At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,621,210 |
Ad-hoc trust establishment using visual verification Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on... |
US-8,621,208 |
Secure key server based file and multimedia management system An embodiment of the present invention proposes a novel file and multimedia management and tracking system using a secure key server. The invention also... |
US-8,621,200 |
Key delivery method and apparatus in a communications system In order to facilitate access to encrypted broadcast or multicast data an encrypted service key is sent from an access server of the communication network to... |
US-8,621,199 |
Secured presentation layer virtualization for wireless handheld
communication device having endpoint independence The connectivity and security of wireless handheld devices (HDs) can he leveraged to provide a presentation appliance (PA) (e.g. a laptop) with an ability to... |
US-8,621,189 |
System and method for hardware strengthened passwords A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may... |
US-8,621,168 |
Partitioning the namespace of a contactless smart card Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and... |
US-8,621,036 |
Secure file access using a file access server A secure file access system and method are disclosed which comprises a file access module executed on a processor of a computing device. The file access module... |
US-8,620,882 |
Tokenization of multiple-field records An improved technique for granting access to a complex datum maps a single user token representing a user onto a set of data group tokens, each data group token... |
US-8,620,876 |
Firewalls for securing customer data in a multi-tenant environment Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to... |
US-8,620,832 |
Network-centric cargo security system Network-centric systems and methods for monitoring the security of a cargo container during shipment from an origination point to a destination are described.... |
US-8,620,821 |
Systems and methods for secure parcel delivery A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and... |
US-8,620,816 |
Information vault, data format conversion services system and method A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of... |
US-8,620,789 |
Using accounting data based indexing to create a low volatility portfolio
of financial objects A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the... |
US-8,620,308 |
Method and apparatus for a distributed roaming master (DRM) in wireless
data networks A system and methodology that can facilitate communication between home and roaming radio access networks by employing IP-based messaging is provided. The... |
US-8,620,268 |
Secure system for programming electronically controlled locking devices by
means of encrypted acoustic... The invention relates to a system implementing a mobile telephone (20) to which a master user authorized to program a lock (22) has access. A remote management... |
US-8,620,266 |
Security for mobile communications device A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to... |
US-8,620,215 |
Personalization of a mobile communcation device An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least... |
US-8,620,214 |
Process for establishing a data link between two processors, specifically
within an NFC chipset A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a... |
US-8,620,020 |
Methods and systems for preventing unauthorized disclosure of secure
information using image fingerprinting The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment,... |
US-8,619,986 |
Systems and methods for secure communication using a communication
encryption bios based upon a message... An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The... |
US-8,619,982 |
Method and system for secure distribution of selected content to be
protected on an appliance specific basis The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related... |
US-8,619,951 |
Systems and methods to securely collect data over a telephone A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service... |
US-8,619,607 |
Method and system for verifying logical connection A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth... |
US-8,619,578 |
Communications switching architecture Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,... |
US-8,618,913 |
Radio frequency identification enabled mobile device An RFID enabled mobile device is configured to provide a secure release of RFID information. The RFID enabled mobile device, such as an RFID enabled cellular... |
US-8,617,081 |
Estimating cardiac pulse recovery from multi-channel source data via
constrained source separation What is disclosed is a system and method for recovering a patient's cardiac pulse rate from a sequence of video images recording of that patient. In one... |
US-8,616,452 |
Sensor module and sensor module manufacturing method Provided is a sensor module capable of ensuring security of data in which card data output from a magnet head is not stolen by a third party. In a sensor module... |
US-8,616,439 |
System and method for the secure transfer of information to a web session A system and method includes displaying a prompt on a display device of a first computing device to input information for an e-commerce session. Next, a... |
US-8,616,438 |
Optical detector at point of care A patient support apparatus including a barrier, an optical detector, and a control system. The optical detector secured to the barrier and configured to detect... |
US-8,615,808 |
Method of processing data to enable external storage thereof with
minimized risk of information leakage A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution... |
US-8,615,804 |
Complementary character encoding for preventing input injection in web
applications Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security... |
US-8,615,795 |
Secure network privacy system The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure... |
US-8,615,786 |
System and method for enhancing, securing, controlling and customizing
employee network applications and usage The invention relates to various solutions to the challenges of supporting call centers and networks having a plurality of network connected agents or... |
US-8,615,667 |
Processor and processor system In a processor including a CPU core executing instruction codes and a cache memory part having plural ways, encryption counter data encrypting and decrypting... |
US-8,615,652 |
System and method for providing load balanced secure media content and
data delivery in a distributed computing... A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content... |
US-8,615,620 |
Wireless internet access device, SD control chip, and method for data
communication A wireless Internet access device, a secure digital (SD) control chip, and a data communication method are disclosed. The method includes the following steps:... |
US-8,615,605 |
Automatic identification of travel and non-travel network addresses A system to automatically classify types of IP addresses associated with a user. Information, such as user names, machine information, IP address, etc., may be... |
US-8,615,517 |
Systems and methods for metadata-based workflows for content creation and
media distribution A secure networked metadata-based workflow method and system, managed through core application logic and master database management system for picture, sound,... |
US-8,615,465 |
Real-time security verification for banking cards Embodiments of the invention provide a means for verifying that a person using a bank card at a point-of-sale merchant location is in fact a person authorized... |
US-8,615,412 |
Methods and systems for managing distributed digital medical data A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care... |
US-8,615,007 |
Network switching system with asynchronous and isochronous interface To provide a switching system with telephone switching function mainly on the basis of hardware processing by using isochronous channel which is a real time... |
US-8,613,387 |
Banking system controlled reponsive to data bearing records An automated banking machine operates to cause financial transfers responsive to data read from data bearing records. The automated banking machine includes a... |
US-8,613,107 |
System, method and apparatus for electronically protecting data associated
with RFID tags The present invention provides a system, method and apparatus for protecting sensitive data associated with RFID tags by extracting the sensitive data from RFID... |
US-8,613,105 |
Method and apparatus for storing confidential information Techniques for securely storing confidential information associated with a transaction are disclosed. A method for securely storing confidential information may... |
US-8,613,092 |
System, method and computer program product for updating a security system
definition database based on... A prioritized update system, method, and computer program product are provided. In use, a priority is assigned to a plurality of instances of known unwanted... |
US-8,613,091 |
Method and apparatus for creating a secure anywhere system A method and apparatus for providing portable end-point security are provided. In one embodiment, a PEPS system may include a PEPS processor having a memory... |
US-8,613,090 |
Method for processing a secure system manager Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of... |
US-8,613,087 |
Computing system Disclosed is a computing system which comprises a data processing device exchanging communication data with the external and processing the communication data;... |
US-8,613,072 |
Redirection of secure data connection requests Methods, systems, and computer-readable media are disclosed for processing a secure data connection request. A particular method receives, at a first gateway, a... |
US-8,613,071 |
Split termination for secure communication protocols Transaction accelerators can be configured to terminate secure connections. A server-side accelerator intercepts a secure connection request that is from a... |