At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
QOS-based communications on a work machine
A system to provide reliable and secure communication between a work machine and one or more remote entities using a communication network may include a work...
Method for securing a piloting system of a reconfigurable multi-unit
vehicle and a secure piloting system
A method for securing a control system and a secured control system of a multi-unit vehicle. The control system has a device for determining a composition of...
Apparatus and method for controlling a wave field synthesis renderer means
with audio objects
An apparatus for controlling a wave field synthesis renderer with audio objects includes a provider for providing a scene description, wherein the scene...
Internet security updates via mobile phone videos
Information relevant to internet security is received at a data center server. Such information, for example, a network intrusion alert or details on a recent...
Image processing device, image processing method, and image processing
An image processing device specifies the number of pixels m for securing a delay time for preventing an error diffusion process from being performed at pixels...
Method and system for establishing secure connection between stations
A method and system for establishing a secure connection between stations are disclosed. The method includes that: 1) a switch device receives an inter-station...
System for securing access to data streams
A method for protecting digital content is described. The method includes receiving compressed encrypted digital content, determining an output format based, at...
System and method for interleaving information into slices of a data
packet, differentially encrypting the...
Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different...
Method for maintaining differentiated services data flow at a network
device implementing redundant packet...
An improved method is described for providing Differentiated Services (Diffserv) traffic to a node in a network that implements a security method that discards...
Information processing apparatus, information processing method, and
information processing program protecting...
An information processing apparatus includes a generation unit configured, in extracting an object from an input document, to generate object data including a...
Wireless video surveillance system and method with two-way locking of
input capture devices
A method for locking communication between at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another...
Methods and systems to remotely issue proximity payment devices
Pursuant to some embodiments, methods, apparatus, systems, devices, and means for issuing a payment device from a remote dispensing device are provided which...
Apparatus and method for POS processing
An apparatus and method for configuring, altering, controlling, securing, and extending the processing capability and functionality of PCs and POS devices using...
Implementing data theft prevention
A method and circuit for implementing data theft prevention, and a design structure on which the subject circuit resides are provided. A polymeric resin...
System for managing computer data security through portable data access
A secure data storage system for controlling access having a data user facility, a data owner facility and a data storage facility, wherein a third party data...
Secure distribution of media data
A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version...
Hybrid media distribution with enhanced security
A method for use in playing content that is made up of data includes establishing in a device a physical media storing a first portion of the data making up the...
Pinpointing security vulnerabilities in computer software applications
A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build...
System and method for providing identity theft security
A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures,...
Blacklisting and whitelisting of security-related events
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
Security-activated operational components
Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited...
Securing and authenticating multiple devices behind a NAT device
Apparatus, methods, and other embodiments associated with securing and authenticating multiple devices behind a network address translation (NAT) device are...
Facilitating protection of a maintenance entity group
According to one embodiment, maintenance points of a maintenance entity group are identified. The maintenance points comprise end points and intermediate...
Methods, apparatus and systems for providing and monitoring secure
information via multiple authorized channels...
Display of and access to secure user-centric information via the construct of a channel grid framework serving as a desktop on a user device. Multiple...
Secure system and method for audio processing
A method and system for playing movies with object-based sound complying with industry security standards using less processing power than the prior art,...
Achieving strong cryptographic correlation between higher level semantic
units and lower level components in a...
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage...
Dispersed secure data storage and retrieval
A computer-implemented method that includes secure storage and retrieval of data is described herein.
Apparatus for controlling embedded security on a storage platform
A method of securely operating a computerized system includes forming a connection to a user-removable physical security device (PSD) which is uniquely paired...
Enhanced system security
Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data...
Secure read-write storage device
A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller...
Digital rights management handler and related methods
A system and method of providing universal digital rights management system protection is described. One feature of the invention concerns systems and methods...
Integrated circuit with restricted data access
A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a...
Secure transfer and tracking of data using removable non-volatile memory
A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark...
Method and device for confirming authenticity of a public key
infrastructure (PKI) transaction event
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a...
Secure data exchange based on request destination
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
Method and device for integrating multiple threat security services
A method and device for integrating multiple threat security services are disclosed. The method may comprise parsing an incoming packet at a current layer and...
System and method for surely but conveniently causing reset of a
Enhanced reset logic is included in a user's computerized device so that the device owner (e.g., the user's employer) can assure prompt reset (e.g., to insure...
Secure local boot using third party data store (3PDS) based ISO image
In some embodiments, the invention involves a method and apparatus for secure/authenticated local boot of a host operating system on a computing platform using...
System and method for enabling channel promotions in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
Decentralized multi-user online environment
Protocols for facilitating a peer-to-peer real time network in which network state information and data processing is delegated to user nodes. A virtual space...
Method and system for securely capturing workloads at a live network for
replaying at a test network
Methods and system for securely capturing workloads at a live network for replaying at a test network. The disclosed system captures file system states and...
System and method for securely authorizing and distributing stored-value
A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows...
Wire speed monitoring and control of electronic financial transactions
An in-line hardware message filter device inspects incoming securities transactions. The invention is implemented as an integrated circuit (IC) device which...
System and method for executing strategy security trading
A computer implemented method and system for executing block trades for a security includes steps or devices for receiving a block trade request, at a computer...
Audio-equipped transaction card systems and approaches
Approaches for implementing transactions involve audio-equipped transaction cards that reduce both data-management and costs. Certain applications facilitate...
Online engineering tool system for specifying the various components of a
Computerized online engineering tool system for specifying the various components of a holdown system that assemble a run comprising a tie rod in a frame wall...
Proximity access and alarm apparatus
A method and system for securing portable electronic devices as well as data stored on them are described. A framework for implementing such method is described.
System and method for establishing secure communications between
transceivers in undersea optical communication...
In general, a system and method provides secure communications between optical transceivers in an optical communication system. Two or more optical transceivers...
Method of authenticating security marker
A method for authenticating security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a...
Substitute check incorporating encoded indication of security feature in
A method includes scanning a check to generate image data representative of an image of the check. The method further includes detecting at least one security...