At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for using black box data to analyze vehicular
Disclosed are methods and apparatus for using black box data to analyze vehicular accidents. The methods include obtaining information from an event data...
Mobile terminal that allows a server to manage confidential information
To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously...
Group key security in a multihop relay wireless network
A security zone key is used to secure data traffic/control messages in a multi-hop wireless relay network. In one embodiment, the security zone key is generated...
Land based unit for seismic data acquisition
A self-contained, wireless seismic data acquisition unit having a cylindrically shaped case with smooth side walls along the length of the case. A retaining...
Wireless video surveillance system and method with input capture and data
transmission prioritization and...
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
Vehicle security and monitoring system
A vehicle monitoring system includes a communication subsystem configured to provide two-way wireless communication, and a controller mounted in a vehicle and...
Anti-identity theft and information security system
The anti-identity theft and information security system process includes storing secure information in association with an electronic device having a...
Modular entertainment and gaming system configured to capture raw
biometric data and responsive to directives...
A secure and modular architecture for monitoring and controlling clusters of pay entertainment and gaming devices. The architecture allows flexible and secure...
Authenticating electronic financial transactions
To improve security and simplify financial transactions in electronic communications environments, a cryptographic Private Key is securely stored in a storage...
Banking machine that operates responsive to data bearing records
An automated banking machine operates responsive to data read from data bearing records to cause financial transfers. The machine includes a card reader that...
Methods for validating participants in a pension insurance program
A method for ensuring valid participation of a plan participant in a defined contribution pension plan provides data query for identifying the plan participant....
Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
Removable hard disk with front panel input
A system and method is disclosed for authenticating a removable data storage device (RDSD) by using a trusted information module (TIM) to control access to data...
Sovereign information sharing service
Embodiments herein provide a method, system, etc. for a sovereign information sharing service. More specifically, a method for secure distributed query...
System, method, and computer program product for initiating a security
action at an intermediate layer coupled...
A system, method, and computer program product are provided for initiating a security action at an intermediate layer coupled between a library and an...
Method and system for preserving security of sensor data and recording
medium using thereof
A method and a system for preserving sensor data based on a time key, and a recording medium thereof are provided. The time key based sensor data security...
Radio frequency identification (RFID) security apparatus having security
function and method thereof
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader...
Deploying group VPNS and security groups over an end-to-end enterprise
Group Virtual Private Networks (Group VPNS) are provided for different types of machines in a data processing network. Security groups are defined by a security...
Method and system for enforcing a security policy via a security virtual
A method and system for enforcing a security policy encoded in an instruction set of a security virtual machine is provided. A security system provides a...
Solution for locally staged electronic software distribution using secure
A method, information processing system, and computer program storage product, are provided for creating a Removable Installation Kit ("RIK") for locally staged...
Circuit apparatus with memory and power control responsive to
circuit-based deterioration characteristics
Power-backup capabilities are provided by implementing a variety of different methods, systems and devices. According to one such implementation, a memory...
Secure storage system and method of use
A secure storage system is disclosed. The secure storage system comprises a crypto engine and a storage device. The crypto engine comprises a random number...
Secure outsourced aggregation with one-way chains
Secure outsourced aggregation of data using one-way chains is discussed in this application. Each input data source such as a sensor generates a Verifiable...
Data processing apparatus and method
Generating a cryptographic key, for example using a received external key. A system to generate a cryptographic key may include a first data store which may...
Method and apparatus for binding multiple authentications
Techniques for binding multiple authentications for a peer are described. In one design, multiple authentications for the peer may be bound based on a unique...
Mobile system, service system, and service providing method to securely
transmit private information for use in...
A mobile system, a service system, and a service providing method for securely transmitting private information for use in a service are provided. The mobile...
System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
Method for supporting management and exchange of distributed data of user
or an entity
A method for supporting management and exchange of distributed data of a user or an entity, in particular user profile information data, is characterized in...
POS payment terminal and a method of direct debit payment transaction
using a mobile communication device, such...
A payment terminal using a mobile communication device (4), such as a mobile phone, is located on a removable memory card (1), e.g. type microSD card, which is...
Management system for the protection of mortgage equity
A computer system for managing mortgages of mortgage holders with a no foreclosure rule interconnected to funding institutions maintained as a club. The system...
Digital content distribution and subscription system
A digital content distribution and subscription system for digital data files provides subscribers with music or video from streaming digital data or...
Differential commission and electronic order matching process for the
distribution of primary market fixed...
An apparatus and process (collectively the "system") for conducting and managing the primary offering of fixed income securities, specifically, but not...
Escrowing digital property in a secure information vault
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow...
Systems and methods for client screening in the financial services
Systems, methods, and interfaces for screening clients for security compliance with a Customer Identification Program are disclosed. An illustrative system for...
Vehicle activity module
Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each...
Method, user network equipment and management system thereof for secure
A method for secure data transmission, and the method includes: after a Home (evolved) Node-B (H(e)NB) establishes a connection with a H(e)NB Management System...
Secure access to restricted resource
Devices, systems and methods are disclosed which relate to restricting access to a secure resource by requiring a multimodal input sequence as a passkey to...
Method and device for obtaining security key in relay system
A method and a device for obtaining a security key in a relay system are disclosed in the embodiment of the present invention. A node in the relay system...
Apparatus and method for protecting data in flash memory
An apparatus for securely protecting data in a flash memory upon power off is disclosed. In the apparatus, a power detector monitors a voltage output from a...
Trusted display based on display device emulation
An integrated circuit has a keypress entry interface and a pass-through data path. In a pass-through mode, the keypress entry interface is disabled and the...
Data storage medium provided with a security characteristic
A multilayer data carrier having a substrate on which there is formed a security element having a metal layer, the element showing an optical effect from a...
Secure information transmission over a network
Architecture for secure transmission of data from a sender to a receiver can include multiple network server nodes and a processor that contains computer...
Off-premise encryption of data storage
A system that enables a cloud-based data repository to function as a secure `drop-box` for data that corresponds to a user is provided. The `drop box` can be...
Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
Secure operating system/web server systems and methods
Systems and methods for securely operating web servers, operating systems, etc. Methods of embodiments include creating virtual roots for executive jails and...
White-list firewall based on the document object model
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to...
Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
System and method for a business data provisioning for a pre-emptive
Embodiments of the present invention may provide a system and method for business data provisioning for a pre-emptive security audit. In one aspect, a method...
Systems and methods for managing user permissions
Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for...
System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...