At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for virtual banking
Mechanisms for virtual banking are disclosed herein that provide experiences to users as if they were actually interacting with a branch office bank. For...
Document processing systems and methods for regulatory certifications
A processing system is provided for regulatory or tax status certification of investors. Certificates are generated and synchronized with data. The certificates...
Transformation of a multi-leg security definition for calculation of
implied orders in an electronic trading system
An electronic trading system utilizes a Match Engine that receives orders, stores them internally, calculates tradable combinations and advertises the...
Computer apparatus and method for illustrating, issuing, and managing
disability coverage for retirement plans...
A computer-aided method of computing coverage benefit costs for a retirement plan having respective accounts for individuals, the method including the steps of...
Selective security masking within recorded speech utilizing speech
Apparatuses and methods are described to secure information contained within voice recordings. A voice recording is loaded into a data processing system,...
Anti-terrorism water quality monitoring system
An Anti-Terrorism water quality monitoring system for continuously monitoring a potable water treatment system and related potable water distribution network...
System for suppressing vibration in turbomachine components
Disclosed is a system for suppressing vibration and noise mitigation in structures such as blades in turbomachinery. The system includes flexible piezoelectric...
Implantable device for providing electrical stimulation of cervical vagus
nerves for treatment of chronic...
An implantable device for providing electrical stimulation of cervical vagus nerves for treatment of chronic cardiac dysfunction with leadless heart rate...
System and method of determining location of wireless communication
devices/persons for controlling/adjusting...
One or more relay servers can access first data received from one or more first devices (e.g., a phone, tablet computer, vehicle tracking device, or badge...
Security device and system
A security device and system is disclosed. This security device is particularly useful in a security system where there are many security cameras to be...
Location-based security, privacy, access control and monitoring system
A system includes a transmit unit to transmit a signal including a data key, and a receiving unit to receive the signal. The receiving unit to determine an...
Electronic circuit for securing data interchanges between a computer
station and a network
The present invention relates to an electronic circuit for securing data interchanges between a computer station and a network, said circuit comprising a first...
Arrangement comprising an integrated circuit
An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a...
Methods, apparatuses and systems facilitating management of airspace in
wireless computer network environments
Methods, apparatuses and systems facilitating the management of wireless computer network environments and the detection of rogue and other devices that may...
Liquid crystal display device
An LCD device is disclosed. The LCD device includes: a first substrate configured to include an active area in which a plurality of thin film transistors, a...
Hash-based chain of custody preservation
In one embodiment, a chain of custody management application is configured to receive electronic recordings and physical evidence data, associate them with a...
Meteorology and oceanography geospatial analysis toolset
System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing...
Integrated overlay system for mobile devices
The invention is directed to a physical overlay that can be secured to a mobile device and that covers at least a portion of the mobile device's user interface....
Busway joint parameter detection system
A system for detecting an improperly secured busway joint in an electrical distribution busway includes a busway joint parameter sensor, a transmission circuit...
Method and system for uploading near-real-time messages to keypad of a
A method and system for automatically displayed data on a keypad display of a security system. The system receives the data from an external database,...
Semiconductor memory device
An object is to provide a semiconductor memory device which can be miniaturized and also secures a sufficient margin for the refresh period. A memory cell...
Vehicle having side portholes and an array of fixed EO imaging sub-systems
utilizing the portholes
A vehicle including electro-optic (EO) imaging has a vehicle body having an outer surface including a front portion and a side portion, wherein the side portion...
Security feature and method for manufacturing the same
A method for manufacturing a security feature for a security element, a security paper or a data carrier that exhibits a substrate into which at least one...
Banking system controlled responsive to data bearing records
A machine (10) is operative to carry out financial transfers responsive to data included on data bearing records including user cards. The machine includes a...
Seamless secure private collaboration across trust boundaries
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information...
Information security control self assessment
Apparatuses, computer readable media, methods, and systems are described for identifying risk assessment queries for assessing risk of a process, providing the...
Label-based taint analysis
A computer-implemented method and apparatus, adapted to receive a computer program, and dynamically analyze the computer program to determine flow of untrusted...
Information security auditing and incident investigation system
An information security auditing and incident investigation method can include applying a correlation template to query different audit targets in an enterprise...
System and method for active data collection in a network security system
A network security system comprises a plurality of sensors, a management server, and a data collection module. The plurality of sensors receive first data...
Utilizing virtual private networks to provide object level security on a
multi-node computer system
The disclosure herein provides data security on a parallel computer system using virtual private networks connecting the nodes of the system. A mechanism sets...
System, method, and device for communicating and storing and delivering
A system, method, and device optionally includes a server that is isolated from open networks which assigns secure random socket connections, e.g.,...
Firewall proxy systems and methods in a backup environment
According to certain aspects, a method for performing remote backup operations is provided that includes receiving a first unidirectional connection request...
Dynamic access control policy with port restrictions for a network
A network security appliance supports definition of a security policy to control access to a network. The security policy is defined by match criteria including...
Universal authentication token
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a...
Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
Method and system for exchanging setup configuration protocol information
in beacon frames in a WLAN
Certain aspects of a method for enabling exchange of information in a secure communication system may comprise configuring at least one 802.11 client station...
Contextual data aided security protection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In...
Data processing apparatus and method
There is a described a method of certifying compliance with a designated process defined by a plurality of rules which are specified in a public template,...
Systems and methods for a development environment
A developer zone is provided for use by developers. A method for providing a developer zone may include receiving a request, initializing a provisional...
Method and apparatus for non-redundant encrypted storage
For secure non-redundant storage of data, to store a data blocklet (sub-block), one takes a hash of each blocklet. The hash value is used as a key to encrypt...
Collusion-resistant outsourcing of private set intersection
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving an encrypted first data set from a first...
Digital video guard
This invention relates to the veracity of information displayed to a user of a computer, and information provided to a computer by human input devices such as...
Systems and methods for securing data of volume mirrors
Various computer-implemented methods for securing data of replicated volumes are disclosed. In one example, an exemplary method for performing such a task may...
Method for transmitting and receiving data, in particular for secure
exchanges between an aircraft and a ground...
A method for transmitting data, a receiving method, related devices, and an aircraft equipped with the devices. The method includes determining an ...
System and method for protecting master encryption keys
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data...
Out-of band authentication method and system for communication over a data
A method and system for out-of-band authentication of messages transmitted, e.g. as packets, on a communication network, whereby a first stream of data is...
Accessing a remote virtual environment without user authentication
A method, system and computer program product for providing a secure connection between a client and a remote server to run a Virtual Environment (VE),...
Security for collaboration services
Various embodiments, in the form of at least one of systems, methods, and software, are provided that include security solutions for use of collaboration...
Managing secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for managing secure sessions. An identity of a requestor...
System for providing session-based network privacy, private, persistent
storage, and discretionary access...
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored...