At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
In-circuit security system and methods for controlling access to and use
of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
Network device authentication
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active...
Nondestructive interception of secure data in transit
In a data level security environment, the data level security mechanism operates on plaintext data. Data level security operations identify a point in the...
Software based multi-channel polymorphic data obfuscation
A method and system for providing secure communication between a server and a remote client utilizing a polymorphic software platform. In various embodiments,...
Data security policy enforcement
A method for data security policy enforcement including inspecting incoming and outgoing data packets from a server computing device for attributes in...
System for securing virtual machine disks on a remote shared storage
Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an...
Method and system of providing exclusive and secure access to virtual
storage objects in a virtual machine cluster
A system, method, and medium for implementing I/O fencing in a virtual machine cluster sharing virtual storage objects. A volume manager driver receives access...
System and method for optimizing data remanence over hubrid disk clusters
using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
Management of metadata for life cycle assessment data
Management of metadata applied to life cycle inventory (LCI) and life cycle assessment (LCA) data is provided. Life cycle inventory data may be provided through...
Image processing apparatus, image processing system, and control method
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A...
Remote image capture with centralized processing and storage
A system for remote data acquisition and centralized processing and storage provides comprehensive support for processing documents and electronic data...
Method and system to process payment using URL shortening and/or QR codes
Provided is a method and system for payment processing, including emailing a billing statement to a payer by a biller, the billing statement including an online...
On-vehicle communication device
An on-vehicle communication device capable of suppressing a delay in providing information, avoiding congestion, and sufficiently securing transmission power,...
Electrocardiograph for magnetic resonance imaging and electrode patch for
An electrode patch (40, 40') enables securing five electrodes (E', A', S', I', N') or six electrodes (V.sub.1', V.sub.6', LA', RA', LL', RL') in a predefined...
Disabling operation of features on a handheld mobile communication device
based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
Near field communication authentication and validation to access corporate
A system for near field communication authentication (NFC) and validation to access corporate data is provided. The system comprises a mobile phone, an...
System, method and program product for location based services, asset
management and tracking
A system for location based services utilizing a mobile device includes a software module configured to operate in a background mode on the mobile device. The...
Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
System and method for securely managing data stored on mobile devices,
such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
User interface for use in security screening providing image enhancement
capabilities and apparatus for...
An apparatus, method and system for facilitating visual identification of a prohibited object in an image during security screening are provided. Data derived...
Hardcopy document security
A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the...
Vehicle security notification device and related methods
A vehicle security device to be installed in a vehicle of a type including a vehicle audio entertainment system being configurable via a vehicle data...
Software program that provides a structured format and verification of
date entered via a touch screen tablet...
A method of recording and monitoring the operation and status of devices operating to purify water employed in the operation of a dialysis clinic, by providing...
The present invention relates to a security element for securing data carriers, having a three-layer thin-film element (20) composed of a reflection layer (22),...
Apparatus and method for POS processing
An apparatus and method for configuring, altering, controlling, securing, and extending the processing capability and functionality of PCs and POS devices using...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Using chipset-based protected firmware for host software tamper detection
A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host...
Methods, systems, and computer readable media for adaptive assignment of
an active security association...
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring...
Preventing password presentation by a computer system
A method, system or computer usable program product for preventing a password from being presented in a data entry field on a computer display including,...
Restoring secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made...
Secure session handling in a device after a policy update
A device may update at least one old policy to a new policy, obtain data exchanged between endpoints of an ongoing communication session, apply the new policy...
Systems and methods for managing application security profiles
Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is...
Methods and systems for secure encryption of data
Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured...
Method and apparatus for including architecture for protecting multi-user
sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
System, method and computer product for sending encrypted messages to
recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
Encryption STE communications through private branch exchange (PBX)
A reach back secure communications terminal includes a digital PBX adapter that offers immediate and secure voice, data and video connectivity over any of...
Apparatuses, methods and systems for a real-time desktop configurer
utilizing a user identifier or an...
The APPARATUSES, METHODS AND SYSTEMS FOR A REAL-TIME DESKTOP CONFIGURER (hereinafter "RTDC") implement efficient and scalable monitoring, regulation, and...
Mobile electronic device having a host processor system capable of
dynamically canging tasks performed by a...
A wireless data platform comprises a plurality of processors. Channels of communication are set up between processors such that they may communicate information...
Secure memory management system and method
The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing...
Financial data processing system
To process financial articles of trade and manage risk, data messages originating from a plurality of sources arranged to trade at least one of securities,...
Method of managing financial instruments, equipment lease derivatives and
other collateral instruments, data...
A computer-implemented process ad methodology that selects collateral instruments such as equipment leases, using mathematical models, based on selection...
Home network system augmentation with remote guidance and local set up and
This application relates to a network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in...
Mobile device controller application for any security system
A method for using any mobile device to manage a security system in retail environments is disclosed in which an application or applet is installed on the...
System and method for OCDMA-based photonic layer security robustness to
A system and method for transporting encrypted data having a transmitter and a receiver is provided. The transmitter generates a sequence of optical pulses,...
Method for making an assured image
A method for producing an assured image acquires image data and segments the image data into one or more spatial regions. One or more quality measures is...
Security method and device for managing access to multimedia contents
A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in...
Secure unauthenticated virtual local area network
An apparatus having a corresponding method and computer program comprises a control circuit to determine a number N of network devices belonging to a virtual...
Enhanced security of optical article
An optical article comprising a first file encoded on the optical article comprising data structure information; a second file encoded on the optical article...
Container data center
A container data center includes a mobile container and a number of servers. The mobile container includes a main room receiving the servers, and an air shower...
Thin data storage device
The present invention is to provide a thin data storage device with a support pad's length positioned at a USB port's height in a way for a supporting segment...