At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Combining a mobile device and computer to create a secure personalized
A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a...
System and method for secure transaction
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
Apparatus, system and method for securing digital documents in a digital
Various embodiments include an apparatus and a method to secure protected digital document content from tampering by their user, such as unauthenticated use or...
Managing a storage cache utilizing externally assigned cache priority tags
A method for caching data in a storage medium implementing tiered data structures may include storing a first portion of critical data at the instruction of a...
Apparatus and method for reorganization of mapping information in flash
An apparatus and method for reorganizing mapping information in a flash memory are provided. The apparatus includes a sector-managing module that secures a...
SMM-dependent GPIO lock for enhanced computer security
Computer security is enhanced by creating an environment in which changing the state of a general-purpose input/output (GPIO) output or changing the...
System and method for optimizing and processing electronic pages in
A web page processing system that processes users requests using predefined, flexible templates and corresponding logic. Main processing handles...
Method for paying for a service offered by means of a data network
A method is proposed for acquiring a service sold over a data network (20) against presentation of a transaction medium (2). The service is ordered by a user...
Integrated investment management system with network datafeed and
incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
Handheld and imbedded devices to detect sticky devices using magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors,...
Car-mounted information apparatus and information transfer system for
To securely prevent from battery depletion and enable transfer data without troubling a user, a communication address data storage unit stores a communication...
Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
Security for wireless communication
A mobile terminal is disclosed which includes a near field or RFID tag (41). The mobile terminal (1) communicates with the mobile telecommunications network and...
Apparatus and method for arranging communication links in visible light
A method and apparatus for arranging communication links in visible light communication increases the user visibility of the system. The method includes the...
Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
Reference signal multiplexing and resource allocation
A reference signal of a user equipment to which a resource (LB#1) is allocated for a L1/L2 control signal, is allocated a resource (SB#1) that is closer on the...
Method for enhancing security printing
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a...
System and method for turbine bucket tip shroud deflection measurement
A measurement system measures a gap between a plurality of rotating bucket tips and a stationary shroud surface. The system includes a sensor secured to the...
Access control device
The invention relates to an access control device (1) having at least one access barrier element, to which at least one read unit and/or sensor unit for...
Secure reconfiguration of programmable logic
An integrated circuit having secure configuration includes configuration memory, programmable logic resources coupled to the configuration memory, programmable...
Ubiquitous imaging device based check image capture
A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a...
Systems, methods, apparatus of a secure RFID record
Systems, methods and apparatus of a secure RFID record are described herein. In one aspect, an apparatus of a RFID wristband comprises three layers: the top...
Secure authentication feature
A security tag comprising at least one overt data carrier (10), and at least one covert data carrier (25), the covert data carrier comprising a ring (25) that...
Security compliant data storage management
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security...
Network firewall host application identification and authentication
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host...
One button security lockdown of a process control network
Proper function and security of a complex network for communicating data within a process control system may be manually or automatically "locked-down" with a...
Techniques for accessing a backup system
A technique accesses a backup system. The technique involves receiving a logon command to logon a user to a website of the backup system. The backup system...
Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
Method and system for dynamic security using authentication server
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from...
Tamper respondent covering
Disclosed is a tamper respondent covering. The tamper respondent covering has a cover-shaped structure to cover an electronic part which is exposed. This...
Security implementation within a browser
Techniques for implementing security within a browser of a data processing system are described herein. According to one embodiment, first data representing a...
Booting and configuring a subsystem securely from non-local storage
According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor...
System and method for providing a script-based collection for devices in a
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
System and method for information sharing across security boundaries
A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes...
Ecommerce system with payment data division
In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
System and method for monitoring securities holdings for related entities
Systems, methods, and computer-executable instruction mechanisms such as programming structures for generating signals representing holdings of securities held...
Home network system augmentation with remote guidance and local set up and
A network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in Opera standard provides for...
A security system having an inner door handle of a door for a vehicle. The door is brought into a locked and unlocked state with a locking system. The security...
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
Cutting tool data verification system and method
A method of operating a machining system includes comparing one or more features of a cutting tool to information stored on a data chip secured to a tool holder...
A cellular communications system is provided in which a user device sends a Service Request to a Mobility Management Entity together with parameter data that...
Image algorithms to reject undesired image features
A method for detecting authorized security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a...
Communication apparatus and communication method
A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals,...
Key management to protect encrypted data of an endpoint computing device
Methods and apparatus involve protecting encrypted data of endpoint computing assets by managing decryption keys. The endpoint has both a traditional operating...
User level security for an emulated removable mass storage device
A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile...
Systems and methods for multicast retransmission over a secure wireless
Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or...
Method for securing a telecommunications terminal which is connected to a
terminal user identification module
A method of securing a telecommunication terminal that is connected to a module used to identify a user of the terminal is described. The method includes a step...
Simplified secure symmetrical key management
Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained...
Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...