At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method for arranging communication links in visible light
A method and apparatus for arranging communication links in visible light communication increases the user visibility of the system. The method includes the...
Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
Reference signal multiplexing and resource allocation
A reference signal of a user equipment to which a resource (LB#1) is allocated for a L1/L2 control signal, is allocated a resource (SB#1) that is closer on the...
Method for enhancing security printing
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a...
System and method for turbine bucket tip shroud deflection measurement
A measurement system measures a gap between a plurality of rotating bucket tips and a stationary shroud surface. The system includes a sensor secured to the...
Access control device
The invention relates to an access control device (1) having at least one access barrier element, to which at least one read unit and/or sensor unit for...
Secure reconfiguration of programmable logic
An integrated circuit having secure configuration includes configuration memory, programmable logic resources coupled to the configuration memory, programmable...
Ubiquitous imaging device based check image capture
A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a...
Systems, methods, apparatus of a secure RFID record
Systems, methods and apparatus of a secure RFID record are described herein. In one aspect, an apparatus of a RFID wristband comprises three layers: the top...
Secure authentication feature
A security tag comprising at least one overt data carrier (10), and at least one covert data carrier (25), the covert data carrier comprising a ring (25) that...
Security compliant data storage management
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security...
Network firewall host application identification and authentication
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host...
One button security lockdown of a process control network
Proper function and security of a complex network for communicating data within a process control system may be manually or automatically "locked-down" with a...
Techniques for accessing a backup system
A technique accesses a backup system. The technique involves receiving a logon command to logon a user to a website of the backup system. The backup system...
Variable domain resource data security for data processing systems
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain...
Method and system for dynamic security using authentication server
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from...
Tamper respondent covering
Disclosed is a tamper respondent covering. The tamper respondent covering has a cover-shaped structure to cover an electronic part which is exposed. This...
Security implementation within a browser
Techniques for implementing security within a browser of a data processing system are described herein. According to one embodiment, first data representing a...
Booting and configuring a subsystem securely from non-local storage
According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor...
System and method for providing a script-based collection for devices in a
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
System and method for information sharing across security boundaries
A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes...
Ecommerce system with payment data division
In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
System and method for monitoring securities holdings for related entities
Systems, methods, and computer-executable instruction mechanisms such as programming structures for generating signals representing holdings of securities held...
Home network system augmentation with remote guidance and local set up and
A network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in Opera standard provides for...
A security system having an inner door handle of a door for a vehicle. The door is brought into a locked and unlocked state with a locking system. The security...
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
Cutting tool data verification system and method
A method of operating a machining system includes comparing one or more features of a cutting tool to information stored on a data chip secured to a tool holder...
A cellular communications system is provided in which a user device sends a Service Request to a Mobility Management Entity together with parameter data that...
Image algorithms to reject undesired image features
A method for detecting authorized security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a...
Communication apparatus and communication method
A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals,...
Key management to protect encrypted data of an endpoint computing device
Methods and apparatus involve protecting encrypted data of endpoint computing assets by managing decryption keys. The endpoint has both a traditional operating...
User level security for an emulated removable mass storage device
A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile...
Systems and methods for multicast retransmission over a secure wireless
Systems and methods for broadcast and multicast retransmissions within a protected wireless communications system are described. Retransmitted broadcast or...
Method for securing a telecommunications terminal which is connected to a
terminal user identification module
A method of securing a telecommunication terminal that is connected to a module used to identify a user of the terminal is described. The method includes a step...
Simplified secure symmetrical key management
Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained...
Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...
Wireless internet terminal and packet transmission method for improving
quality of service
Disclosed are a terminal of an OFDMA-TDMA wireless Internet system capable of reducing transmission delay time while securing QoS for uplink data and a packet...
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
Retaining mechanism for data storage device
This invention relates to a retaining mechanism adapted for securing a data storage device having sides formed with a plurality of mounting holes. The retaining...
Drive-up financial transaction machine
Data access reporting platform for secure active monitoring
Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are...
Methods and apparatus for information assurance in a multiple level
security (MLS) combat system
Methods and apparatus are provided for information assurance in a multiple level security (MLS) combat system. A plurality of tasks are executed, where at least...
Eliminating false reports of security vulnerabilities when testing
A system for eliminating false reports of security vulnerabilities when testing computer software, including a taint analysis engine configured to identify a...
Method and apparatus for geographically regulating inbound and outbound
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security...
System and method for securing distributed exporting models in a network
A method is provided in one example implementation and includes identifying a plurality of exporters that are authorized to communicate data to a collector on...
System and method to apply a packet routing policy to an application
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
Method and system for providing data field encryption and storage
An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual...
Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...