At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Electrical connector assembly having a printed circuit board with
soldering holes interconnected to a plurality...
A SATA connector assembly is provided with an insulating housing, a plurality of data and power terminals, a PCB and an FFC, wherein the data and power...
Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
Method and system for managing data in a communication network
A method and a system for managing one or more files in a communication network are provided. The system includes a server, a first client, and a second client....
Pinpointing security vulnerabilities in computer software applications
A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build...
Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its...
Taint tracking mechanism for computer security
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
Secure computing environment to address theft and unauthorized access
Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in...
Security device provisioning
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client...
Systems and methods for secure host resource management
Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system...
Computer system, information processing apparatus, and security protection
According to one embodiment, a computer system includes a server and a client computer. The client computer is connected to the server via a network. The server...
Secure credential management
Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store...
Policy handling for multicast transmissions
A device, receives a unicast packet designating a unicast source and a unicast destination, and determines whether the received unicast packet is a Data...
Transmission of packet data over a network with security protocol
A method, device, system and computer program for providing a transport distribution scheme for a security protocol are disclosed. A first packet data...
Secure remote diagnostic customer support network
A system for accessing data remotely from a network. In one embodiment, the system comprises a first network interface card permitting data transfer between a...
Database and method for controlling access to a database
A method for controlling access to a database is disclosed, as well as a corresponding database system. The method comprises: receiving, from a user, a request...
System, method, and apparatus for trading in a decentralized market
A method and system for facilitating the execution of transactions in a decentralized market are provided herein. The decentralized market includes a number of...
Computer system for evaluating fixed income trade opportunities
Systems and methods embodying the present invention permit a trader of securities such as municipal bonds to observe real-time data relating to actual or...
Communications base station with decision function for distributing
traffic across multiple backhauls
A communication station, such as a base station or access point, has multiple backhaul options and distributes backhaul data between the available backhaul...
Security module and method of controlling usability of application modules
For a communication terminal (10), proposed is a security module (1) configured to authenticate a telecommunications network (2). The security module (1)...
Biometric identification system
A biometric identification system enabling biometric authentication without a user providing his or her biometric data to an authentication entity, including an...
Assigning nonces for security keys
Secure communications may be implemented by transmitting packet data units with information sufficient to enable a receiving entity to reconstruct a nonce. That...
Storage devices having a security function and methods of securing data
stored in the storage device
A storage device may include a storage unit that stores data transmitted via a plurality of first wires; and a security control unit that controls connection...
Multicast control method in Ethernet Passive Optical Network
A multicast control method in an Ethernet passive optical network, the method includes steps: (A) configuring different id for user-end devices and their user...
Gaming system network and method for delivering gaming media
A gaming system network and gaming method are described. The network includes at least one network access device, a registration database configured to store...
System and method for monitoring and analyzing multiple interfaces and
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
Dynamic provisioning of protection software in a host intrusion prevention
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
Enterprise device recovery
An administrator of an enterprise can recover a user secure storage device in conjunction with a third-party service without the administrator knowing a user...
Method for sharing data
A method for sharing data includes creating a socket serviced by a server application executing within a central operating system environment and creating...
Securing data in a dispersed storage network using shared secret slices
A data element can be encoded into multiple encoded data elements using an encoding algorithm that includes an encoding function and one or more encoder...
Method and apparatus for secure storing of private data on user devices in
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component...
Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
Method, apparatus, and device for protecting against programming attacks
and/or data corruption
The method and accompanying apparatus and device protects against programming attacks and/or data corruption by computer viruses, malicious code, or other types...
Client and host validation based on hash of key and validation of
A data security protection method generates dynamic encryption keys and dynamic decryption keys for a host and a client during data transmission between the...
Method for improving network application security and system thereof
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises...
System and method employing an agile network protocol for secure
communications using secure domain names
A system and method connect a first network device and a second network device by initiating a secure communication link. The system includes one or more...
System and method for deletion of data in a remote computing platform
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some...
Investment strategy system
Embodiments of the present invention relate to apparatuses, systems, methods, and computer program products for determining an investment strategy for a...
Anti-terrorism water quality monitoring system
An Anti-Terrorism water quality monitoring system for continuously monitoring a potable water treatment system and related potable water distribution network...
Automated positioning of an organic polarized object
A method, system and apparatus to position an organic polarized object to a predetermined orientation and a predetermined location are provided. In an...
System and method for speeding call originations to a variety of devices
using intelligent predictive...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
Method and system to securely transport data encryption keys
A method and system to transport encrypted keys among the participants of a real time communications session are provided. The system may include a message...
Accelerating data communication using tunnels
Methods and systems are provided for increasing application performance and accelerating data communications in a WAN environment. According to one embodiment,...
Hybrid keypad including full travel keys and minimal travel keys
A device for entering information securely in a customer transaction is described. The device may include a keypad comprising a set of full travel keys for...
Extended functionality of RFID devices
It is described a RFID device (231a, 231b, 231c, 331) comprising a data memory (236) and an electronic circuit arrangement (237, 238, 239, 247) coupled thereto....
Writing and reading data system, starting from a chromatic printed
information that modifies patterns emited by...
The present invention allows setting information into a support (paper, cardboard, plastics, etc.) by printing process or different kinds of chromatic settings...
Method and system for deterring product counterfeiting, diversion and
A method and system for authenticating goods and thereby detecting and deterring counterfeits are disclosed. According to one aspect of the invention, a client...
Method and device for accessing microforms
A method for reading analogue and/or digital data, which are stored in fields on a microform, includes using a device for accessing the microform, which device...
System for dynamically encrypting information for secure internet commerce
and providing embedded fulfillment...
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment...
Isolated security monitoring system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for security monitoring. In one aspect, a device includes an...
Detection of and responses to network attacks
Disclosed are various embodiments for detecting and responding to attacks on a computer network. One embodiment of such a method describes monitoring data...