At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Security policy management device, security policy management system, and
Policy information stores policy setting information and identification information of a policy in correlation with each other, the policy setting information...
Three-stage, double blind credit rating of securities
Disclosed is a computer-implemented system and method for rating an asset, and, in embodiments, a system and method for performing a double-blind, three stage...
Account contribution management
An ability to expose and display a current billing amount associated with a billing account in a billing system to one or more third parties, and to link one or...
Method and system for labeling and managing the sale of manufactured
In a method for identifying manufactured concrete or masonry blocks and managing the sale thereof to a customer in a retail establishment, the retail...
Marking device docking stations having mechanical docking and methods of
Docking stations and docking methods are provided for use with marking devices used for marking the presence or absence of an underground facility in a dig...
Location-based recovery device and risk management system for portable
computing devices and data
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
Systems and methods for authenticating applications for access to secure
data using identity modules
A mobile station is configured to authenticate applications running thereon in order to control access by the authenticated applications to secure data stored...
Telecommunications device security
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure...
Method and system for controlling the locking/unlocking of the network
access functions of a multifunction terminal
A method and system of controlling the locking/unlocking of the network access functions of a terminal including a security processor, like a mobile telephone...
Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first...
Enhancing messaging services using translation gateways
In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward...
Reliable and non-manipulatable processing of data streams in a receiver
The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet...
Methods and apparatus are disclosed for dynamically discovering and utilizing an optimized network path through overlay routing for the transmission of data. A...
Semiconductor memory device, method of adjusting the same and information
processing system including the same
Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing...
Method of operating integrated circuit embedded with non-volatile
programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
Secure cloud based printing
A printing apparatus includes a first memory, a second memory, a first obtaining section, a second obtaining section, and a retrieving section. The first memory...
Image forming apparatus, control method thereof and computer-readable
This invention provides an image forming apparatus capable of reliably printing security information even when image data of an original document that is...
Image processing apparatus, display apparatus, and image displaying system
An image processing apparatus, a display apparatus and an image displaying system wherein both secure and public images can be efficiently displayed with high...
Virtual player tracking and related services
Various gaming-related services are provided, including but not limited to security services, harm minimization services, player identification services,...
System for protecting sensitive data with distributed tokenization
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information...
Security event management apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive multiple security event data streams from a plurality of hardware processing nodes, the multiple security...
Method and system for cyber security management of industrial control
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
Dynamic authenticated perimeter defense
Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while...
IC card for encryption or decryption process and encrypted communication
system and encrypted communication...
It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC...
Tokenized data security
Provided are devices, methods, systems, computer readable storage media for tokenizing data. In some examples, credit card numbers are tokenized using a...
Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
Methods and systems for increasing the security of network-based
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes...
System and method for device security with a plurality of authentication
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security...
Methods, systems, and computer-readable media with executable instructions stored thereon for managing access authorization to hardware and data resources. A...
Devices, systems, and methods for providing increased security when
multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
Memory controller that includes support for autorun of software or data
An integrated circuit microcontroller supporting Autorun of software or data is disclosed. The integrated circuit microcontroller can be included in a memory...
Data conversion environment
Converting data from a first format to a second format may be used to merge two databases having different formatting. Conversion maps may be defined for pairs...
Secure point of sale terminal
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Data control method of cloud storage
The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage....
Methods, apparatus and systems to improve security in computer systems
In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part...
System and method for secure communications
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that...
Combining a mobile device and computer to create a secure personalized
A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a...
System and method for secure transaction
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
Apparatus, system and method for securing digital documents in a digital
Various embodiments include an apparatus and a method to secure protected digital document content from tampering by their user, such as unauthenticated use or...
Managing a storage cache utilizing externally assigned cache priority tags
A method for caching data in a storage medium implementing tiered data structures may include storing a first portion of critical data at the instruction of a...
Apparatus and method for reorganization of mapping information in flash
An apparatus and method for reorganizing mapping information in a flash memory are provided. The apparatus includes a sector-managing module that secures a...
SMM-dependent GPIO lock for enhanced computer security
Computer security is enhanced by creating an environment in which changing the state of a general-purpose input/output (GPIO) output or changing the...
System and method for optimizing and processing electronic pages in
A web page processing system that processes users requests using predefined, flexible templates and corresponding logic. Main processing handles...
Method for paying for a service offered by means of a data network
A method is proposed for acquiring a service sold over a data network (20) against presentation of a transaction medium (2). The service is ordered by a user...
Integrated investment management system with network datafeed and
incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
Handheld and imbedded devices to detect sticky devices using magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors,...
Car-mounted information apparatus and information transfer system for
To securely prevent from battery depletion and enable transfer data without troubling a user, a communication address data storage unit stores a communication...
Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
Security for wireless communication
A mobile terminal is disclosed which includes a near field or RFID tag (41). The mobile terminal (1) communicates with the mobile telecommunications network and...