At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,767,321 |
Setting security features of programmable logic devices Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated... |
US-9,767,320 |
Hardware enforced content protection for graphics processing units This disclosure proposes techniques for graphics processing. In one example, a graphics processing unit (GPU) is configured to access a memory according to one... |
US-9,767,319 |
Method and apparatus of secure authentication for system on chip (SoC) A SoC may be utilized to authenticate access to one or more secure functions. A password may be generated within the SoC which is unique to each SoC instance... |
US-9,767,318 |
Secure controller systems and associated methods thereof Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive... |
US-9,767,317 |
System to provide cryptographic functions to a markup language application A browser includes modules to provide markup language applications with access to cryptographic functions executing in a secure zone. Non-secure operations... |
US-9,767,316 |
Systems and methods for scrubbing confidential data Methods and systems for scrubbing confidential insurance account information are provided. According to embodiments, a scrubbing server can receive a request to... |
US-9,767,315 |
Systems and methods for initiating immediate data erasure on a device A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning... |
US-9,767,314 |
System and method for hosting a social network that enables granular
management of the privacy of posted... A system and method for hosting a social network that enables entities to particularly manage the privacy level of content posted on the social network. This... |
US-9,767,313 |
Method for automated separation and partitioning of data in a payroll and
resource planning system A system for separation of data is provided. The data separation is implemented using a special data structure--a common attribute. The common attribute is a... |
US-9,767,312 |
System and method for integrating a cloud platform environment with an
application server or other environment In accordance with an embodiment, described herein is a system and method for integrating a cloud platform with an application server or other environment, for... |
US-9,767,311 |
Stack isolation by a storage network switch Technology is disclosed for stack isolation in a storage system including a storage network switch and multiple storage sub-systems (e.g., storage stacks). The... |
US-9,767,310 |
Systems and methods for secure data exchange and data tampering prevention Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores... |
US-9,767,309 |
Access control system for implementing access restrictions of regulated
database records while identifying and... A digital targeting system is configured to access data to determine users that satisfy content factors, such as pre-validation criteria, based on user... |
US-9,767,308 |
Custom security policies for multiple objects Techniques to facilitate controlling access to objects associated with an industrial automation environment are disclosed. In at least one implementation, a... |
US-9,767,307 |
Reversible redaction and tokenization computing system A computing system for redacting and/or tokenizing non-public information of electronic documents stored in a database may include a data redaction computing... |
US-9,767,306 |
Secured data storage on a hard drive Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data... |
US-9,767,305 |
Systems and methods for sharing media content with recognized social
connections Systems, methods, and non-transitory computer-readable media can detect a set of images locally stored on a computing system. The computing system can be... |
US-9,767,304 |
Representation of operating system context in a trusted platform module Techniques for representation of operating system context in a trusted platform module are described. In at least some embodiments, authorization principals... |
US-9,767,303 |
Authenticated memory and controller slave Systems and methods that can facilitate the utilization of a memory as a slave to a host are presented. The host and memory can provide authentication... |
US-9,767,302 |
Detecting behavioral patterns and anomalies using activity profiles Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a... |
US-9,767,301 |
Context aware data protection A method, system, and computer usable program product-for context aware data protection are provided. Information about an access context is received in a data... |
US-9,767,300 |
Managing restricted tagged content elements within a published message A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a... |
US-9,767,299 |
Secure cloud data sharing A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key... |
US-9,767,298 |
Information storage device, information processing system, information
processing method, and program There is provided a device and a method for preventing using of illegitimate content or manufacturing of the illegitimate media that uses illegitimate media. In... |
US-9,767,297 |
Secure computing system A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an... |
US-9,767,296 |
Requesting access to restricted objects by a remote computer A method for requesting access rights for an object of a computerized system, comprising invoking in a remote computer linkable to the computerized system an... |
US-9,767,295 |
Content based hardware security module assignment to virtual machines At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module... |
US-9,767,294 |
Intermediate server, database query processing method and program To make it possible to prevent leakage of sensitive information from a database without using a server having both secure operation management and a high... |
US-9,767,293 |
Content based hardware security module assignment to virtual machines At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module... |
US-9,767,292 |
Systems and methods to identify security exploits by generating a type
based self-assembling indirect control... Using various embodiments, methods and systems for computing a self-assembling indirect control flow graph based on one or more function types and function... |
US-9,767,291 |
Systems and methods for security and risk assessment and testing of
applications Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing... |
US-9,767,290 |
Autonomous reasoning system for vulnerability analysis A method of vulnerability analysis of a deployed program (program) includes inputting a binary program under analysis (BPUA) derived from the program. The... |
US-9,767,289 |
Method for generating and executing encrypted BIOS firmware and system
therefor A firmware image is received at an information handling system. A symmetric key is generated and stored at a trusted platform module (TPM). The firmware image... |
US-9,767,288 |
JTAG-based secure BIOS mechanism in a trusted computing system An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), a tamper... |
US-9,767,287 |
Systems, methods, and computer program products for managing data
re-installation Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure... |
US-9,767,286 |
Electronic module for making a message accessible to a targeted operating
system An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device,... |
US-9,767,285 |
Process categorization using crowdsourcing Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for categorizing a process using crowdsourcing are described.... |
US-9,767,284 |
Continuous run-time validation of program execution: a practical approach Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of... |
US-9,767,283 |
System and method to mitigate malicious calls Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the... |
US-9,767,282 |
Offline scan, clean and telemetry using installed antimalware protection
components The subject disclosure relates to antimalware scanning, and more particularly to offline antimalware scanning of a host environment via an alternate, known safe... |
US-9,767,281 |
Device and method for processing data A device for processing data, the device having an input interface for receiving input data and a processing module for processing data, characterized in that... |
US-9,767,280 |
Information processing apparatus, method of controlling the same,
information processing system, and... Startup of a program and generation or change of a program is detected, or a program is searched for. It is determined, based on program information of a... |
US-9,767,278 |
Method and apparatus for detecting irregularities on a device A system and method for the detection of irregularities, such as fraud or malware, running on a device, is disclosed. The system comprises a monitoring program... |
US-9,767,277 |
Detection of fault injections in a random number generator A method for detecting a fault injection in a circuit, wherein a bit pattern is mixed in a bit stream originating from a noise source and the presence of this... |
US-9,767,276 |
Scanning kernel data structure characteristics A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is scanned... |
US-9,767,275 |
Method of enforcing control of access by a device to a secure element, and
corresponding secure element A method of enforcing control of access by a hosting device to a secure element, and a secure element are described. The method includes steps performed by the... |
US-9,767,274 |
Approaches for efficient physical to virtual disk conversion Approaches for providing a guest operating system to a virtual machine. A read-only copy of one or more disk volumes, including a boot volume, is created. A... |
US-9,767,273 |
Reliably terminating processes in a system with confined execution
environments Terminating a process executing within a container is described. An access restriction applicable to the process is temporarily modified with a policy change... |
US-9,767,272 |
Attack Protection for valid gadget control transfers In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a... |
US-9,767,271 |
System and method for validating program execution at run-time A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction... |