic end...
Long-range electronic identification system
An identification system is provided employing tags which may be targeted by a coherent energy beam such as a laser emanating from a query device controlled by...
Techniques for securing PDCP control PDU
Techniques are described herein to secure a packet data convergence protocol (PDCP) control protocol data unit (PDU). A base station may determine a security...
A method of performing network handover between wireless local area network devices for a mobile device connected to a voice service via a secure data tunnel to...
Method and system for authenticating a user
The invention relates to a method and system for authenticating a user, wherein an application transmits a query comprising identification data to an...
System and method for communicating digital data using media content
The embodiments herein disclose an apparatus and method especially developed for the direct application in transmission involving user devices with some...
Image encryption through dynamic compression code words
Embodiments of a system and method for secure processing of image data are described. Image data included in image files may be encrypted and compressed in a...
A method of data nibble-histogram compression can include determining a first amount of space freed by compressing the input data using a first compression...
Secure network access to medical device
A method of improving network access security on a medical device includes opening a communication port on the medical device to establish a communication...
Web-cloud hosted unified physical security system
A system comprises a web-cloud security subsystem that hosts, manages, and analyzes data related to a plurality of hosted applications that provide at least one...
Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
Dynamic record identification and analysis computer system with event
Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. A...
Communications bus signal fingerprinting
Methods are provided herein for communications bus signal fingerprinting. A security module monitors a plurality of voltage lines of at least one electronic...
Information flow enforcement for multilevel secure systems
A multilevel security fabric with address management units communicatively coupled to ports of a communication fabric and nodes of a multilevel security system...
On-demand network security system
An on-demand virtual security system between a client and a server in communication with a network, the system including an orchestrator, wherein upon receiving...
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
Homomorphic encryption in a healthcare network environment, system and
A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network...
Systems and methods for providing multi-level network security
Systems and methods for providing network security include receiving, by a first server of a first network, data having a destination of a second network;...
Delegated access control of an enterprise network
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a...
Internet of things configuration method and system for secure
low-power-consumption proxy device
An IoT configuration method and system for secure low power consumption proxy devices, the method comprising: registering an intelligent terminal and securely...
Broadcast resource congestion control method and apparatus for use in
wireless communication system
The present invention relates to a communication technology and system converging the fifth generation (5G) communication system for supporting a data rate...
User authentication with self-signed certificate and identity verification
In embodiments, an authentication server interfaces between a user device with a self-signed certificate and a verifying computer that accepts a user name and...
Protecting data in a multi-tenant cloud-based system
Methods and apparatus, including computer program products, are provided for securing data in a multi-tenant cloud-based system. In some implementations, there...
Secure data communication
Methods and systems for transmitting data are described. A random data stream is generated. A data stream is generated comprising the random data stream and...
Managing key encryption keys using a key wrapping tree
Methods and systems for securely deleting electronic files and other data stored within a data storage system are described. Each file or separately deletable...
Method and system for securely replicating encrypted deduplicated storages
A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and...
Method and device for transmitting and receiving channel state information
in mobile communication system
Disclosed are: a communication technique for merging, with the Internet of Things (IoT) technology, a 5th-generation (5G) communication system for supporting a...
Vector magnetic tamper detection for sensors
A magnetometer sensor that detects tampering is described. The sensor samples magnetometer data and computes a set of vectors based on the magnetometer data....
Authentication based on through-body signals
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical...
Method and system for access control
The present disclosure generally relates to a computerized method comprising: communicating access details of the facility from the mobile device to the...
Virtualization and secure processing of data
Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the...
Officially authorized virtual identification cards
A system that allows users to display valid identification via a mobile device. Authentic and valid IDs and secure folders are verified by a certificate...
Methods and systems for secure online payment
A secure online payment system in which, upon initiation by a card holder of a payment operation to an online merchant, the card holder is directed to a...
Systems and methods for digital workflow and communication
Systems and methods for authoring and performing procedural workflows, and engaging in multimedia communication, remote assistance, training, data entry,...
Secure training of multi-party deep neural network
A deep neural network may be trained on the data of one or more entities, also know as Alices. An outside computing entity, also known as a Bob, may assist in...
Configurable integrity protected link for secure accelerator communication
Systems, methods, and apparatuses associated with data exchanged between a processor and a hardware accelerator are disclosed. In various embodiments, a method...
Security data diode
A controller area network (CAN) controller and transceiver device implementing an output CAN network as a mirror of an adjacent connected input CAN network, the...
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected...
Anti-rollback version upgrade in secured memory chip
A secured storage system includes a non-volatile memory and a controller. The non-volatile memory is configured to store a first data item and a respective...
Secure micro-service data and service provisioning for IoT platforms
A computer-implemented method for context-based, fine-grained data access control to microservice data is provided. The method may include retrieving a sensor...
Secure data sharing in a multi-tenant database system
Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. A method includes...
Secure cloud storage system
Disclosed herein are system, method, and computer program product embodiments for a secured cloud storage system. An embodiment operates by receiving a...
Support for increased number of concurrent keys within multi-key
A server includes a processor core including system memory, and a cryptographic engine storing a key data structure. The data structure is to store multiple...
Vulnerability risk mitigation platform apparatuses, methods and systems
The VULNERABILITY RISK MITIGATION PLATFORM APPARATUSES, METHODS AND SYSTEMS ("VRMP") transforms vulnerability risk info request, malware correlation analysis...
Non-transitory computer readable medium for creating a virtual machine
Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a...
Security stack for embedded systems
A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader...
Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
Methods for configuring security restrictions of a data processing system
According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received from...
Extracting web API endpoint data from source code to identify potential
Embodiments disclosed herein are related to computing systems, and methods for extracting web API endpoint data from source code. Source code for various web...