At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method can comprise: providing a first...
Wireless transmission apparatus and wireless transmission method
In DFT-s-OFDM, disclosed are a wireless transmission apparatus and wireless transmission method whereby freedom of allocation of frequencies is secured, while...
CFAST duplication system
The CFAST duplication system allows digital data copy from a master CFAST storage device to multiple target CFAST storage devices. The CFAST duplication system...
Method and apparatus for random-access review of point of sale
The present disclosure includes a system in which a video displayer, having access to video surveillance data and point-of-sale transaction data, provides...
Data carrier with see-through window and method for producing it
A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1,...
Wireless wagering system
A casino game is implemented on the basis of a wireless mobile player unit adapted to play poker, slots, bingo and other casino games. The unit obtains random...
Wireless fluid shut-off valve
A low-cost safety valve for gas lines and similar supply lines that can be remotely activated via a secure wireless link employing a low leakage sealing...
Apparatus and methods for setting security to storage unit and computer
Methods and apparatus are provided for inhibiting data writing to an optical disc drive connected to a computer. A BIOS confirms presence of a security function...
Method and apparatus for detecting potentially misleading visual
representation objects to secure a computer
A method and apparatus for detecting potentially misleading visual representation objects to secure a computer is described. In one embodiment, the method...
Balancing malware rootkit detection with power consumption on mobile
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices....
Apparatus and method for enhancing security of data on a host computing
device and a peripheral device
A method is provided of enhancing security of at least one of a host computing device and a peripheral device. In the method, the host computing device is...
Enforcing good network hygiene using reputation-based automatic
Reputation-based automatic remediation is applied for enforcing good network hygiene of a client. A scanning module scans the client to detect files on the...
Integrity check failure detection and recovery in radio communications
In a packet-based communication between a mobile radio and a base station in a radio communication system, an authenticity of a packet based on authentication...
System for isolating a secured data communication network
A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in...
Application gateway system and method for maintaining security in a
packet-switched information network
A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network...
Triple authentication: mobile hardware, mobile user, and user account
Enhanced network security is provided by requiring three types of information to be authenticated: user information identifying a user, security information...
Row-level security with expression data type
Systems, methods, and other embodiments associated with row level security for a database table are described. One example method includes detecting an access...
Method and system for distribution of media
A system for the distribution of media is disclosed. The system comprises a network center; a delivery system for receiving data from and transmitting data to...
Retrofitting authentication onto firmware
The present invention provides an inexpensive, software-based security-retrofit solution to verify the integrity of program code in embedded systems, or...
Apparatus and method for a networked power management system for security
and life safety applications
An apparatus includes a data manager and interface logic with a plurality of interface ports including at least one network interface port. The data manager and...
System and method for securely storing cryptographic keys with encrypted
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
System and method for a secure I/O interface
A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware...
Managing secure communications with software environments
A method and system for use in managing secure communications with software environments is disclosed. In at least one embodiment, the method and system...
Method of authentication and secure exchange of data between a
personalised chip and a dedicated server, and...
Authentication and secure wireless data exchange is provided between a chip with an identification code and a dedicated server via a read unit, which carries...
Method and device for storing secured sent message data
Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device...
Storage apparatus mounting frame, storage extension apparatus, and method
of controlling storage apparatus
By having a storage apparatus attachment portion that secures a storage apparatus; a data read prevention processing unit that makes at least a part of data...
Methods and system for simultaneous multiple rules checking
A method and system for checking data against a plurality of rules simultaneously. A data string having keywords in the data string is received. All of the...
Systems and methods for improved multisite management of converged
communication systems and computer systems
An improved systems and methods for multisite management of computer server systems and in particular converged communication systems based on a decentralized...
Method and apparatus for implementing serialized state data management for
Disclosed is a system and technique for the consumption and management of persistent data (application "state" data) for use with any computer application...
Probabilistic fingerprint checking for preventing data leakage
A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of...
Website submission security monitor
Consumer data that is submitted through a company's website is tagged and then monitored to assure that the consumer data is not used for unauthorized purposes....
Biometric identification device and methods for secure transactions
The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides...
System and method for secure communications involving an intermediary
A system and method for communicating information or a cryptographic key therefore between a first party and a second party, comprising the steps of receiving,...
Obtaining consent for electronic delivery of compliance information
A method and related system obtains consent from an individual for computer-aided delivery of compliance information. Initially, a computer-readable data...
Electronic payment using a proxy account number stored in a secure element
A near field communication payment method using a proxy account number. The method comprises transmitting a proxy account number from a secure element of a...
Secure control system for opening locking devices by encrypted acoustic
The invention relates to a system implements a mobile phone (20) available to a user (18) authorized to open a lock (22). A remote management site (10) includes...
Secure self managed data (SSMD)
A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of...
Enforcing software independent content protection in an electronic device
A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and...
Method and system for enryption key versioning and key rotation in a
Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a...
Data transmission apparatus and method, and data reconstitution apparatus
Disclosed are data transmission/reception apparatus and method that may be applied to a case where additional data is to be transmitted in a CE-OFDM...
Mobile IP data communication system comprising a mobile router that
detects a change in connection status
The present invention provides a data communication technology which is capable of securing flexibly a bandwidth for a traffic that is generated and which...
Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
Data retention kill function
Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon...
Printing system for maintaining confidentiality of print jobs
A printing apparatus to process a print job is provided. The printing apparatus includes a printing unit to form an image according to print data, a displaying...
Gaming device and secure interface
An improved gaming device with a secure interface has been developed. The invention includes an electronic gaming device with internal components, software and...
Secure data protection optically variable labels and foils
An optical security label for security and anti-counterfeit applications comprises a first layer having an optically variable portion (diffractive, holographic...
Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
Secure user interface content
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for handling secure user interface content. In one aspect, a...
Method and apparatus for distributed intrusion protection system for ultra
high bandwidth networks
A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data...