At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Security device and system
A security device and system is disclosed. This security device is particularly useful in a security system where there are many security cameras to be...
Location-based security, privacy, access control and monitoring system
A system includes a transmit unit to transmit a signal including a data key, and a receiving unit to receive the signal. The receiving unit to determine an...
Electronic circuit for securing data interchanges between a computer
station and a network
The present invention relates to an electronic circuit for securing data interchanges between a computer station and a network, said circuit comprising a first...
Arrangement comprising an integrated circuit
An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a...
Methods, apparatuses and systems facilitating management of airspace in
wireless computer network environments
Methods, apparatuses and systems facilitating the management of wireless computer network environments and the detection of rogue and other devices that may...
Liquid crystal display device
An LCD device is disclosed. The LCD device includes: a first substrate configured to include an active area in which a plurality of thin film transistors, a...
Hash-based chain of custody preservation
In one embodiment, a chain of custody management application is configured to receive electronic recordings and physical evidence data, associate them with a...
Meteorology and oceanography geospatial analysis toolset
System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing...
Integrated overlay system for mobile devices
The invention is directed to a physical overlay that can be secured to a mobile device and that covers at least a portion of the mobile device's user interface....
Busway joint parameter detection system
A system for detecting an improperly secured busway joint in an electrical distribution busway includes a busway joint parameter sensor, a transmission circuit...
Method and system for uploading near-real-time messages to keypad of a
A method and system for automatically displayed data on a keypad display of a security system. The system receives the data from an external database,...
Semiconductor memory device
An object is to provide a semiconductor memory device which can be miniaturized and also secures a sufficient margin for the refresh period. A memory cell...
Vehicle having side portholes and an array of fixed EO imaging sub-systems
utilizing the portholes
A vehicle including electro-optic (EO) imaging has a vehicle body having an outer surface including a front portion and a side portion, wherein the side portion...
Security feature and method for manufacturing the same
A method for manufacturing a security feature for a security element, a security paper or a data carrier that exhibits a substrate into which at least one...
Banking system controlled responsive to data bearing records
A machine (10) is operative to carry out financial transfers responsive to data included on data bearing records including user cards. The machine includes a...
Seamless secure private collaboration across trust boundaries
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information...
Information security control self assessment
Apparatuses, computer readable media, methods, and systems are described for identifying risk assessment queries for assessing risk of a process, providing the...
Label-based taint analysis
A computer-implemented method and apparatus, adapted to receive a computer program, and dynamically analyze the computer program to determine flow of untrusted...
Information security auditing and incident investigation system
An information security auditing and incident investigation method can include applying a correlation template to query different audit targets in an enterprise...
System and method for active data collection in a network security system
A network security system comprises a plurality of sensors, a management server, and a data collection module. The plurality of sensors receive first data...
Utilizing virtual private networks to provide object level security on a
multi-node computer system
The disclosure herein provides data security on a parallel computer system using virtual private networks connecting the nodes of the system. A mechanism sets...
System, method, and device for communicating and storing and delivering
A system, method, and device optionally includes a server that is isolated from open networks which assigns secure random socket connections, e.g.,...
Firewall proxy systems and methods in a backup environment
According to certain aspects, a method for performing remote backup operations is provided that includes receiving a first unidirectional connection request...
Dynamic access control policy with port restrictions for a network
A network security appliance supports definition of a security policy to control access to a network. The security policy is defined by match criteria including...
Universal authentication token
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a...
Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
Method and system for exchanging setup configuration protocol information
in beacon frames in a WLAN
Certain aspects of a method for enabling exchange of information in a secure communication system may comprise configuring at least one 802.11 client station...
Contextual data aided security protection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In...
Data processing apparatus and method
There is a described a method of certifying compliance with a designated process defined by a plurality of rules which are specified in a public template,...
Systems and methods for a development environment
A developer zone is provided for use by developers. A method for providing a developer zone may include receiving a request, initializing a provisional...
Method and apparatus for non-redundant encrypted storage
For secure non-redundant storage of data, to store a data blocklet (sub-block), one takes a hash of each blocklet. The hash value is used as a key to encrypt...
Collusion-resistant outsourcing of private set intersection
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving an encrypted first data set from a first...
Digital video guard
This invention relates to the veracity of information displayed to a user of a computer, and information provided to a computer by human input devices such as...
Systems and methods for securing data of volume mirrors
Various computer-implemented methods for securing data of replicated volumes are disclosed. In one example, an exemplary method for performing such a task may...
Method for transmitting and receiving data, in particular for secure
exchanges between an aircraft and a ground...
A method for transmitting data, a receiving method, related devices, and an aircraft equipped with the devices. The method includes determining an ...
System and method for protecting master encryption keys
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data...
Out-of band authentication method and system for communication over a data
A method and system for out-of-band authentication of messages transmitted, e.g. as packets, on a communication network, whereby a first stream of data is...
Accessing a remote virtual environment without user authentication
A method, system and computer program product for providing a secure connection between a client and a remote server to run a Virtual Environment (VE),...
Security for collaboration services
Various embodiments, in the form of at least one of systems, methods, and software, are provided that include security solutions for use of collaboration...
Managing secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for managing secure sessions. An identity of a requestor...
System for providing session-based network privacy, private, persistent
storage, and discretionary access...
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored...
Surveillance, monitoring and real-time events platform
Systems and methods according to the invention provide a surveillance, monitoring and real-time events platform to (i) enable the integration and communication...
Method and system for real time system log integrity protection
A method and system for managing integrity of system log file data. The system comprises a first component which, using a hook in a kernel of an operating...
Method and system for data update synchronization by two-phase commit
In an integrated management database system having a plurality of element databases holding the configuration information about an information system and an...
Purchase transaction system with encrypted payment card data
Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The...
Reprogrammable security for controlling piracy and enabling interactive
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
Methods and apparatus for title structure and management
A title management apparatus resident on a first computer including a memory for storing a control program and data, and a processor for executing the control...
Method and apparatus for mounting a data transmission device in a
Method and apparatus for mounting a data transmission device in a communication system including and adhesive pad with pull tab and raised border portions is...
Method and apparatus for securing data in a memory device
A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the...
Security method for preventing the unauthorized use of multimedia contents
A method embeds tracing secret data into multimedia contents delivered to particular users. The method descrambles a first scrambled video stream having...