At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
System and method for compiling statistics in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
System and method for protecting data in wireless devices
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service...
Wavelength sensing lighting system and associated methods for national
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
Methods, apparatuses, and computer program products for maintaining of
security and integrity of image data
A user interface for masking portions of an image is provided. A controller included in the user interface is arranged for receiving a request for an image,...
Method, system, and computer program product for encryption key management
in a secure processor vault
A method for encryption key management including accepting authenticated unencrypted data into a processor of a server computing device that is configured as a...
Security system and method using automatic meter reading protocol
The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message...
Method and system for secure communication in near field communication
Disclosed is a method for secure communication between a plurality of electronic devices in a Near Field Communication (NFC) network, and a system for...
Method and apparatus for providing secure communications for mobile
A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to...
Communication method, communication terminal, and base station apparatus
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
Locking mechanism and information handling system using the same
A data storage device is inserted in an information handling apparatus, and is prevented from being accidently disconnecting from the information handling...
Image forming apparatus and method of user authentication
An image forming apparatus includes a user authentication function that authorizes a user to operate saved print data with a password without requiring an input...
Electrical connector assembly having a printed circuit board with
soldering holes interconnected to a plurality...
A SATA connector assembly is provided with an insulating housing, a plurality of data and power terminals, a PCB and an FFC, wherein the data and power...
Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
Method and system for managing data in a communication network
A method and a system for managing one or more files in a communication network are provided. The system includes a server, a first client, and a second client....
Pinpointing security vulnerabilities in computer software applications
A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build...
Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
Taint tracking mechanism for computer security
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
Secure computing environment to address theft and unauthorized access
Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in...
Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client...
Systems and methods for secure host resource management
Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system...
Computer system, information processing apparatus, and security protection
According to one embodiment, a computer system includes a server and a client computer. The client computer is connected to the server via a network. The server...
Secure credential management
Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store...
Policy handling for multicast transmissions
A device, receives a unicast packet designating a unicast source and a unicast destination, and determines whether the received unicast packet is a Data...
Transmission of packet data over a network with security protocol
A method, device, system and computer program for providing a transport distribution scheme for a security protocol are disclosed. A first packet data...
Secure remote diagnostic customer support network
A system for accessing data remotely from a network. In one embodiment, the system comprises a first network interface card permitting data transfer between a...
Database and method for controlling access to a database
A method for controlling access to a database is disclosed, as well as a corresponding database system. The method comprises: receiving, from a user, a request...
System, method, and apparatus for trading in a decentralized market
A method and system for facilitating the execution of transactions in a decentralized market are provided herein. The decentralized market includes a number of...
Computer system for evaluating fixed income trade opportunities
Systems and methods embodying the present invention permit a trader of securities such as municipal bonds to observe real-time data relating to actual or...
Communications base station with decision function for distributing
traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
Security module and method of controlling usability of application modules
For a communication terminal (10), proposed is a security module (1) configured to authenticate a telecommunications network (2). The security module (1)...
Biometric identification system
A biometric identification system enabling biometric authentication without a user providing his or her biometric data to an authentication entity, including an...
Assigning nonces for security keys
Secure communications may be implemented by transmitting packet data units with information sufficient to enable a receiving entity to reconstruct a nonce. That...
Storage devices having a security function and methods of securing data
stored in the storage device
A storage device may include a storage unit that stores data transmitted via a plurality of first wires; and a security control unit that controls connection...
Multicast control method in Ethernet Passive Optical Network
A multicast control method in an Ethernet passive optical network, the method includes steps: (A) configuring different id for user-end devices and their user...
Gaming system network and method for delivering gaming media
A gaming system network and gaming method are described. The network includes at least one network access device, a registration database configured to store...
System and method for monitoring and analyzing multiple interfaces and
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
Dynamic provisioning of protection software in a host intrusion prevention
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
Enterprise device recovery
An administrator of an enterprise can recover a user secure storage device in conjunction with a third-party service without the administrator knowing a user...
Method for sharing data
A method for sharing data includes creating a socket serviced by a server application executing within a central operating system environment and creating...
Securing data in a dispersed storage network using shared secret slices
A data element can be encoded into multiple encoded data elements using an encoding algorithm that includes an encoding function and one or more encoder...
Method and apparatus for secure storing of private data on user devices in
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component...
Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
Method, apparatus, and device for protecting against programming attacks
and/or data corruption
The method and accompanying apparatus and device protects against programming attacks and/or data corruption by computer viruses, malicious code, or other types...
Client and host validation based on hash of key and validation of
A data security protection method generates dynamic encryption keys and dynamic decryption keys for a host and a client during data transmission between the...
Method for improving network application security and system thereof
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises...
System and method employing an agile network protocol for secure
communications using secure domain names
A system and method connect a first network device and a second network device by initiating a secure communication link. The system includes one or more...
System and method for deletion of data in a remote computing platform
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some...
Investment strategy system
Embodiments of the present invention relate to apparatuses, systems, methods, and computer program products for determining an investment strategy for a...