At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for communicating data between computer devices
A client server system uses a client subsystem, a server subsystem and an interconnecting data network. The client subsystem client application initiates a...
Anonymous online payment systems and methods
In various embodiments, a central server grants access to a plurality of anonymous one-time-usable, time-sensitive encrypted tokens that identify consumer...
System and method for accessing read only ANSI tables in an electricity
A utility meter implementing the ANSI C12.19 standard is able to bypass security processing using Decade4 security tables for a single data access operation....
Electronic funds transfer authentication system
Embodiments of the present invention are directed to an electronic funds transfer authentication system and method to facilitate the verification and...
System and method for speeding call originations to a variety of devices
using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
Optical fiber secure communication apparatus and data encryption method
An optical fiber secure communication apparatus and a data encryption method therefor are provided. The apparatus comprises a transmitter and a receiver being...
Apparatus and method for enhancing forwarding and classification of
network traffic with prioritized matching...
An apparatus is described that performs prioritized matching through processing of network traffic in accordance with provisioned rules and policies. The...
Systems and methods of combined Bluetooth and WLAN signaling
Disclosed herein are systems and methods of combined Bluetooth and WLAN signaling. Such systems and methods may use a Bluetooth connection to signal WLAN...
Event-triggered security surveillance and control system, event-triggered
security surveillance and control...
The present invention discloses a security surveillance system and a method thereof, a computer readable storage media and a computer program product. The...
Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
System and method for providing communications for container security
A system for providing communications for container security is provided. The system includes a sensing system for monitoring the contents of the container; a...
Wireless security control system
A security control system includes a remote access control system to receive wireless information from a central access control system. The remote access...
Controlling program, image forming apparatus and print controlling method
There is described an image forming apparatus, which makes it possible to securely prevent the secret information from leaking out to unauthorized personnel....
Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
Side channel attack analysis
A method described herein includes acts of executing a cryptographic function over input data utilizing a processor on a computing device and generating a data...
Method for making secure the execution of an intermediate language
software code in a portable device
A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting...
System and method for secure control of resources of wireless mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
Systems and methods for identification and authentication of a user
The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
Secure social web orchestration via a security model
A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class...
Secure and scalable detection of preselected data embedded in
electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
Processor modifications to increase computer system security
A method, an x86 processor and a computer system for processing more securely. More specifically, embodiments provide an effective and efficient mechanism for...
Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
Deduplicated and encrypted backups
A system and method for efficiently creating deduplicated and encrypted data across a plurality of computers allows local encryption and remote storage of...
Method and device for creating a group signature and related method and
device for verifying a group signature
A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group...
Health keyset management
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided....
Method, apparatus, and system for sending and receiving security policy of
A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of...
Reallocation of tape drive resources associated with a secure data erase
A method according to one embodiment includes determining whether to reallocate one or more of a plurality of tape drives that are presently allocated for a...
System and method for enabling industry based channels in an IP
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
Managing analysis of activity data
A method is used in managing analysis of activity data. Activity data is analyzed for a security investigation by using a content bundle. The content bundle...
Method and system for securing data utilizing redundant secure key storage
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations,...
Method of delivering direct proof private keys to devices using an on-line
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring...
Data radio bearer (DRB) enhancements for small data transmissions
apparatus, systems, and methods
A method of transmitting data packets with a wireless communication device includes requesting a preconfigured data radio bearer (DRB) from a base station...
eUSB duplication system
An eUSB duplication system allows for digital data copy from a master eUSB storage device to target eUSB storage devices and includes a duplicator chassis with...
Portable apparatus for biometric and biographic data collection, storage
and delivery, and method therefor
The present disclosure relates to a method and apparatus for biometric and biographic data capture. The apparatus includes a main unit, a display monitor having...
Locking mechanism based on unnatural movement of head-mounted display
A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer...
Secure inventory control systems and methods for high-value goods
Embodiments of the present invention include methods and systems for tracking and monitoring high-value goods by scanning RFID tags associated with the goods. A...
Systems and methods of capturing security images in an automated data
The present disclosure is directed to systems and methods for detecting and handling exception situations in an automated data reading system. In one...
Method and apparatus for securing a computer network by multi-layer
In one embodiment, a network security appliance includes a logic circuit, a network processing unit, and a general purpose processor to protect a computer...
System and method for mutually authenticated cryptographic key exchange
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
Secure communication using a trusted virtual machine
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or...
String based detection of proxy communications
Systems, methods and apparatus for a distributed security system that detects proxied resource requests. The system can search data communications, such as HTTP...
Security policy switching device, security policy management system, and
A security policy switching device includes a policy information storage that stores policy setting information and identification information of a policy in...
System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an...
Systems and methods for secure multi-tenant data storage
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a...
Dispersed storage secure data decoding
A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The...
Systems and methods for secure workgroup management and communication
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split...
Aeronautical security management over broadband air/ground network
A method to facilitate securing of air-to-ground communications for an aircraft is provided. The method includes receiving security management information at...
Image forming apparatus, host apparatus and encryption method of job
object document thereof
An image forming apparatus, a host apparatus, and an encryption method for print data, the method of encrypting the print data of the host apparatus connected...