At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure, differentiated reading of sensors and RFID tags
Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier...
Secured personal data handling and management system
A system, method and personal apparatus for managing highly secured personal data is provided. The system and the personal apparatus are complementary, both...
Wide-area, real-time monitoring and visualization system
A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion...
Mobile control and monitoring system
An HMI system with a mobile control and monitoring device for automation components of a technical system is provided. The HMI system includes means for a...
Method and system for securely authenticating user identity information
Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization...
Portable security module pairing
A method for pairing a first element and a second element, wherein the first element and the second element form a first decoding system among a plurality of...
Cloud storage data access method, apparatus and system based on OTP
The present application relates to cloud storage technology and especially relates to a cloud storage data access method, apparatus and system based on OTP....
Systems and methods for securely deduplicating data owned by multiple
A computer-implemented method for securely deduplicating data owned by multiple entities may include identifying a plurality of data segments to store on a...
Method and system for keying and securely storing data
An approach is provided for securely storing sensitive data. A system is provided that includes a central device configured to receive a key from a requester,...
Systems and methods for secure recording in a customer center environment
Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media...
System and method for selectively disabling document rendering
The subject application is directed to a system and method for selectively disabling document rendering. An electronic document is first generated having a...
Human tracking device for hospitals, nursing homes, and private use
A tracking device for tracking a patient and providing patient data. The device features a base ring for securing around a patient's wrist or ankle, the base...
System and method for securing authorized access by a mobile data device
of a document processing device
The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data...
Data storage and stackable configurations
A first memory device and second memory device have a same input/output layout configuration. To form a stack, the second memory device is secured to the first...
Drive-up financial transaction machine
Using accounting data based indexing to create a portfolio of assets
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
Security domain in virtual environment
A system, method and computer program product for an isolated security domain which is a bounded area of the VM for protected objects. The objects are software...
System and method for analyzing a process
A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the...
System and method for identifying and assessing vulnerabilities on a
mobile communication device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
Detecting security vulnerabilities relating to cryptographically-sensitive
information carriers when testing...
A system for detecting security vulnerabilities in computer software, including a cryptographic API identifier configured to identify a cryptographic API among...
Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
System and method for operation of open connections for secure network
In one embodiment, a system for extending IPSec communication over a wireless mesh network is disclosed. A VPN appliance is operative to establish an end-to-end...
Bidirectional gateway with enhanced security level
A bidirectional gateway with enhanced security level between a high-security communication network and a low-security communication network. The return pathway...
Single instance storage of encrypted data
Described is a technology by which data is efficiently and securely stored in a single instance store. A hash value is computed from data in its unencrypted...
System and method for efficiently deleting a file from secure storage
served by a storage system
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a...
Method and apparatus for securing digital information on an integrated
circuit read only memory during test...
The embodiments protect an IC against Design-For-Test (DFT) or other test mode attack. Secrets in ROM or PROM are secured. One embodiment for securing...
Methods and systems for protecting media content
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel...
Secure content based routing in mobile ad hoc networks
Methods and systems for information dissemination in mobile ad hoc networks founded on Content Based Routing. The method comprises encoding, via an encoding...
Generic hub to increase security when accessing business systems
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user...
Secure memory interface
A secure memory interface includes a reader block, a writer block, and a mode selector for detecting fault injection into a memory device when a secure mode is...
Packet sequence number tracking for an anti-replay window
Described embodiments provide a network processor that includes a security sub-processor to prevent replay attacks on the network processor. A memory stores an...
Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
Wireless communications system providing wireless message data delivery
through intermediary wireless...
A wireless communications system may include a plurality of wireless communications devices (WCDs). A source WCD from among the plurality of WCDs may be...
Data security for dynamic random access memory at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
Method and system for identifying missing items
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits...
Wireless patient communicator employing security information management
A portable patient communicator (PPC) includes a portable housing supporting a processor, memory for storing medical and wireless radio firmware, first and...
Secure profile setting in a shared device
There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared...
ID theft-reducing device to virtualize ID/transaction cards
One embodiment of a device to virtualize a multitude of identification and transaction cards comprises a programmable card, approximately the size of a standard...
Method and production line for laminate assembly
The production line according to the present invention is provided with a pressurization measurement apparatus adjacent to a press-working apparatus, a...
Hardware-based output protection of multiple video streams
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content...
Systems and methods for protecting information used by mobile devices
The present disclosure generally pertains to systems and methods for protecting information for use by mobile devices. In one exemplary embodiment, a system...
Secure signature server system and associated method
A system, method and computer program product are provided for securely generating signatures. Initially received is a request to generate a signature at a...
Method and apparatus for hosting multiple tenants in the same database
securely and with a variety of access modes
A method for managing multi-tenancy database access, including receiving credentials from a user associated with a first organization and a second organization,...
Stateless cryptographic protocol-based hardware acceleration
According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and transfer processing of an authentication...
Techniques for tracking actual users in web application security systems
A method for tracking and identifying an identity of a user accessing a web application. An application normal behavior profile (NBP), wherein said NBP includes...
Method and apparatus for hardware XML acceleration
A method and apparatus for accelerating processing of a structured document. A hardware XML accelerator includes one or more processors (e.g., CMT processors),...
System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
Information terminal, security device, data protection method, and data
An information terminal that decrypts sealed data without returning program data after update to the state before update. The information terminal includes...