At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Electrocardiograph for magnetic resonance imaging and electrode patch for
An electrode patch (40, 40') enables securing five electrodes (E', A', S', I', N') or six electrodes (V.sub.1', V.sub.6', LA', RA', LL', RL') in a predefined...
Disabling operation of features on a handheld mobile communication device
based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
Near field communication authentication and validation to access corporate
A system for near field communication authentication (NFC) and validation to access corporate data is provided. The system comprises a mobile phone, an...
System, method and program product for location based services, asset
management and tracking
A system for location based services utilizing a mobile device includes a software module configured to operate in a background mode on the mobile device. The...
Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
System and method for securely managing data stored on mobile devices,
such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
User interface for use in security screening providing image enhancement
capabilities and apparatus for...
An apparatus, method and system for facilitating visual identification of a prohibited object in an image during security screening are provided. Data derived...
Hardcopy document security
A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the...
Vehicle security notification device and related methods
A vehicle security device to be installed in a vehicle of a type including a vehicle audio entertainment system being configurable via a vehicle data...
Software program that provides a structured format and verification of
date entered via a touch screen tablet...
A method of recording and monitoring the operation and status of devices operating to purify water employed in the operation of a dialysis clinic, by providing...
The present invention relates to a security element for securing data carriers, having a three-layer thin-film element (20) composed of a reflection layer (22),...
Apparatus and method for POS processing
An apparatus and method for configuring, altering, controlling, securing, and extending the processing capability and functionality of PCs and POS devices using...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Using chipset-based protected firmware for host software tamper detection
A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host...
Methods, systems, and computer readable media for adaptive assignment of
an active security association...
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring...
Preventing password presentation by a computer system
A method, system or computer usable program product for preventing a password from being presented in a data entry field on a computer display including,...
Restoring secure sessions
The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made...
Secure session handling in a device after a policy update
A device may update at least one old policy to a new policy, obtain data exchanged between endpoints of an ongoing communication session, apply the new policy...
Systems and methods for managing application security profiles
Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is...
Methods and systems for secure encryption of data
Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured...
Method and apparatus for including architecture for protecting multi-user
sensitive code and data
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure...
System, method and computer product for sending encrypted messages to
recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
Encryption STE communications through private branch exchange (PBX)
A reach back secure communications terminal includes a digital PBX adapter that offers immediate and secure voice, data and video connectivity over any of...
Apparatuses, methods and systems for a real-time desktop configurer
utilizing a user identifier or an...
The APPARATUSES, METHODS AND SYSTEMS FOR A REAL-TIME DESKTOP CONFIGURER (hereinafter "RTDC") implement efficient and scalable monitoring, regulation, and...
Mobile electronic device having a host processor system capable of
dynamically canging tasks performed by a...
A wireless data platform comprises a plurality of processors. Channels of communication are set up between processors such that they may communicate information...
Secure memory management system and method
The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing...
Financial data processing system
To process financial articles of trade and manage risk, data messages originating from a plurality of sources arranged to trade at least one of securities,...
Method of managing financial instruments, equipment lease derivatives and
other collateral instruments, data...
A computer-implemented process ad methodology that selects collateral instruments such as equipment leases, using mathematical models, based on selection...
Home network system augmentation with remote guidance and local set up and
This application relates to a network including powerline adapters ("PLAs") of the HomePlug Alliance variety or similar implementations such as the European in...
Mobile device controller application for any security system
A method for using any mobile device to manage a security system in retail environments is disclosed in which an application or applet is installed on the...
System and method for OCDMA-based photonic layer security robustness to
A system and method for transporting encrypted data having a transmitter and a receiver is provided. The transmitter generates a sequence of optical pulses,...
Method for making an assured image
A method for producing an assured image acquires image data and segments the image data into one or more spatial regions. One or more quality measures is...
Security method and device for managing access to multimedia contents
A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in...
Secure unauthenticated virtual local area network
An apparatus having a corresponding method and computer program comprises a control circuit to determine a number N of network devices belonging to a virtual...
Enhanced security of optical article
An optical article comprising a first file encoded on the optical article comprising data structure information; a second file encoded on the optical article...
Container data center
A container data center includes a mobile container and a number of servers. The mobile container includes a main room receiving the servers, and an air shower...
Thin data storage device
The present invention is to provide a thin data storage device with a support pad's length positioned at a USB port's height in a way for a supporting segment...
Method for transforming and transporting printer data over the internet in
a secure and reliable manner
A method for managing a plurality of printers connected to a network, the method comprising the following steps: scanning the network to obtain printer usage...
System for remote control of a medical imaging system
A system enables secure, safe remote access and control of stand-alone medical imaging systems whilst maintaining physical separation and independence from the...
Using abnormal mobile station gathering to trigger security measures
A server may detect a threshold number of mobile stations (e.g., total mobile stations or mobile stations belonging to a predefined group) currently located at...
Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
Method and device for classifying and processing data in instant messaging
The embodiment of this invention provides a method for classifying and processing data in an instant messaging system, which includes: classifying the data of...
Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
Key security indicators
Systems, methods and apparatus for a distributed security system that provides security processing for security customers external to network edges of external...
Multichannel device utilizing a centralized out-of-band authentication
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking...
Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
Chip lockout protection scheme for integrated circuit devices and
A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a...
Method and devices for providing secure data backup from a mobile
communication device to an external computing...
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one...
Random wave envelope derived random numbers and their use in generating
transient keys in communication...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
Method for keyless protection of data using a local array of disks
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first...