At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Microprocessor controlled security tag
A microprocessor controlled security tag and accompanying security system is described. The tag generally includes a housing having external contacts to...
Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
Electronic device with bezel assembly
A bezel assembly includes a panel, a shielding member, and a securing member. The panel includes a main body. The main body defines a through hole and a first...
System, method and computer program product for facilitating secure
A secure financial transactions system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Banking system controlled responsive to data bearing records and user
input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
System and method for securing data to be protected of a piece of
A system and method for securing data to be protected of a piece of equipment are provided. The equipment comprises: a space; at least one device for processing...
Cross-domain security for data vault
A secure database appliance leverages database security in a consistent framework provides consistent, flexible, and adaptable security using mandatory access...
System and method for monitoring and securing a baseboard management
In certain embodiments, a method for monitoring and securing a baseboard management processor is provided. The method includes coupling to a baseboard...
Smartphone security system
System for protecting a mobile device against malware or harmful communications via calls and SMSs. A security module for a personal mobile device protects the...
Method and apparatus for exchanging data between a user equipment and a
core network via a security gateway
The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention...
Method and system for securing data from an external network to a non
point of sale device
A data control system allows non-point of sale devices (135, 155) on the LAN to receive data from an external network (160) when established conditions are met....
Method of operating an item of on-board equipment, associated equipment
and aircraft comprising such equipment
Equipment items installed on board vehicles and more particularly to a method for operating such an on-board equipment item, the method including an on-board...
Re-authentication in secure web service conversations
Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations...
Method and system for improving security of the key device
The present invention provides a method and a system for improving security of a key device in the information security filed. In order to solve the problem...
Non-symbolic data system for the automated completion of forms
A system and method for paper-based, automated completion of forms allows a user charged with filling out multiple forms containing some common information to...
Data processing apparatus and method for analysing transient faults
occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
Data communication method, computer and information storing medium
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at...
Methods and apparatus for secure data sharing
This disclosure relates to methods and apparatus for securely and easily sharing data over a communications network. As communications services on a...
Security system for handheld wireless devices using time-variable
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
Secure acknowledgment device for one-way data transfer system
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash...
Information processing device, information processing method, information
processing program, and integrated...
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment...
Method and system for hardware-based security of object references
A method for managing data, including obtaining a first instruction for moving a first data item from a first source to a first destination, determining a data...
Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
Security in a geo-spatial environment
A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the...
Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a...
Inertial sensor calibration method for vehicles and device therefor
An inertial sensor calibration method has steps of mounting an observer device and an inertial sensor of a vehicle carrying on an inertial move, acquiring...
System of automated document processing
A system is proposed for automated document processing, comprising a document, consisting of two sections--a main section, containing data in printed character...
System and method for providing voice communications over a multi-level
According to one embodiment, a communication network includes an analog voice bridge coupled to two secure network domains that each have a differing security...
Systems, methods, and apparatus for monitoring and alerting on large
sensory data sets for improved safety,...
The present invention is a process monitoring method, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the...
Structure for railroad ties having data acquisition, processing and
An encapsulated railroad tie structure and its method of manufacture. A core of laminated wood slats is inserted into an extruded sleeve of scrap tire rubber...
Varnish printing document securing system and method
A paper and document securing system that includes an indicator is used to for validating the paper. The indicator may be printed on a surface of the paper by a...
Techniques for providing security using a mobile wireless communications
device having data loss prevention...
A technique provides wireless communications security. The technique involves providing a mobile wireless communications apparatus (e.g., a smart phone) having...
Cyber security analyzer
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values...
Flow data for security intrusion detection
Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing...
Methods, devices, systems, and computer program products for edge driven
communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
Methods, systems and devices for the detection and prevention of malware
within a network
Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically...
Trusted path, authentication and data security
In some embodiments, techniques for computer security comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field...
Secure computer use system
Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how...
Dynamic threat protection in mobile networks
In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management...
Methods and systems for application rendering and management on internet
television enabled displays
Computer implemented methods for managing communication between a display device and a remote server or services is provided. A remote server provides access to...
Securing backing storage data passed through a network
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing...
Tamper resistant memory protection
Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing...
Method and system for a recursive security protocol for digital copyright
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with...
Secured critical information storage and transaction
An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted...
Method for the access of the mobile terminal to the WLAN and for the data
communication via the wireless link...
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication...
Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...