At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for securing frames from other frames
A method includes placing an accent in a frame, and only letting frames with the same accent communicate with each other. This accenting is removed using an...
Multi-threaded business programming library
A business programming library for use by an enterprise resource planning system provides a run-time environment and a library of API services for accessing...
Data isolation in shared resource environments
A data connection of a shared resource is placed in isolation mode to remove its ability to communicate with other data connections of the shared resource. This...
Methods, apparatuses and computer program products for provisioning
applications to in vehicle infotainment...
An apparatus for providing one or more applications to an IVI client device(s) may include a processor and memory storing executable computer code causing the...
Crash data handling
Systems and methods for handling a crash of a process running on an operating system (OS) of a client are provided. In some aspects, a method includes...
Display of a verification image to confirm security
A handheld device 300 generates a verification image to indicate that the device is operating in a secure domain. The verification image is generated in...
System and method of facilitating the identification of a computer on a
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
System and method for cryptographic key exchange using matrices
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret...
Method and apparatus for enhancing security of wireless communications
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data...
Alert options for electronic-paper verification
A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data...
Data security method and system
A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital...
Document encryption and decryption
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its...
Remote control of medical devices using instant messaging infrastructure
Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile...
Ad-hoc trust establishment using visual verification
Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on...
Secure key server based file and multimedia management system
An embodiment of the present invention proposes a novel file and multimedia management and tracking system using a secure key server. The invention also...
Key delivery method and apparatus in a communications system
In order to facilitate access to encrypted broadcast or multicast data an encrypted service key is sent from an access server of the communication network to...
Secured presentation layer virtualization for wireless handheld
communication device having endpoint independence
The connectivity and security of wireless handheld devices (HDs) can he leveraged to provide a presentation appliance (PA) (e.g. a laptop) with an ability to...
System and method for hardware strengthened passwords
A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may...
Partitioning the namespace of a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
Secure file access using a file access server
A secure file access system and method are disclosed which comprises a file access module executed on a processor of a computing device. The file access module...
Tokenization of multiple-field records
An improved technique for granting access to a complex datum maps a single user token representing a user onto a set of data group tokens, each data group token...
Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
Network-centric cargo security system
Network-centric systems and methods for monitoring the security of a cargo container during shipment from an origination point to a destination are described....
Systems and methods for secure parcel delivery
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and...
Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
Using accounting data based indexing to create a low volatility portfolio
of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
Method and apparatus for a distributed roaming master (DRM) in wireless
A system and methodology that can facilitate communication between home and roaming radio access networks by employing IP-based messaging is provided. The...
Secure system for programming electronically controlled locking devices by
means of encrypted acoustic...
The invention relates to a system implementing a mobile telephone (20) to which a master user authorized to program a lock (22) has access. A remote management...
Security for mobile communications device
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to...
Personalization of a mobile communcation device
An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least...
Process for establishing a data link between two processors, specifically
within an NFC chipset
A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a...
Methods and systems for preventing unauthorized disclosure of secure
information using image fingerprinting
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,...
Systems and methods for secure communication using a communication
encryption bios based upon a message...
An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The...
Method and system for secure distribution of selected content to be
protected on an appliance specific basis
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
Systems and methods to securely collect data over a telephone
A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service...
Method and system for verifying logical connection
A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth...
Communications switching architecture
Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,...
Radio frequency identification enabled mobile device
An RFID enabled mobile device is configured to provide a secure release of RFID information. The RFID enabled mobile device, such as an RFID enabled cellular...
Estimating cardiac pulse recovery from multi-channel source data via
constrained source separation
What is disclosed is a system and method for recovering a patient's cardiac pulse rate from a sequence of video images recording of that patient. In one...
Sensor module and sensor module manufacturing method
Provided is a sensor module capable of ensuring security of data in which card data output from a magnet head is not stolen by a third party. In a sensor module...
System and method for the secure transfer of information to a web session
A system and method includes displaying a prompt on a display device of a first computing device to input information for an e-commerce session. Next, a...
Optical detector at point of care
A patient support apparatus including a barrier, an optical detector, and a control system. The optical detector secured to the barrier and configured to detect...
Method of processing data to enable external storage thereof with
minimized risk of information leakage
A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution...
Complementary character encoding for preventing input injection in web
Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security...
Secure network privacy system
The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure...
System and method for enhancing, securing, controlling and customizing
employee network applications and usage
The invention relates to various solutions to the challenges of supporting call centers and networks having a plurality of network connected agents or...
Processor and processor system
In a processor including a CPU core executing instruction codes and a cache memory part having plural ways, encryption counter data encrypting and decrypting...
System and method for providing load balanced secure media content and
data delivery in a distributed computing...
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
Wireless internet access device, SD control chip, and method for data
A wireless Internet access device, a secure digital (SD) control chip, and a data communication method are disclosed. The method includes the following steps:...
Automatic identification of travel and non-travel network addresses
A system to automatically classify types of IP addresses associated with a user. Information, such as user names, machine information, IP address, etc., may be...