At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Natural language interface, compiler and de-compiler for security policies
A method and system for enabling non-programmers to create certifiable Extensible Access Control Markup Language (XACML) policies. The graphical user interface...
Secure orthogonal frequency multiplexed optical communications
The invention provides a system and method for secure communication that involve encoding and transmitting an optical orthogonal frequency division multiplexed...
Security printing analysis system and method for enhancing security
A method for enhancing security printing includes generating data for a region of interest (14), where the data includes information for at least one of...
Key distribution method and system
This invention discloses a key distribution method and system. The method includes: notifying, by an application provider management platform, a supplementary...
Method for the secure loading in a NFC chipset of data allowing access to
A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving...
Just in time delivery of entitlement control messages (ECMs) and other
essential data elements for television...
Essential data elements, particularly entitlement control messages (ECMs), are inserted in a manner that reduces the overhead bit rate without effecting overall...
Content playback APIS using encrypted streams
One embodiment of the present invention sets forth a technique for decrypting digital content in a secure environment. The technique includes the steps of...
Methods and apparatus for secure distribution and storage of data using N
Methods and apparatus are provided for secure distribution and storage of data using N channels. An input data sequence, X, is distributed using a plurality, N,...
Negotiated secure fast table lookups for protocols with bidirectional
During connection establishments for a protocol with bidirectional identifiers, connection data is allocated, the locally selected identifier is a pointer to...
Transitioning to secure IP communications for encoding, encapsulating, and
An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an...
System and method for network traffic splitting
A system is described where a routing server is configured to receive data packets from one or more servers on a computer network. Data packets may contain...
Composite anti-tamper container with embedded devices
A design and manufacturing methods for reusable, stackable shipping containers made from composite materials is described. The composite material is embedded...
System and method for monitoring security at a premises using line card
with secondary communications channel
A security system includes at least one audio sensor and an alarm panel that transmits alarm report data through a communications network to at least one alarm...
Protecting secret information in a programmed electronic device
A way for securely protecting secret information--for example, a secret key--in a programmed electronic device is provided. A technique is disclosed for...
Process for matching a number N of reception terminals with a number M of
conditional access control cards
The invention relates to a method for matching a number N of reception equipment with a number M of external security modules, each reception equipment being...
System and method for ensuring security of data stored on electronic
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
Secure universal serial bus (USB) storage device and method
A secure Universal Serial Bus (USB) storage device includes a memory controller capable of storing data in and retrieving data from a memory. The secure USB...
Apparatus and method for performing dynamic security testing using static
A computer readable storage medium includes executable instructions to perform a static analysis of a set of target code to identify a first set of security...
Security disposing method and device for input data
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and...
Trustworthy device claims for enterprise applications
Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those...
Methods and systems for secure key entry via communication networks
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be...
Systems and methods for generating trust federation data from BPMN
In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally...
Method for secure data transfer
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has...
Removable drive with data encryption
A removable drive such as a USB drive or key is provided for connecting to computer devices to provide secure and portable data storage. The drive includes a...
Shared secret verification method and system
Method for shared secret verification in secure data exchange, in which at least two parties, indicated as Alice and Bob, each have a secret and seek to...
Authorizing information flows based on a sensitivity of an information
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one...
User device, computer program product and computer system for system for
secure network storage
A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising...
Data updating method, memory system and memory device
A data updating method, a memory system and a memory device in which the memory device is connectable to a host device and has a memory section and a memory...
Secure avionics equipment and associated method of making secure
This invention relates, according to a first aspect, to electronic equipment comprising a processor (2), a memory (11) and a communication module (3) ensuring...
System and method for implementing a secure processor data bus
System and method for implementing a secure processor data bus are described. One embodiment is a circuit comprising a processor disposed in a processor...
Secure transfer of data files
The secure transfer of data files between secure environments (202, 211) is disclosed. At a source environment (202) a user issues a request via a first local...
Cloud based operating and virtual file system
A method for managing a virtual distributed file system includes maintaining by a master device located in a cloud computing environment, a metadata data...
Method and apparatus of securely processing data for file backup,
de-duplication, and restoration
Disclosed are an apparatus and method of restoring at least one data file. The method may include retrieving the at least one data file to be restored from a...
Automation and security application store suggestions based on claims data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and insurance...
System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
Method and system for secure data collection and distribution
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to...
Method for payload encryption of digital voice or data communications
A process using code segment which is installed over a transport medium, using a device, such as a network, for transmitting real-time end-to-end encrypted...
Printing system and printer with electronic signature capability and
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
Data encryption to provide data security and memory cell bit wear leveling
Method and apparatus for encrypting and storing data to provide data security and memory cell bit wear leveling. In accordance with various embodiments, input...
Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
Tracking device for hospitals, nursing homes, and private use
A tracking system including a tracking device and external transceivers for tracking a patient and providing patient data is presented. The device features a...
System and method for minimizing the amount of data being sent on a
network for supervised security systems
A system and method are disclosed for communicating heartbeat signals representative of the condition of a security system to a monitoring station. A controller...
Transporting and using wagering game data
A wagering game system and its operations are described herein. In embodiments, the operations can include determining a connection of a portable wagering game...
System and method to force a mobile device into a secure state
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination...
Key device with external storage and the using method thereof
A key device with external storage and its method of use, which relates to the computer security technology field, is disclosed herein. The key device with...
Production security control apparatus for software products and control
The present invention relates to a production security control apparatus for software products and the control method thereof. The present invention uses...
Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...