At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for secure content routing
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier...
Network security smart load balancing
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g....
System and method for establishing a virtual private network
A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication...
Method and system for secure data storage
A method and system for secure data storage and retrieval is provided. A sequence of data units is divided into multiple subsets of data units corresponding to...
Secure online transaction processing
Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials...
Fair value model based system, method, and computer program product for
valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering...
A linear actuator comprises a reversible electric motor (2) which, via a transmission, is capable of driving a spindle (4) having a spindle nut (5) secured...
Methods for network selection and discovery of service information in
public wireless hotspots
A roaming information code which can be wirelessly or otherwise transmitted as a SSID or other data field(s) of a wireless technology or standard. Further, a...
Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
Carrier and subcarrier hopping for optical OFDM security
Methods and systems for secure communication include assigning data streams to respective orthogonal sub-carriers according to random number information at a...
Disclosed is a method in a provisioning apparatus. The method comprises obtaining a family key, a family key defining a family; submitting the family key to a...
Security service control method and wireless local area network terminal
A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the...
System and method of security function activation for a mobile electronic
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation...
Broadcast encryption based security system
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The...
Method for secure distribution of digital data representing a multimedia
A content server maintains a database of different content files, these files being scrambled by control words that are stored in a database. The control words...
Method for etching and secure distribution of digital data, access device
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a...
Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
Smart home hub
The present invention provides a method and device for an integrated smart hub. The method and device for an integrated smart hub provides for a simultaneously...
Mobile computer stand with integrated keyboard
A device for use with a portable computer includes a base, a stand having an upper portion and an adjustable linkage, and a connection mechanism. The base is...
Information processing apparatus and memory management technique for
secure print data
State information about whether a printing apparatus can store print data for confidential printing is acquired. When the print data can be stored, secure...
Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
Graphical authentication for a portable device and methods for use
A portable device includes a touch screen that includes a display screen and that generates touch screen data in response to a user's interaction with the touch...
Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
Secure terminal data loader apparatus and method for a mobile platform
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
Alarm monitoring telecommunications line condition detection and automatic
A method at an alarm monitoring station and security system arrangement for detecting alarm signals originating at security systems on incoming calls carried by...
Semiconductor integrated circuit
According to one embodiment, a semiconductor integrated circuit is provided, which has mounted thereto a flip-flop circuit including a latch portion that takes...
System and method for ensuring security of data stored on data storage
Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access...
Signal transmission module
A signal transmission module is provided. The signal transmission module includes an electrical connector, a linked unit, a data connector, a sliding block, a...
Card security activation label and method
Card security apparatus and methods are provided. An obstruction layer (e.g., a hot-stamped scratch off foil label) may be provided in at least partially...
Method and system for secure distribution of selected content to be
protected on an appliance-specific basis...
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
Protection of audio or video data in a playback device
Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly...
Content-addressable memory based enforcement of configurable policies
A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input...
Method and system for managing security operations of a storage server
using an authenticated storage module
The present invention provides a technique, in a network storage system, for a key management module (KMM) managing security operations within the storage...
Method and device for distributed security control in communication
With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe...
Virtual computing infrastructure
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure...
Secure consultation system
A secure consultation system is disclosed that enables an owner entity to securely store its most secure and private data such that designated entities of the...
Configuring and providing profiles that manage execution of mobile
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
Access control method for tri-element peer authentication credible network
An access control method for a TePA-based TNC architecture is provided, including: 1) performing encapsulation of user authentication protocol data and platform...
Semiconductor device including encryption section, semiconductor device
including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
Storage availability using cryptographic splitting
Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a...
Secure processing device with keystream cache and related methods
A secure processing device may include an external memory storing encrypted data, and a processor cooperating with the external memory. The processor is...
Secure data entry
In some embodiments, techniques for secure data entry comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field data.
Mobile, wireless hand-held biometric capture, processing and communication
system and method for biometric...
A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available...
Method of secure broadcasting of digital data to an authorized third party
The invention relates to a method of secure broadcasting of encrypted digital data of a proprietary entity, these data being stored in a storage module (6) of a...
Secure delivery of sensitive information from a non-communicative actor
An electronic storage in a network accessible server securely stores sensitive user data. Technologies disclosed enable secure user access to the sensitive data...
System and method for load balancing multiple file transfer protocol (FTP)
servers to service FTP connections...
System and method for load balancing multiple file transfer protocol (FTP) servers to service secure FTP sessions having encrypted signals are disclosed. In one...
Tunneling non-HTTP traffic through a reverse proxy
A method, system and apparatus for tunneling non-hypertext transfer protocol (HTTP) data streams through a reverse proxy. The method can include soliciting a...
Multi-source broadband aggregation router
A router has one or more wired connections to a remote computer network and one or more wireless connections to the remote computer network for managing a...