At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Protocol reference model, security and inter-operability in a cognitive
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive...
Access control for an IP access network to multicast traffic
A method and arrangement are proposed for controlling access by a client node to multicast traffic via an access network. When a client node sends a message to...
Tracking system with redundant security and retransmission features
System which is constituted by one or more positioning devices (2), one or more localizers (1), one or several communication networks and one or several control...
Method, access node, and system for obtaining data
The present invention discloses a method, an access node, and a system for obtaining data. The method includes: receiving a data obtaining request sent by a...
System and method for providing transactional security for an end-user
A network system comprises a transaction network operative to provide a transaction with an end user; a trusted source of a security mechanism (e.g., a...
Secure protection of biometric templates
This invention relates to methods and devices for verifying the identity of a person based on a sequence of feature components extracted from a biometric...
Instruction sequence verification to protect secured data
Intended for an information security application, particularly in networked information systems, the present invention includes two methods and systems for...
Cryptographically-enabled privileged mode execution
A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a...
Cryptographic system for performing secure computations and signal
processing directly on encrypted data in...
Disclosed embodiments include a cryptographic system implemented in at least one digital computer with one or more processors or hardware such as FPGAs for...
Information processing device having activation verification function
An information processing device having an activation verification function comprises: a module recording portion which stores plural system programs, a...
Multi-channel transaction signing
A transaction system combats malware and phishing-based MitM attacks on transaction processing systems by using digital signatures to integrity-protect the...
Computer system with dual operating modes
A system switches between non-secure and secure modes by making processes, applications, and data for the non-secure mode unavailable to the secure mode and...
Secure transport of multicast traffic
A request to receive multicast data, associated with a multicast group, may be transmitted. The request may be transmitted via a tunnel. Group keys may be...
Methods and systems for securely managing multimedia data captured by
mobile computing devices
A computer-implemented method for securely managing multimedia data captured by a mobile computing device is disclosed. The method may comprise: 1) identifying...
System and method for optimization of execution of security tasks in local
A system and method for dynamic configuration of the security modules for optimization of execution of security tasks are provided. The system includes: a...
System and method for efficiently securing enterprise data resources
Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user...
System and method for managing replication in an object storage system
An object storage system, such as a content addressed storage system, manages replication of objects across network locations to balance storage space and data...
Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
Financial data processing system and method
To process financial articles of trade, real time data is collected from a plurality of liquidity destinations in trading at least one of securities,...
Software defined radio device, and method for renewing software, and
software defined radio system
A software defined radio device and a download server store a plurality of common keys in common key data. The download server arbitrarily determines a common...
Vehicle security system including pre-warning features for a vehicle
having a data communications bus and...
A vehicle security system for a vehicle of a type including a vehicle data communications bus connected to a plurality of vehicle devices may include at least...
Multiple near field communication tags in a pairing domain
A system and method for simply and securely pairing multiple Bluetooth or other wireless electronic devices in a network. Multiple Near Field Communication...
Simplified device pairing employing near field communication tags
A system and method for simply and securely pairing two Bluetooth devices. A Near Field Communication (NFC) read-only tag is placed in a first Bluetooth device...
Simplified vehicle bluetooth pairing employing near field communication
A system and method for simply and securely pairing Bluetooth devices in a vehicle. A Near Field Communication (NFC) read-only tag is placed in the vehicle such...
Authorizing financial transactions
A system for authorizing a financial transaction includes a processor operable to execute an application on a wireless communications device, communicate...
Packet data comparator as well as virus filter, virus checker and network
system using the same
A network system by the present invention can quickly detect viruses and does not easily become a new cause of vulnerability. A packet data comparator branches...
Systems and methods for data loss prevention on mobile computing systems
A computer-implemented method for data loss prevention on mobile computing systems may include (1) identifying a mobile computing system configured to execute...
Method and apparatus for camouflaging of data, information and functional
A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a...
System and method for executing interactive applications with minimal
A mechanism for running interactive applications with a minimal set of privileges is disclosed. The privileges form a subset of the privileges afforded to the...
System and method of security management for a virtual environment
A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides an enterprise application...
Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon...
Secure upgrade of firmware update in constrained memory
A hardware-based security module may contain executable code used to manage the electronic device in which the security module resides. Because the security...
Secure pipeline manager
A method for data storage includes supplying data to and from a host to a storage memory via a secure data path. A first CPU is employed to control operation of...
Method and apparatus for an improved access system
A method and apparatus to enable a user to send an action message including secure credential. The system comprises a receiving logic to receive the action...
Method for securing authorized data entry and the device to perform this
A method and device for authorized data entry and securing the authenticity of such data when entering cryptographic operations in a computer requiring...
Systems and methods for server aided processing of a signed receipt
A method for processing security communication protocol compliant signed receipts at a mobile communication device linked to a host system is provided. The host...
Method and arrangement for security activation detection in a
A method and apparatus is provided for detecting the start of a secure mode by a user terminal (12) without explicit signaling. After the network (30) commands...
Data transferring method
A method of transferring data in which a secure authenticated channel is established with a receiving entity corresponding to receiver information included in a...
Computer program and method for biometrically secured, transparent
encryption and decryption
A computer program for secure encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository,...
System and method of data security in synchronizing data with a wireless
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application....
Fast computation of compact poset isomorphism certificates using position
Two methods and systems for fast construction of poset isomorphism certificates are provided. Posets (partially-ordered sets) generalize graphs. The invented...
Techniques for securely delivering media data
Techniques are provided for securely delivering media data. A requestor is directed to a secure streaming portal after being authenticated. A requesting...
System and method for instant issue of personalized financial transaction
In a method for instantly issuing a personalized financial transaction card to a customer a bank employee receives customer information and card information...
Method and apparatus for configuring and establishing a secure
credential-based network link between a client...
A bill-paying service has an internet-connected server executing software from a non-transitory, machine-readable medium, the software providing functionality...
Financial data processor system and method for implementing equity-credit
linked investment vehicles
A novel investment vehicle comprises a synthetic corporate exchangeable note linked to the equity return and credit of select third parties. A computer system...
Methods for performing data processing operations associated with
securities and security structures
The present disclosure relates to methods for performing data processing operations associated with securities and security structures. More particularly, one...
Method and apparatus for a lifetime security and protection scheme
Method and apparatus to facilitate managing a lifetime security and protection scheme for one or more cooperative members and one or more health care providers;...
System for clinical research and clinical management of cardiovascular
risk using ambulatory blood pressure...
Disclosed embodiments include a web-enabled system especially adapted for clinical research and clinical management of cardiovascular risk using ambulatory...
Demand based USB proxy for data stores in service processor complex
A method, apparatus, system, and computer program product for secure server system management. A payload containing system software and/or firmware updates is...
Method and apparatus for remote vehicle communications and control
Long-range remote communication and control of a vehicle is achieved with primary and secondary cellular devices provided by the vehicle user. The primary...