At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data security in mobile devices
Systems, methods for computer program products for securely storing data in a data store or in an external data store associated with a mobile device are...
Personal identification number security enhancement
A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an...
Methods and entities using IPSec ESP to support security functionality for
Methods in OMA SEC_CF for providing security services to traffic over UDP between a client and a server and the relevant entities are provided. A pre-shared key...
Method, device and system for authenticating gateway, node and server
A method, device and system for authenticating gateway, node and server are provided in this invention. The node receives a message sent by a gateway, wherein...
System and method for mounting encrypted data based on availability of a
key on a network
A system and a method are provided for retrieving decryption keys from a secure location that is separate from the encrypted data. In particular, for each...
Storage gateway security model
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway...
Systems and methods for providing anonymized user profile data
Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the...
Method and apparatus for dynamically adjusting memory capacity in
accordance with data storage
A storage apparatus and method configured to improve efficiency of data access utilizing dynamically adjusting storage zone boundary within a disk are...
Remote monitoring systems for monitoring medical devices via wireless
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
Secure payment method and system
Representative embodiments of a server-based method of facilitating payment by a user registered with the server include, at the server, generating and storing,...
Method for directed advertising and information distribution using a
wireless communications network
A method of and system for directing individualized information to end users, using wireless or mobile media is disclosed. In one embodiment, the method and...
SIM-centric mobile commerce system for deployment in a legacy network
A financial transaction processing system in a legacy financial transaction network for wireless mobile handset devices having an internal SIM or USIM under...
Time and wavelength-shifted dynamic bidirectional system
A bidirectional optical network, in which an incoming/downstream modulated optical signal(s) of a particular wavelength may carry content from a headend to a...
A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having...
User authentication on an electronic device
The present disclosure provides for the use of non-alphanumeric, non-biometric inputs to authenticate a user accessing secured data or functions on an...
Security method and system and computer-readable medium storing computer
program for executing the security method
A security method and system for maintaining security between a client and a server and a computer-readable medium storing a computer program for executing the...
Cryptographic processing method, computer readable storage medium, and
cryptographic processing device
401 stores, in 302, key d' obtained by subtracting random number 2r held in 201 from key d held in 105. When an operation starts, the values "-C" and "-C.sup.2"...
Radio base transceiver station and method of connecting the same to
There are provided a radio base transceiver station and a method of connecting the same to a network, whereby a home radio base transceiver station is...
Modular patient communicator for use in life critical network
A modular patient communicator provides for communications with a patient implantable medical device (PIMD) and connectivity with a central authority (CA) via...
Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
Value generator coupled to firewall programmable qualifier data structure
A system comprising a first logic adapted to use qualifiers received from a component to determine which of a plurality of storages matches the qualifiers, the...
Propagating security identity information to components of a composite
Various methods and systems for propagating identity information in a composite application are presented. State data of a composite application, as executed...
Secure identification of intranet network
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can...
The present invention provides both method and apparatus for enhancing a user's network security. For example, it may be used to prevent phishing attacks being...
High availability for network security devices
In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a...
Attribute-based access-controlled data-storage system
The current application is directed to computationally efficient attribute-based access control that can be used to secure access to stored information in a...
Media access control security (MACsec) management with a layer management
interface (LMI) configured to...
A layer management interface (LMI) to communicate with a processor over MDIO protocol, and to communicate with a media access control security (MACsec)...
Communication control device, data communication method and program
A communication control device includes reception controllers capable of receiving data in a burst transfer mode in which packets are continuously transferred...
Air conditioning management apparatus and air conditioning management
An air conditioning management apparatus is provided which can remotely monitor and control air conditioning equipment with ease of viewing a home page while...
Business process utilizing systems, devices and methods engendering
cooperation among service providers to...
Methods, systems, and devices for providing a plurality of services to premises over one or more communication networks and providing one or more advertisements...
Centralized management of marketing activities among participants of
multiple channel marketing networks
A marketing system, also referred to as a platform, is disclosed which facilitates centralized management of marketing activities among multiple participants of...
Multi-user remote health monitoring system with biometrics support
The invention presents a networked system for identifying an individual, communicating information to the individual, and remotely monitoring the individual....
Clinic based instrument system for remote processing and access to
implanted systems information
A system for accessing implantable medical device (IMD) data is provided including an interrogation appliance to retrieve data from an IMD and transfer the data...
Simple peer-to-peer network formation
Wireless devices that support bootstrapping of a peer-to-peer connection. The wireless devices may use an infrastructure mode connection to exchange security...
Remote control relay for wirelessly-controlled devices
Methods and systems for relaying an optical signal from a remote control to a remote-controlled device such as a home entertainment device or a security device....
Security network processor system and method
A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for...
Data storage device carrier assembly
A data storage device assembly includes a drive bracket. The drive bracket includes a first side plate and a second side plate which faces to the first side...
Method and system for using multi-channel communications to enhance gaming
A method and system for using multi-channel communications to enhance security is described herein. In one embodiment, the method comprises receiving in a first...
Real-time security verification for banking cards
Embodiments of the invention provide a means for verifying that a person using a bank card at a point-of-sale merchant location is in fact a person authorized...
Remote data viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
Platform for analyzing the security of communication protocols and
A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or...
Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
Replay attack protection with small state for use in secure group
A replay detection technique with "small state" (e.g., with relatively few bits of state information). A sending node generates a random number r.sub.i,...
Systems and methods for providing security services during power
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting a wake...
Method for managing computer resources accessed by a program operating in
a restricted environment
A resource manager of an operating system of a data processing system receives a first request from a first program for a ticket for accessing at least one of...
Data processing system including explicit and generic grants of action
A method of determining whether to authorize a user of a computer system to perform an action in the computer system is described. Besides the explicit...
Systems and methods for implementing transparent encryption
A method of providing transparent encryption for a web resource includes a key manager receiving an encryption key policy; receiving user identifiers and...
Method and apparatus for monitoring text-based communications to secure a
A method and apparatus for monitoring text-based communications to secure a computer is described. In one embodiment, the method for monitoring text-based...
System and method for hardware based security
An asset management system is provided, which includes a hardware module operating as an asset control core. The asset control core generally includes a small...