At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for transforming and transporting printer data over the internet in
a secure and reliable manner
A method for managing a plurality of printers connected to a network, the method comprising the following steps: scanning the network to obtain printer usage...
System for remote control of a medical imaging system
A system enables secure, safe remote access and control of stand-alone medical imaging systems whilst maintaining physical separation and independence from the...
Using abnormal mobile station gathering to trigger security measures
A server may detect a threshold number of mobile stations (e.g., total mobile stations or mobile stations belonging to a predefined group) currently located at...
Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
Method and device for classifying and processing data in instant messaging
The embodiment of this invention provides a method for classifying and processing data in an instant messaging system, which includes: classifying the data of...
Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
Key security indicators
Systems, methods and apparatus for a distributed security system that provides security processing for security customers external to network edges of external...
Multichannel device utilizing a centralized out-of-band authentication
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking...
Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
Chip lockout protection scheme for integrated circuit devices and
A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a...
Method and devices for providing secure data backup from a mobile
communication device to an external computing...
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one...
Random wave envelope derived random numbers and their use in generating
transient keys in communication...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
Method for keyless protection of data using a local array of disks
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first...
System and method of securing and authorizing multidimensional
In one embodiment the present invention includes a system for securing and authorizing access to multidimensional transactional data. The system includes online...
Secure targeted personal buying/selling method and system
Embodiments described herein include a buying and selling method including receiving a request from a user to book a ticket for an event, determining a time for...
Systems and methods for improved financial calculators
In various embodiments, financial calculators with improved data security and data integration, collecting, managing and sharing data generated by a user are...
Optical communication system and method for secure data communication
using quantum key distribution
The invention provides time-synchronised transmission of data on the (polarisation or phase-modulated) QKD channel and the (on-off modulated) conventional...
Apparatus and method for image processing using security function
An image processing apparatus includes: a user input unit that converts input manipulation of a user into an input signal; a security setting unit that sets a...
Configuring a user interface for use with an overlay
An overlay secured to a mobile device and positioned over a portion of a touch-activated user interface on the mobile device functions as a guide and includes...
Security enclosure for a router
A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a...
Holding aid for a personal, hand-held, tablet-shaped device and methods of
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
Automated banking machine operation authorization based on user location
verified by data read from data...
An automated banking machine transaction request is authorized based on the determined location of an authorized user relative to the machine. Identification of...
Banking system controlled responsive to data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
Selectively protecting against chosen plaintext attacks in untrusted
storage environments that support data...
Various methods and systems for selectively protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are...
Virtualized secure networking
The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system...
Malware detection using risk analysis based on file system and network
A virtual machine computing platform uses a security virtual machine (SVM) in operational communications with a risk engine which has access to a database...
Secure high-throughput data-center network employing routed firewalls
A reliable and secure data-center. The data center includes a first data-center tier that is adapted to connect to an external network and an internal portion...
Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
Secure customer interface for web based data management
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the...
Garage management system
A garage management and monitoring system defines and manages each operational event in a parking facility. Access events, management events, equipment...
Secure mode indicator for smart phone or PDA
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
Method and apparatus for providing an asymmetric encrypted cookie for
product data storage
A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an...
Secure portable data transport and storage system
A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and...
Providing security services on the cloud
Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a...
Electronic signature validation systems and methods for asynchronous
A system and method for non-real-time validation of an electronically signed message transmitted via an asynchronous communications link is provided. The method...
Multi-level security software architecture
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting...
Method of encrypting and transferring data between a sender and a receiver
using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
Media access control security management in physical layer
A media access control (MAC) security (MACsec) function block may implement MACsec protocols on a network. A physical layer device (PHY) may connect to the...
Web application response cloaking
Method and system for centralized control of data transfers between a Web client and a Web application by receiving a response from the Web application. After...
Centralized information technology resources analysis system
SecureFusion is a knowledge management system that integrates asset and risk management of Information technology resources for enterprises and provides metrics...
Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
Copy secure multimedia RFID with analog transmitter
A portable RFID device includes an analog modulation radio frequency transmitter and a data storage holding audio data files. In response to user entered...
Maintaining secure communication while transitioning networks
A method and medium are provided for maintaining a secure communication of a media stream as a mobile device transitions from a first network a second network....
Management system including display apparatus and data management
apparatus for displaying data on the display...
In order to restrict a destination of data for security and facilitate acquisition of the data at the destination, a conference system includes an MFP and a...
System and method for managing dynamic network sessions
For an Internet Access Gateway operative between an area network and a public network, managing dynamic network sessions therebetween whereby a primary server...
Wireless communication method and apparatus thereof
A wireless communication apparatus includes a header recognition section that recognizes a header included in a packet. The apparatus also includes a packet...
Method and architecture for a scalable application and security switch
using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...
Secure access to fluid cartridge memory
An integrated fluid cartridge (100) for securing onboard memory (150, 215) includes an electrically actuated dispensing mechanism (120, 205) with a number of...