At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for issuing and redeeming incentives on electronic data
A system for issuing, redeeming and monitoring incentive offers generated in response to qualifying on-line and off-line non-purchase activities. For example,...
Diagnostic image security system
A method for restricting unauthorised access to a patient's diagnostic images. Patient identification data is stored in a first database and diagnostic images...
Flexible architecture for location based crowdsourcing of contextual data
A system for the collection, aggregation and analysis of location based crowdsourcing data includes a server that server that controls the distribution of...
Method and system for pairing of wireless devices using physical presence
Techniques that facilitate pairing of wireless devices with other wireless devices are disclosed. Once paired, the wireless devices can exchange data in a...
System and method for documenting patient procedures
The local surveillance sub-system recognizes that a patient medical procedure has or will soon commence by sensing the presence of a healthcare professional in...
Flexible data entry device
A data entry device includes a flexible base, a receiving module, a rolling mechanism, and a stop mechanism. The receiving module includes a sleeve and a...
Global positioning systems and methods for asset and infrastructure
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
Optically readable identification security tag or stamp
The invention relates to a security tag made by randomly distributing a mixture of large numbers of multicolored objects into a unique, non-reproducible...
Banking system controlled responsive to data bearing records
An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a...
Authenticating use of a dispersed storage network
At least one dispersed storage (DS) processing unit (14), at least one dispersed storage managing unit (18), and at least one dispersed storage unit (44)...
Client authentication and data management system
Methods and systems for performing an authenticated boot (310); performing a continuous data protection (350); performing automatic protection and optionally a...
Method for securely storing a programmable identifier in a communication
Disclosed is a method for storing an identifier in a first station having a secure non-volatile data store protected by cryptographic data, an identifier flag...
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common...
System and method for securely provisioning and generating
one-time-passwords in a remote device
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM...
Efficient security information distribution
Methods and software for distributing several data objects containing status information about security certificates, and a directory of the data objects,...
Secure data transfer over a network
A system and method are described for secure data transfer over a network. According to an exemplary embodiment a system for secure data transfer over a network...
Automatically configuring a computer firewall based on network connection
A method, system, and policy file data structure stored on computer-readable medium comprise reading a policy identifier field containing data representing an...
Digital information infrastructure and method for security designated data
and with granular data stores
Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a...
Automatic data validation and correction
Techniques disclosed herein include systems and methods for data validation and correction. Such systems and methods can reduce costs, improve productivity,...
Method and system for management of security rule set
There are provided a method of automated managing two or more security rule-sets and a system thereof. The method comprises: obtaining data characterizing a...
Method of improving security in electronic transactions
A computerized method (10) is provided which improves data security in electronic transactions in an insecure network (12). This is accomplished when the method...
System and method for administering invested funds
A computer system for administering investment funds holding shares of funds includes a processor and a memory storage device in communication with the...
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
System for securing a mobile terminal
A method and apparatus for securing user data on a mobile device using a Bluetooth fob. The method and apparatus enables robust access security, issues alerts...
System and method for remotely securing or recovering a mobile device
The present invention provides a system and method for remotely securing, accessing, and managing a mobile device or group of mobile devices. The invention...
Binding keys to secure media streams
A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media...
Method and system for secure access and processing of an
Secure access and processing of an encryption/decryption key may include generating one or more keys within a key controller block of a chip. The generated keys...
System and method for secure transaction of data between a wireless
communication device and a server
The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication,...
Efficient key derivation for end-to-end network security with traffic
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each...
Data security for dynamic random access memory using body bias to clear
data at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
Remote keyless entry transmitter
A remote wireless keyless entry transmitter includes a communications interface for connecting the transmitter directly to an in-vehicle network for registering...
Method and terminal for providing controlled access to a memory card
There is provided a method for providing access to data securely stored in a memory card. An exemplary method comprises receiving the memory card in a terminal....
Information processing apparatus and image processing program
There is described an information processing apparatus, which makes it possible to prevent a third party from stealing and using data owned by the correctly...
Techniques for detecting and preventing unintentional disclosures of
Protection is provided to prevent a computer user from unintentionally giving away sensitive data (e.g., security credentials, credit card number, PINs,...
A security apparatus positioned between at least one domain having a level of trust or of sensitivity A and at least one domain having a level of trust or...
Device for receiving messages, in particular within the framework of
secure data exchanges, associated aircraft...
A device and method for receiving messages each having an order number includes a storage to store a plurality of prior-reception statuses, a mechanism to...
VPN network client for mobile device having fast reconnect
A virtual private network client for cellular mobile devices is described. The VPN network client establishes a secure VPN connection with a remote VPN security...
Systems and methods for computer network defense II
This invention discloses a technique of computer network defense. The technique is called Random IP-Security (RIP-Sec) 30, and it may preferably be deployed in...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
Data transmission management server and method
A data transmission management server for managing a terminal device to access a network resource providing server by a source gateway in a virtual private...
System and method for providing security for SIP-based communications
A security device for SIP communications operates to inhibit the effect of malicious attacks and/or inadvertent erroneous events on the provision of SIP-based...
System and method for digital rights management of digital video
A system and method for Digital Right Management (DRM) of Digital Video Broadcasting (DVB). The system for DRM of DVB includes a DVB transmitting device for...
Method and system for secure data storage
A secure storage device includes a storage medium configured to securely store data received from a host. The storage device further includes a host interface...
Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
Secure data access methods and apparatus
Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a...
Systems, devices, and methods for securely transmitting a security
parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
System and method for device bound public key infrastructure
Techniques are provided secured communication of data, such as in the context of a public key infrastructure (PKI). In one embodiment, the technique may involve...
Enterprise computer investigation system
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
Method for secure dynamic bandwidth allocation in a TT ethernet
A communication method for transmitting TT Ethernet messages is a distributed real-time system, including a plurality of node computers. Each node computer has...
Systems, methods, and media for retransmitting data using the secure
real-time transport protocol
Systems, methods, and media for retransmitting data using the SRTP are provided. In some embodiments, methods for retransmitting data using the SRTP are...