At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System for secure enrollment and secure verification of network users by a
centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
Method and system for fast access to advanced visualization of medical
scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various...
Systems and methods for detecting network intrusion devices
An optical communication system has a transmitter that generates an optical signal containing payload data and security data. The transmitter double modulates...
System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
Information processing apparatus, information recording medium
manufacturing apparatus, and information...
A configuration is provided for a process in which appropriate content code corresponding to apparatuses and applications of various model types and versions is...
System and method for managing secure information within a hybrid portable
A method and system for managing secure information within a portable computing device are disclosed. The portable computing device includes a program module...
Secure computing in multi-tenant data centers
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation...
Facilitating secure online transactions
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences...
System and method for multi-layered sensitive data protection in a virtual
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor...
Preserving security association in MACsec protected network through VLAN
According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a...
Secure storage and accelerated transmission of information over
A system and method for securely storing and transmitting digital information includes a computing device connected to at least one of a network device or a...
Data transfer apparatus, data transfer device, and data transfer method in
a data transfer device
A data transfer apparatus includes: a first port and a second port that communicate data; a memory unit that stores the data; and a securing unit that secures,...
Method and system for automatic login initiated upon a single action with
A method and system for secure automatic user login to a destination website in a single action, without the use of a file manager, cookies, or without storing...
System and method for providing configurable security monitoring utilizing
an integrated information system
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources...
Optimizing fibre channel zoneset configuration and activation
In an example embodiment, a new qualifier is added to members in a Fiber Channel zone to specify whether each member is a target or initiator and in another...
Device for automatically receiving new digital content from a network
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
A security-to-entity crosswalk system and method link business entity information to financial security information to provide risk insight about the business...
Electronic quantity purchasing system
Disclosed is an electronic quantity purchasing system which is a host computer that a user may access to purchase quantities of goods or services at a locked-in...
System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
System for positioning a tool in a work space
A system for assisting in the use by an operator of the operating element of a tool at desired locations at a worksite, includes a stationary control and a...
Management method and apparatuses
After a successful authentication in a femto system, a home base station management system is used to send configuration data to a home base station and manage...
Communications device with secure data path processing agents
A communications device comprising one or more communication input/output (I/O) ports, at least one of the one or more communication I/O ports being a wide area...
Information input output method using a dot pattern
In exemplary embodiments, a dot pattern technique is provided with flexible length of data to be registered and with enhanced security by arranging a dot...
Randomization of plain text for GSM SACCH
The present document relates to the transmission of data in a digital cellular telecommunications network. In particular, the present document relates to the...
Apparatus and method of controlling seamless handover between
heterogeneous networks based on IPv6 over IPv4...
The invention relates to a method and an apparatus for controlling seamless handover between heterogeneous networks based on IPv6 over IPv4 tunneling. When IPv6...
System and method for implementing mesh network communications using a
mesh network protocol
The following describes data structures, communication protocol formats and process flows for controlling and facilitating secure communications between the...
DRAM security erase
In a method of erasing data, a wordline of the DRAM array is set active, and signals develop on bitlines according to flows of charge between memory cells...
Image generating apparatus, image processing apparatus, image forming
apparatus, and recording medium
Additional image data of an additional image, which is based on first data and second data concerning security of obtained data, is added to image data that is...
RFID remote antenna security system
An RFID remote antenna security system for preventing unauthorized reading of RFID cards. The RFID remote antenna security system generally includes a remote...
Systems and methods for providing security at a vehicle yard
Systems and methods for providing security at a vehicle yard are provided. A communicator may collect data associated with a plurality of vehicles or trailers...
System, device and method for securing a user device component by
authenticating the user of a biometric sensor...
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
System and method for secure communication between domains
A method for secure communications between first and second domains where a first logical unit calculates timestamps and hashes and transmits web forms to a...
Method and system for providing network security services in a
An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers....
Method for information tracking in multiple interdependent dimensions
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, .lamda..sub.I. The method...
Method and computer program for securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Secure data deletion in a database
A data storage application encrypts one or more data pages using a first initialization vector and one or more encryption keys. In addition, the data storage...
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
Apparatus and method for securing digital data with a security token
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts...
Method and system for NAND flash support in an autonomously loaded secure
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a...
Remote monitoring systems for monitoring medical devices via wireless
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
Random number based data integrity verification method and system for
distributed cloud storage
A data integrity verification method and system based on a root random number to ensure secure distributed data storage on a public cloud. A new root random...
Smartcard-based value transfer
In a value transfer scheme, users are provided with programmable devices, for example, smart cards, capable of carrying data representing at least one available...
Integrated trading information processing and transmission system for
The present invention provides a system for processing and transmitting trading information incorporating (a) a risk analytic module using the latest market...
Methods, systems and securities for assuring a company an opportunity to
sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock after a specified...
Using accounting data based indexing to create a low volatility portfolio
of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
System and method for providing handheld field force data gathering
automation in a big box retail environment
The present invention provides systems and methods for tracking service representative activity and data. Service representatives are equipped with handheld...
System and method for determining loss data based on industry indices
Systems and methods for evaluating basis risk associated with index based security instruments. The systems and methods calculating an element factor for each...
Performance monitoring devices and methods
We have disclosed devices and methods for monitoring an individual's performance during a physical activity. The devices may include multiple elements such as a...