At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Transitioning to secure IP communications for encoding, encapsulating, and
An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an...
System and method for network traffic splitting
A system is described where a routing server is configured to receive data packets from one or more servers on a computer network. Data packets may contain...
Composite anti-tamper container with embedded devices
A design and manufacturing methods for reusable, stackable shipping containers made from composite materials is described. The composite material is embedded...
System and method for monitoring security at a premises using line card
with secondary communications channel
A security system includes at least one audio sensor and an alarm panel that transmits alarm report data through a communications network to at least one alarm...
Protecting secret information in a programmed electronic device
A way for securely protecting secret information--for example, a secret key--in a programmed electronic device is provided. A technique is disclosed for...
Process for matching a number N of reception terminals with a number M of
conditional access control cards
The invention relates to a method for matching a number N of reception equipment with a number M of external security modules, each reception equipment being...
System and method for ensuring security of data stored on electronic
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
Integrated physical security control system for computing resources
A computing data center that contains a set of physically isolatable units of computing resources for which a physical security exception action plan is to be...
Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
Secure universal serial bus (USB) storage device and method
A secure Universal Serial Bus (USB) storage device includes a memory controller capable of storing data in and retrieving data from a memory. The secure USB...
Apparatus and method for performing dynamic security testing using static
A computer readable storage medium includes executable instructions to perform a static analysis of a set of target code to identify a first set of security...
Security disposing method and device for input data
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and...
Trustworthy device claims for enterprise applications
Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those...
Methods and systems for secure key entry via communication networks
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be...
Systems and methods for generating trust federation data from BPMN
In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally...
Method for secure data transfer
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has...
Removable drive with data encryption
A removable drive such as a USB drive or key is provided for connecting to computer devices to provide secure and portable data storage. The drive includes a...
Shared secret verification method and system
Method for shared secret verification in secure data exchange, in which at least two parties, indicated as Alice and Bob, each have a secret and seek to...
Authorizing information flows based on a sensitivity of an information
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one...
User device, computer program product and computer system for system for
secure network storage
A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising...
Data updating method, memory system and memory device
A data updating method, a memory system and a memory device in which the memory device is connectable to a host device and has a memory section and a memory...
Secure avionics equipment and associated method of making secure
This invention relates, according to a first aspect, to electronic equipment comprising a processor (2), a memory (11) and a communication module (3) ensuring...
System and method for implementing a secure processor data bus
System and method for implementing a secure processor data bus are described. One embodiment is a circuit comprising a processor disposed in a processor...
Secure transfer of data files
The secure transfer of data files between secure environments (202, 211) is disclosed. At a source environment (202) a user issues a request via a first local...
Cloud based operating and virtual file system
A method for managing a virtual distributed file system includes maintaining by a master device located in a cloud computing environment, a metadata data...
Method and apparatus of securely processing data for file backup,
de-duplication, and restoration
Disclosed are an apparatus and method of restoring at least one data file. The method may include retrieving the at least one data file to be restored from a...
Automation and security application store suggestions based on claims data
A method, system, and computer-readable medium that facilitate the reception of usage data about the utilization of an intelligent home system and insurance...
System and method for managing pedigree information
Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information...
Method and system for secure data collection and distribution
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to...
Method for payload encryption of digital voice or data communications
A process using code segment which is installed over a transport medium, using a device, such as a network, for transmitting real-time end-to-end encrypted...
Printing system and printer with electronic signature capability and
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
Data encryption to provide data security and memory cell bit wear leveling
Method and apparatus for encrypting and storing data to provide data security and memory cell bit wear leveling. In accordance with various embodiments, input...
Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
Tracking device for hospitals, nursing homes, and private use
A tracking system including a tracking device and external transceivers for tracking a patient and providing patient data is presented. The device features a...
System and method for minimizing the amount of data being sent on a
network for supervised security systems
A system and method are disclosed for communicating heartbeat signals representative of the condition of a security system to a monitoring station. A controller...
Transporting and using wagering game data
A wagering game system and its operations are described herein. In embodiments, the operations can include determining a connection of a portable wagering game...
System and method to force a mobile device into a secure state
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination...
Key device with external storage and the using method thereof
A key device with external storage and its method of use, which relates to the computer security technology field, is disclosed herein. The key device with...
Production security control apparatus for software products and control
The present invention relates to a production security control apparatus for software products and the control method thereof. The present invention uses...
Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...
Token mediation service in a data management system
A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data...
System and method for authenticating a smart card using an authentication
token transmitted to a smart card reader
A system for authentication comprises a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to...
Connector and method for providing access to a data-processing network for
a data-processing device
The invention relates to a connector and also to a method for providing access to a data-processing network for a data-processing device, wherein an individual,...
Flash memory device and memory system comprising same
A flash memory device provided here comprises a user data area storing user data; and a security data area storing security data. The security data area stores...
Process for secure backspacing to a first data center after failover
through a second data center and a network...
A method (100) is proposed for safely switching back to a first computer center (DC1) following failover by a second computer center (DC2), where at least one...
Systems and methods for securing information in an electronic file
A computer-implemented method for securing information in an electronic file is described. Data in the electronic file is automatically scanned. Sensitive...
Method, apparatus and system for acquiring service by portable device
The disclosure provides a method, an apparatus and a system for acquiring a service by a portable device, in order to solve the problem that the security of the...
Mechanism to handle events in a machine with isolated execution
A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution "IsoX" mode may leak data when an...
Hardware-based computer theft deterrence
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via...