At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Extending a customer relationship management eventing framework to a cloud
computing environment in a secure manner
A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a...
Systems and methods for software application security management
Systems ands methods for managing service account security are described. The apparatus may include a security record data store that contains information...
Dataspace protection utilizing virtual private networks on a multi-node
A method and apparatus provide data security on a parallel computer system using virtual private networks. An access setup mechanism sets up access control data...
Method and system for improving computer network security
Computers connected to a private network are monitored and controlled through the use of a client agent that operates in association with the computer and a...
Secure dynamic loading
A method for loading, installing and running software, called loading units, having different levels of confidence by a data processing unit (1). The method...
Method and apparatus for connecting to a security token without restarting
A method and apparatus for reconnecting a security token without restarting an application that supports use of the security token. In some embodiments, the...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
A media access control (MAC) security apparatus for a local area network interface includes multiple independently controlled power domains, each of which...
Secure authenticated distance measurement
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and...
Method for misbehaviour detection in secure wireless mesh networks
In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the...
Trusted intermediary for network data processing
A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a...
Systems and methods for split proxying of SSL via WAN appliances
The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a...
Adaptive security policy based scalable video service apparatus and method
An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The...
Secure distribution of media data
A technique for playing a media file by a data processing system. A degraded initial version of the media file is received from a sending data processing...
High performance trading data interface and trading data distribution
A network enables monitors, trading platforms and libraries to share information about customers' trading activities and locally recalculate customer trading...
Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
Method and system providing advice and services to consumers
The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private...
Power meter arrangement
An electric power meter arrangement, includes a metrology unit configured to be coupled to a power line and to determine power consumption and provide...
Apparatus and method for securely providing communications between devices
An apparatus, method, and computer-readable medium for securely providing communications between devices and networks are provided. According to one aspect of...
Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
Systems and methods to secure laptops or portable computing devices
A security system includes an appliance to be secured, including a processor and a first wireless transceiver for accessing a data network with a first power...
Method and apparatus for operation of railroad protection installation
A method and a device operate a railroad security system having trackside devices for specific functions. In order to reduce the number of cable connections,...
Document verification using dynamic document identification framework
Techniques are described for identifying and validating security documents according to a dynamic document identification framework. For example, a security...
Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
Automated banking machine operated responsive to data bearing records with
An automated banking machine is operative to cause financial transfers responsive to data read from data bearing records, such as user cards. The machine...
Data protection method and data protection system
Present invention provides a data protection method, used by a data owner to share data with a data sharer securely through a data distribution system. The data...
System and method for secure communication
A system for secure communication comprises a secure electronic messaging server which is accessible by the public and a database for storing data of messaging...
Microcontroller with secure feature for multiple party code development
Multiple secure environments are established within a system on a chip (SoC) by defining a first secure region within a non-volatile memory in the SoC with a...
Secure data storage and retrieval
A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage...
Securing sensitive data for cloud computing
A system and associated method for securing sensitive data in a cloud computing environment. A customer system has proprietary data as a record stored in a...
Extraction of code level security specification
A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is...
Method and apparatus of encrypting content delivery
A method for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data...
Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
Malware containment and security analysis on connection
Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time...
IP multimedia security
A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second...
Method and integrated circuit for protecting against differential power
In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a...
System and method for securing information by obscuring contents of a
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file...
Secure, two-stage storage system
A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a...
Authenticated nonvolatile memory signing operations
A wireless device includes a nonvolatile memory that handles the task of securely performing integrity checks that do not expose the authentication private key...
Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
System for securing virtual machine disks on a remote shared storage
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
System-on-a-chip (SoC) security using one-time programmable memories
A system-on-a-chip including a first one-time-programmable memory, a second memory, a test interface, an input circuit, and a processor. The input circuit is...
Memory cards including a standard security function
A memory card of one published standard, such as the Multi-Media Card (MMC) or Secure Digital Card (SD), is modified to include the function of a Subscriber...
Method, device, and communications system for managing querying mapping
The present invention discloses a method, a device, and a communications system for managing and querying mapping information. The method for managing mapping...
Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
Method for searching a database or data sharing system for the presence of
A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database...
Contextual gravitation of datasets and data services
Through proactive structured dataset management, suggestions are made for dataset enrichment, cleansing, and other enhancements. Users need not go looking for...
Method for generating a secure copy of media data
A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a...
Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...