At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Re-authentication in secure web service conversations
Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations...
Method and system for improving security of the key device
The present invention provides a method and a system for improving security of a key device in the information security filed. In order to solve the problem...
Non-symbolic data system for the automated completion of forms
A system and method for paper-based, automated completion of forms allows a user charged with filling out multiple forms containing some common information to...
Data processing apparatus and method for analysing transient faults
occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
Data communication method, computer and information storing medium
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at...
Methods and apparatus for secure data sharing
This disclosure relates to methods and apparatus for securely and easily sharing data over a communications network. As communications services on a...
Security system for handheld wireless devices using time-variable
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
Secure acknowledgment device for one-way data transfer system
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash...
Information processing device, information processing method, information
processing program, and integrated...
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment...
Method and system for hardware-based security of object references
A method for managing data, including obtaining a first instruction for moving a first data item from a first source to a first destination, determining a data...
Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
Security in a geo-spatial environment
A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the...
Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a...
Inertial sensor calibration method for vehicles and device therefor
An inertial sensor calibration method has steps of mounting an observer device and an inertial sensor of a vehicle carrying on an inertial move, acquiring...
System of automated document processing
A system is proposed for automated document processing, comprising a document, consisting of two sections--a main section, containing data in printed character...
System and method for providing voice communications over a multi-level
According to one embodiment, a communication network includes an analog voice bridge coupled to two secure network domains that each have a differing security...
Systems, methods, and apparatus for monitoring and alerting on large
sensory data sets for improved safety,...
The present invention is a process monitoring method, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the...
Structure for railroad ties having data acquisition, processing and
An encapsulated railroad tie structure and its method of manufacture. A core of laminated wood slats is inserted into an extruded sleeve of scrap tire rubber...
Varnish printing document securing system and method
A paper and document securing system that includes an indicator is used to for validating the paper. The indicator may be printed on a surface of the paper by a...
Techniques for providing security using a mobile wireless communications
device having data loss prevention...
A technique provides wireless communications security. The technique involves providing a mobile wireless communications apparatus (e.g., a smart phone) having...
Cyber security analyzer
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values...
Flow data for security intrusion detection
Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing...
Methods, devices, systems, and computer program products for edge driven
communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
Methods, systems and devices for the detection and prevention of malware
within a network
Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically...
Trusted path, authentication and data security
In some embodiments, techniques for computer security comprise presenting a data field in a spoof-resistant manner, receiving field data, and securing field...
Secure computer use system
Methods and apparatus for ensuring the computer security of users of a computer system are described. A user is allocated a security grading relating to how...
Dynamic threat protection in mobile networks
In general, techniques are described for dynamic threat protection in mobile networks. A network system comprising a network security device and a management...
Methods and systems for application rendering and management on internet
television enabled displays
Computer implemented methods for managing communication between a display device and a remote server or services is provided. A remote server provides access to...
Securing backing storage data passed through a network
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing...
Tamper resistant memory protection
Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing...
Method and system for a recursive security protocol for digital copyright
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with...
Secured critical information storage and transaction
An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted...
Method for the access of the mobile terminal to the WLAN and for the data
communication via the wireless link...
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication...
Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
Intelligent integrated network security device
Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data...
Methods and apparatus for secure content routing
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier...
Network security smart load balancing
A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g....
System and method for establishing a virtual private network
A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication...
Method and system for secure data storage
A method and system for secure data storage and retrieval is provided. A sequence of data units is divided into multiple subsets of data units corresponding to...
Secure online transaction processing
Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials...
Fair value model based system, method, and computer program product for
valuing foreign-based securities in a...
A system for determining fair value prices of financial securities of international markets includes selecting a universe of securities of a particular...
System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering...
A linear actuator comprises a reversible electric motor (2) which, via a transmission, is capable of driving a spindle (4) having a spindle nut (5) secured...
Methods for network selection and discovery of service information in
public wireless hotspots
A roaming information code which can be wirelessly or otherwise transmitted as a SSID or other data field(s) of a wireless technology or standard. Further, a...
Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
Carrier and subcarrier hopping for optical OFDM security
Methods and systems for secure communication include assigning data streams to respective orthogonal sub-carriers according to random number information at a...
Disclosed is a method in a provisioning apparatus. The method comprises obtaining a family key, a family key defining a family; submitting the family key to a...
Security service control method and wireless local area network terminal
A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the...