At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Holding aid for a personal, hand-held, tablet-shaped device and methods of
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
Automated banking machine operation authorization based on user location
verified by data read from data...
An automated banking machine transaction request is authorized based on the determined location of an authorized user relative to the machine. Identification of...
Banking system controlled responsive to data bearing records
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
Selectively protecting against chosen plaintext attacks in untrusted
storage environments that support data...
Various methods and systems for selectively protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are...
Virtualized secure networking
The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system...
Malware detection using risk analysis based on file system and network
A virtual machine computing platform uses a security virtual machine (SVM) in operational communications with a risk engine which has access to a database...
Secure high-throughput data-center network employing routed firewalls
A reliable and secure data-center. The data center includes a first data-center tier that is adapted to connect to an external network and an internal portion...
Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
Secure customer interface for web based data management
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the...
Garage management system
A garage management and monitoring system defines and manages each operational event in a parking facility. Access events, management events, equipment...
Secure mode indicator for smart phone or PDA
A digital system is provided with a secure mode (3.sup.rd level of privilege) built in a non-invasive way on a processor system that includes a processor core,...
Method and apparatus for providing an asymmetric encrypted cookie for
product data storage
A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an...
Secure portable data transport and storage system
A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and...
Providing security services on the cloud
Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a...
Electronic signature validation systems and methods for asynchronous
A system and method for non-real-time validation of an electronically signed message transmitted via an asynchronous communications link is provided. The method...
Multi-level security software architecture
A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting...
Method of encrypting and transferring data between a sender and a receiver
using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
Media access control security management in physical layer
A media access control (MAC) security (MACsec) function block may implement MACsec protocols on a network. A physical layer device (PHY) may connect to the...
Web application response cloaking
Method and system for centralized control of data transfers between a Web client and a Web application by receiving a response from the Web application. After...
Centralized information technology resources analysis system
SecureFusion is a knowledge management system that integrates asset and risk management of Information technology resources for enterprises and provides metrics...
Using commercial share of wallet in private equity investments
Commercial size of spending wallet ("CSoSW") is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet...
Copy secure multimedia RFID with analog transmitter
A portable RFID device includes an analog modulation radio frequency transmitter and a data storage holding audio data files. In response to user entered...
Maintaining secure communication while transitioning networks
A method and medium are provided for maintaining a secure communication of a media stream as a mobile device transitions from a first network a second network....
Management system including display apparatus and data management
apparatus for displaying data on the display...
In order to restrict a destination of data for security and facilitate acquisition of the data at the destination, a conference system includes an MFP and a...
System and method for managing dynamic network sessions
For an Internet Access Gateway operative between an area network and a public network, managing dynamic network sessions therebetween whereby a primary server...
Wireless communication method and apparatus thereof
A wireless communication apparatus includes a header recognition section that recognizes a header included in a packet. The apparatus also includes a packet...
Method and architecture for a scalable application and security switch
using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...
Secure access to fluid cartridge memory
An integrated fluid cartridge (100) for securing onboard memory (150, 215) includes an electrically actuated dispensing mechanism (120, 205) with a number of...
Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
Teleradiology systems for rendering and visualizing remotely-located
volume data sets
A teleradiology system provides the capability of rendering and studying of a remotely located volume data without requiring transmission of the entire data to...
Data security in a multi-nodal environment
A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a...
Systems and methods for identifying the spreading of sensitive data by a
A computer-implemented method to identify the spreading of sensitive data from a suspicious application is described. At least one security attribute for an...
Firewall+ storage apparatus, method and system
A storage firewall architecture, method and system that works in parallel with existing security technologies and, inter alia, provides application software...
Access control method and apparatus
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of...
Security system and method for computers
A computer security device comprising a processor that is independent of the host CPU for controlling access between the host CPU and the storage device. A...
System for implementing security on telecommunications terminals
A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having...
Memory chip having a security function and for which reading and writing
of data is controlled by an...
According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an...
Systems and methods for securing data using multi-factor or keyed
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
Hardware-facilitated secure software execution environment
A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or...
Apparatus, system, and method for auditing access to secure data
An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module...
Method for making security mechanisms available in wireless mesh networks
A method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in...
Method and system for secure block acknowledgment (block ACK) with
protected MAC sequence number
Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are...
Storage media to storage drive centric security
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage...
Memory system and information processing device
A memory system includes a first memory that is used as a main memory of a target device, a second memory that has an access speed lower than that of the first...
Apparatus and method for consumer-oriented distribution of information
In order to provide a home user with cost-effective PC processing capability, the home user is provided with a terminal which has only sufficient processing...
Computer storage apparatus for multi-tiered data security
A computer storage apparatus. In one embodiment, the apparatus includes: (1) primary file storage, (2) a controller coupled to said primary file storage and...
Sensitive data aliasing for transaction-card and other applications
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing retail transaction information are...
System and method for identifying a point of compromise in a payment
transaction processing system
A system, apparatus, and method for reducing fraud in payment transactions by identifying a potential point of compromise (POC) that may lead to subsequent...