At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Bus monitor for enhancing SOC system security and realization method
The present invention discloses a bus monitor for enhancing SOC system security and a realization method thereof. The bus monitor disposed between a system bus...
Method and system for provisioning portable desktops
A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data...
Accelerator system for use with secure data storage
Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and...
Computer architectures using shared storage
A method includes providing a persistent common view of data, services, and infrastructure functions accessible via one or more shared storage systems of a...
Method for operating a sensor apparatus and sensor apparatus
A sensor apparatus includes a housing with a security device, a secure first computation device, a second computation device and a sensor element. The sensor...
Method and system for improving storage security in a cloud computing
A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client...
System and method of accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the...
Securing data in a dispersed storage network using security sentinel value
A sentinel value is combined with a data segment, and encrypted. A digest of the encrypted combined data segment is calculated, and used in conjunction with an...
In-band security protocol decryptor and scanner
An in-band decryptor and scanner (IBDS) for monitoring data packets or frames of an encrypted communication session. The IBDS may reroute or process the data...
Secure publishing of data to DMZ using virtual hard drives
A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is...
TCP/IP processor and engine using RDMA
A TCP/IP processor and data processing engines for use in the TCP/IP processor is disclosed. The TCP/IP processor can transport data payloads of Internet...
Server apparatus, mail server apparatus and fax server apparatus
A memory section of a server apparatus stores a security information table storing a plurality of pieces of destination management information, a trust...
Crawling secure data sources
It is desirable to provide a secure search mechanism to provide for searching over any and all content, such as across an enterprise. A secure search, however,...
Security policy management device, security policy management system, and
Policy information stores policy setting information and identification information of a policy in correlation with each other, the policy setting information...
Three-stage, double blind credit rating of securities
Disclosed is a computer-implemented system and method for rating an asset, and, in embodiments, a system and method for performing a double-blind, three stage...
Account contribution management
An ability to expose and display a current billing amount associated with a billing account in a billing system to one or more third parties, and to link one or...
Method and system for labeling and managing the sale of manufactured
In a method for identifying manufactured concrete or masonry blocks and managing the sale thereof to a customer in a retail establishment, the retail...
Marking device docking stations having mechanical docking and methods of
Docking stations and docking methods are provided for use with marking devices used for marking the presence or absence of an underground facility in a dig...
Location-based recovery device and risk management system for portable
computing devices and data
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
Systems and methods for authenticating applications for access to secure
data using identity modules
A mobile station is configured to authenticate applications running thereon in order to control access by the authenticated applications to secure data stored...
Telecommunications device security
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure...
Method and system for controlling the locking/unlocking of the network
access functions of a multifunction terminal
A method and system of controlling the locking/unlocking of the network access functions of a terminal including a security processor, like a mobile telephone...
Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first...
Enhancing messaging services using translation gateways
In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward...
Reliable and non-manipulatable processing of data streams in a receiver
The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet...
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
Semiconductor memory device, method of adjusting the same and information
processing system including the same
Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing...
Method of operating integrated circuit embedded with non-volatile
programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
Secure cloud based printing
A printing apparatus includes a first memory, a second memory, a first obtaining section, a second obtaining section, and a retrieving section. The first memory...
Image forming apparatus, control method thereof and computer-readable
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
Image processing apparatus, display apparatus, and image displaying system
An image processing apparatus, a display apparatus and an image displaying system wherein both secure and public images can be efficiently displayed with high...
Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
System for protecting sensitive data with distributed tokenization
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information...
Security event management apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive multiple security event data streams from a plurality of hardware processing nodes, the multiple security...
Method and system for cyber security management of industrial control
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
Dynamic authenticated perimeter defense
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while...
IC card for encryption or decryption process and encrypted communication
system and encrypted communication...
It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC...
Tokenized data security
Provided are devices, methods, systems, computer readable storage media for tokenizing data. In some examples, credit card numbers are tokenized using a...
Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
Methods and systems for increasing the security of network-based
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes...
System and method for device security with a plurality of authentication
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security...
Methods, systems, and computer-readable media with executable instructions stored thereon for managing access authorization to hardware and data resources. A...
Devices, systems, and methods for providing increased security when
multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
Memory controller that includes support for autorun of software or data
An integrated circuit microcontroller supporting Autorun of software or data is disclosed. The integrated circuit microcontroller can be included in a memory...
Data conversion environment
Converting data from a first format to a second format may be used to merge two databases having different formatting. Conversion maps may be defined for pairs...
Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Data control method of cloud storage
The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage....
Methods, apparatus and systems to improve security in computer systems
In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part...
System and method for secure communications
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that...