At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for tracking a transported item while accommodating
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
Method and apparatus for encrypting short data in a wireless communication
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the...
Methods and apparatuses for selective data encryption
A method of encryption, using an encryption key K with key length k, of at least one message M comprising uniformly distributed symbols, k bits are encrypted of...
Identity based symmetric cryptosystem using secure biometric model
Methods, apparatus, and computer program products are herein described that provide for an identity-based cryptosystem using a highly secure biometric model...
Image processing, reading or forming apparatus and method for adding
specific image data to obtained image data...
A gradation pattern on the basis of the second data for the security of predetermined image data and the details data showing the detail information of a...
Smart mouse system and method of use
The Smart Mouse technology is a computer mouse with its own computer, memory, Software, OS, networking and GUI. The Mousetop Window GUI is the viewport into the...
Device for electronic access control with integrated surveillance
Described is a device for electronic access control (EAC) and surveillance. The device includes an EAC module and an imager integrated in a single unit. The EAC...
An automated security infrastructure is disclosed that includes security agents that are designed to analyze security issues. The security agents process events...
System and method for securing data within a storage system
According to the present invention, there is provided a system for securing data with a storage system. The system includes at least one storage device. In...
Secure location collection and analysis service
A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of...
Providing a security-sensitive environment
A technique provides a security-sensitive environment. The technique involves establishing a first secure channel from a trusted server to a first data source...
A semiconductor device includes a nonvolatile memory, and an interface configured to transfer data to and from the nonvolatile memory. The interface includes a...
Systems, program product and methods for performing a risk assessment
workflow process for plant networks and...
Systems, methods, and program product to perform a cyber security risk assessment on a plurality of process control networks and systems comprising a plurality...
Systems, methods, and computer program products for collecting and
reporting sensor data in a communication network
A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The...
Control system and protection method for integrated information security
A control system and protection method for integrated information security services are provided, which include protecting data packets of a user end device by...
Computational system including mechanisms for tracking taint
Mechanisms have been developed for securing computational systems against certain forms of attack. Taint status for data accessible by processes is selectively...
Security in networks
A communication system may be configured to control by a security controller the use of a node in a network for a service or application to transmit data via...
Apparatus and method for automatic self-erasing of programmable logic
Programmable logic devices (PLDs), programmable logic arrays (PLAs), complex programmable logic devices (CPLDs), and field programmable gate arrays (FPGAs),...
Method and system for secure communication
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second...
Secure web based transactions
Methods of securely performing online transactions are described which involve two independently controlled web servers. In order to complete a transaction, a...
Methods and apparatus for securing frames from other frames
A method includes placing an accent in a frame, and only letting frames with the same accent communicate with each other. This accenting is removed using an...
Multi-threaded business programming library
A business programming library for use by an enterprise resource planning system provides a run-time environment and a library of API services for accessing...
Data isolation in shared resource environments
A data connection of a shared resource is placed in isolation mode to remove its ability to communicate with other data connections of the shared resource. This...
Methods, apparatuses and computer program products for provisioning
applications to in vehicle infotainment...
An apparatus for providing one or more applications to an IVI client device(s) may include a processor and memory storing executable computer code causing the...
Crash data handling
Systems and methods for handling a crash of a process running on an operating system (OS) of a client are provided. In some aspects, a method includes...
Display of a verification image to confirm security
A handheld device 300 generates a verification image to indicate that the device is operating in a secure domain. The verification image is generated in...
System and method of facilitating the identification of a computer on a
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
System and method for cryptographic key exchange using matrices
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
Method and apparatus for enhancing security of wireless communications
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data...
Alert options for electronic-paper verification
A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data...
Data security method and system
A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital...
Document encryption and decryption
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its...
Remote control of medical devices using instant messaging infrastructure
Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile...
Ad-hoc trust establishment using visual verification
Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on...
Secure key server based file and multimedia management system
An embodiment of the present invention proposes a novel file and multimedia management and tracking system using a secure key server. The invention also...
Key delivery method and apparatus in a communications system
In order to facilitate access to encrypted broadcast or multicast data an encrypted service key is sent from an access server of the communication network to...
Secured presentation layer virtualization for wireless handheld
communication device having endpoint independence
The connectivity and security of wireless handheld devices (HDs) can he leveraged to provide a presentation appliance (PA) (e.g. a laptop) with an ability to...
System and method for hardware strengthened passwords
A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may...
Partitioning the namespace of a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
Secure file access using a file access server
A secure file access system and method are disclosed which comprises a file access module executed on a processor of a computing device. The file access module...
Tokenization of multiple-field records
An improved technique for granting access to a complex datum maps a single user token representing a user onto a set of data group tokens, each data group token...
Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
Network-centric cargo security system
Network-centric systems and methods for monitoring the security of a cargo container during shipment from an origination point to a destination are described....
Systems and methods for secure parcel delivery
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and...
Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
Using accounting data based indexing to create a low volatility portfolio
of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
Method and apparatus for a distributed roaming master (DRM) in wireless
A system and methodology that can facilitate communication between home and roaming radio access networks by employing IP-based messaging is provided. The...
Secure system for programming electronically controlled locking devices by
means of encrypted acoustic...
The invention relates to a system implementing a mobile telephone (20) to which a master user authorized to program a lock (22) has access. A remote management...
Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
Personalization of a mobile communcation device
An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least...