At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Process for secure backspacing to a first data center after failover
through a second data center and a network...
A method (100) is proposed for safely switching back to a first computer center (DC1) following failover by a second computer center (DC2), where at least one...
Systems and methods for securing information in an electronic file
A computer-implemented method for securing information in an electronic file is described. Data in the electronic file is automatically scanned. Sensitive...
Method, apparatus and system for acquiring service by portable device
The disclosure provides a method, an apparatus and a system for acquiring a service by a portable device, in order to solve the problem that the security of the...
Mechanism to handle events in a machine with isolated execution
A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution "IsoX" mode may leak data when an...
Hardware-based computer theft deterrence
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via...
Motion-detecting device user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
Method for secure data exchange between two devices
This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device (10) is a...
On-the-fly data masking
Described are methods, systems, and apparatus, including computer program products for securing data of a production server. The invention, in one ...
Portable security device and methods of user authentication
Disclosed a portable security device and methods for secure user authentication. The security device stores operating system agents that enable communication...
Data deleting method and apparatus
A data deleting method and apparatus is provided in embodiments of this application. The method comprises: when a file system detects a delete request for a...
Uploading and executing command line scripts
A mechanism is provided for a non-root-level user to execute command line script files via a generic command line interface. A command line interface in the...
Systems, methods, and computer program products for providing real time
analytic widgets in a financial trading...
Methods, systems, and computer program products are provided for providing real time analytics and monitoring to a user of a securities trading system. In one...
System and method of secure message processing
A system and method for handling message indicator processing on a wireless mobile communications device. Message state data is stored in a cache for use in...
Data security system
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior...
Wireless communication device with securely added randomness and related
A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely...
Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
Method and apparatus for encrypting a discrete signal, and method and
apparatus for decrypting
In an inventive method for encrypting a discrete signal consisting of successive samples the successive samples are subdivided into successive time blocks, and...
Data transmitter with a secure and efficient signature
An encryption device encrypts a first block of user data to obtain a first encryption result and encrypts a second block of user data, which follows the first...
Automated operation and security system for virtual private networks
A node device provides secure communication services over a data network, such as the Internet or another public or private packet switched network, to multiple...
Quality of service securing method and apparatus
A quality of service (QoS) securing apparatus and method using a communication protocol is provided. The QoS securing method is performed by a reception side...
Semiconductor device and method for fabricating the same
A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed...
Automated banking machine that operates responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking...
Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
Wireless hotspot with lightweight anti-malware
A mobile computing device, such as a mobile phone, serves as a wireless hotspot for other mobile computing devices. The other mobile computing devices connect...
Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
Systems, methods, and media for enforcing a security policy in a network
including a plurality of components
Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing...
Secure user interaction using virtualization
A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the...
Secure remote authentication through an untrusted network
A method for securely authenticating a user of a portable consumer device at an access device comprising the following steps. First, a dynamic data element and...
System and method for inferring access policies from access event records
A method of security gateway policy definition to quickly infer a new policy based on event data extracted and analyzed using business logic and workflow from a...
Providing security for queries to electronic product code information
Methods and apparatus, including computer program products, implementing and using techniques for protecting data residing in a repository of an electronic...
Secure dynamically reconfigurable logic
A mechanism for securely and dynamically reconfiguring reconfigurable logic is provided. A state machine within a data processing system establishes a hardware...
Secure field-programmable gate array (FPGA) architecture
A method and system for configuring a field-programmable gate array (FPGA) includes receiving an encrypted FPGA load-decryption key at an FPGA from a remote...
Secure media peripheral association in a media exchange network
A method for establishing secure access to a media peripheral in a home via a node in a communication network includes acquiring by the node, security data...
Methods and apparatus for peer-to-peer transfer of secure data using near
The present invention discloses an apparatus and method of transferring data from a first device to a second device. The method includes transmitting a request...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Secure storage management system and method
A storage management system and method for managing access between a plurality of processes and a common store. In one embodiment, each individual process...
System and method employing an agile network protocol for secure
communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
System and method for compiling statistics in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
System and method for processing messages being composed by a user
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the...
System and method for protecting data in wireless devices
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service...
Wavelength sensing lighting system and associated methods for national
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
Methods, apparatuses, and computer program products for maintaining of
security and integrity of image data
A user interface for masking portions of an image is provided. A controller included in the user interface is arranged for receiving a request for an image,...
Method, system, and computer program product for encryption key management
in a secure processor vault
A method for encryption key management including accepting authenticated unencrypted data into a processor of a server computing device that is configured as a...
Security system and method using automatic meter reading protocol
The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message...
Method and system for secure communication in near field communication
Disclosed is a method for secure communication between a plurality of electronic devices in a Near Field Communication (NFC) network, and a system for...
Method and apparatus for providing secure communications for mobile
A method and apparatus that enables secure communications from a wireless communication device is disclosed. The method may include receiving a signal to...
Communication method, communication terminal, and base station apparatus
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
Locking mechanism and information handling system using the same
A data storage device is inserted in an information handling apparatus, and is prevented from being accidently disconnecting from the information handling...
Image forming apparatus and method of user authentication
An image forming apparatus includes a user authentication function that authorizes a user to operate saved print data with a password without requiring an input...