At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Human tracking device for hospitals, nursing homes, and private use
A tracking device for tracking a patient and providing patient data. The device features a base ring for securing around a patient's wrist or ankle, the base...
System and method for securing authorized access by a mobile data device
of a document processing device
The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data...
Data storage and stackable configurations
A first memory device and second memory device have a same input/output layout configuration. To form a stack, the second memory device is secured to the first...
Drive-up financial transaction machine
Using accounting data based indexing to create a portfolio of assets
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
Security domain in virtual environment
A system, method and computer program product for an isolated security domain which is a bounded area of the VM for protected objects. The objects are software...
System and method for analyzing a process
A system for analyzing a process, comprising a model engine to generate a model of the environment using multiple components defining adjustable elements of the...
System and method for identifying and assessing vulnerabilities on a
mobile communication device
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the...
Detecting security vulnerabilities relating to cryptographically-sensitive
information carriers when testing...
A system for detecting security vulnerabilities in computer software, including a cryptographic API identifier configured to identify a cryptographic API among...
Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
System and method for operation of open connections for secure network
In one embodiment, a system for extending IPSec communication over a wireless mesh network is disclosed. A VPN appliance is operative to establish an end-to-end...
Bidirectional gateway with enhanced security level
A bidirectional gateway with enhanced security level between a high-security communication network and a low-security communication network. The return pathway...
Single instance storage of encrypted data
Described is a technology by which data is efficiently and securely stored in a single instance store. A hash value is computed from data in its unencrypted...
System and method for efficiently deleting a file from secure storage
served by a storage system
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a...
Method and apparatus for securing digital information on an integrated
circuit read only memory during test...
The embodiments protect an IC against Design-For-Test (DFT) or other test mode attack. Secrets in ROM or PROM are secured. One embodiment for securing...
Methods and systems for protecting media content
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel...
Secure content based routing in mobile ad hoc networks
Methods and systems for information dissemination in mobile ad hoc networks founded on Content Based Routing. The method comprises encoding, via an encoding...
Generic hub to increase security when accessing business systems
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user...
Secure memory interface
A secure memory interface includes a reader block, a writer block, and a mode selector for detecting fault injection into a memory device when a secure mode is...
Packet sequence number tracking for an anti-replay window
Described embodiments provide a network processor that includes a security sub-processor to prevent replay attacks on the network processor. A memory stores an...
Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a...
Wireless communications system providing wireless message data delivery
through intermediary wireless...
A wireless communications system may include a plurality of wireless communications devices (WCDs). A source WCD from among the plurality of WCDs may be...
Data security for dynamic random access memory at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
Method and system for identifying missing items
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits...
Wireless patient communicator employing security information management
A portable patient communicator (PPC) includes a portable housing supporting a processor, memory for storing medical and wireless radio firmware, first and...
Secure profile setting in a shared device
There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared...
ID theft-reducing device to virtualize ID/transaction cards
One embodiment of a device to virtualize a multitude of identification and transaction cards comprises a programmable card, approximately the size of a standard...
Method and production line for laminate assembly
The production line according to the present invention is provided with a pressurization measurement apparatus adjacent to a press-working apparatus, a...
Hardware-based output protection of multiple video streams
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content...
Systems and methods for protecting information used by mobile devices
The present disclosure generally pertains to systems and methods for protecting information for use by mobile devices. In one exemplary embodiment, a system...
Secure signature server system and associated method
A system, method and computer program product are provided for securely generating signatures. Initially received is a request to generate a signature at a...
Method and apparatus for hosting multiple tenants in the same database
securely and with a variety of access modes
A method for managing multi-tenancy database access, including receiving credentials from a user associated with a first organization and a second organization,...
Stateless cryptographic protocol-based hardware acceleration
According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and transfer processing of an authentication...
Techniques for tracking actual users in web application security systems
A method for tracking and identifying an identity of a user accessing a web application. An application normal behavior profile (NBP), wherein said NBP includes...
Method and apparatus for hardware XML acceleration
A method and apparatus for accelerating processing of a structured document. A hardware XML accelerator includes one or more processors (e.g., CMT processors),...
System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
Information terminal, security device, data protection method, and data
An information terminal that decrypts sealed data without returning program data after update to the state before update. The information terminal includes...
Method and system to electronically identify and verify an individual
presenting himself for such...
A method and a system of electronically identifying and verifying an individual utilizing at least one biometric features of the individual is disclosed. The...
Security of data over a network
A method for securing data transmitted over a network to an image display device. In one embodiment, the method may include identifying at least one image...
Secure overlay manager protection
A method for protection of data includes maintaining a control parameter indicative of a current version of the data. The data is partitioned into multiple...
Apparatus and system for asymmetric security
An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications...
Storage security using cryptographic splitting
Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to...
Methods and systems to implement a physical device to differentiate
amongst multiple virtual machines of a host...
Methods and systems to implement a physical device to differentiate amongst multiple virtual machines (VM) of a computer system. The device may include a...
System and method for providing configurable security monitoring utilizing
an integrated information system
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources...
Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
Systems, devices, and methods for providing multiple services to premises
over communication networks
Methods, systems, and devices for providing one or more virtual networks for a plurality of services are disclosed. The device may include a secure access node...
Transformation of a multi-leg security definition for calculation of
implied orders in an electronic trading system
An electronic trading system utilizes a Match Engine that receives orders, stores them internally, calculates tradable combinations and advertises the...
Beehive planet method: collective property buying and mass securitization
of real estate through a real estate...
Beehive Planet Method is a computerized method spanning Real Estate and Finance fields. It creates an investment avenue for the registered investor base of a...