At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus of securing data in a portable flash memory
A method and apparatus of securing data stored in a memory of a portable memory storage device are disclosed. One example may include activating an...
Secure authoring and execution of user-entered database programming
A secure framework for authoring and execution of user-entered database scripts, rules, procedures and other forms of programming is provided. A performance...
System, method and computer program product for rendering data of an
on-demand database service safe
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods...
Systems and methods for increased security during logging in to web site
A user at a computing device interacts with a networked site so that the user can log in thereto. The site receives a selection to log in and in response...
Centralized account reputation
A centralized account reputation system differentiates between illegitimate users and legitimate users using reputation scores associated with the users' online...
Dynamic configuration of a gaming system
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files...
System, method and program product for generating a cancelable biometric
reference template on demand
A system, method and program product for generating a cancelable biometric reference template on demand. The method includes creating, using a biometric...
Enterprise security system
A platform of Trust Management software which is a single, customizable, complete distributed computing security solution designed to be integrated into an...
In executing an EEPROM emulation by a flash memory incorporated in a semiconductor device, there is a problem that the data holding period of the flash memory...
Audio data processing in a low power mode
A media processing system and device with improved power usage characteristics, improved audio functionality and improved media security is provided....
System and method for securely communicating on-demand content from closed
network to dedicated devices, and...
A system for securely communicating content as streaming data is provided. The system includes a closed network created on a public network, and a dedicated...
Secured authentication method for providing services on a data transmisson
A method for accessing a service on a network, via a user terminal (30), includes a subscription phase wherein: a container is generated, including a first...
Apparatus for customer authentication of an item
An apparatus is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage that can be used...
System and method for investing public deposits
A method, system and program product for operating an exchange method for municipal and/or state funds from banking institutions, comprising: accessing, one or...
System and method for processing data relating to annuities
A system for administering an insurance account includes a processor; a memory in communication with the processor; the processor being adapted to: access data...
Interactive control of access to services and capabilities of a mobile
A system device and method are provided which determine authorization for access to one or more services grouped together as a package of services without...
Security system and method for an electronic device
A security system and method for an electronic device include comparing data in a Subscriber Identity Module (SIM) card with data in a virtual SIM card, if the...
Secure wiegand communications
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional...
Computer system and network interface supporting class of service queues
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
Transmitter-directed security for wireless-communications
Transmitter-directed transmission security is provided between a transmit node and a receive node. The transmit node selects transmission format for each data...
Multi-cell voltage secure data encoding in hybrid vehicles
A method of encoding data related to voltages for each of a plurality of battery cells for transmission in a hybrid vehicle includes the steps of generating a...
Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
Assembly for permitting Power over Ethernet connection
An assembly for permitting "Power-over-Ethernet" (PoE) connection between a PoE control device and the components of a cabling network includes a patch panel or...
Data network node having enhanced security features
An apparatus and methods for securely forwarding data packets at a data switching node in a data transport network is provided. The data switching node...
Extensible protocol validation
A method comprises operations for receiving a binary data structure including a portion representing a protocol validation specification expressed in a...
The aim of the present invention is to provide a secure system-on-chip for processing data, this system-on-chip comprising at least a central processing unit,...
Data storage device comprising a secure processor for maintaining
plaintext access to an LBA table
A data storage device is disclosed comprising a non-volatile memory, a logical block address (LBA) table for storing plaintext data used to access the...
System for automatically shadowing encrypted data and file directory
structures for a plurality of...
The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed...
Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
Method and system for utilizing context data tags to catalog data in
A Wireless mobile communication (WMC) device may maintain user preference information, which is unique to the WMC device capabilities and the device user. The...
Secured data transmission in communications system
A solution for providing a data security service in a wireless communications system (S) is disclosed. In the solution, a first security association (SA1) is...
Method and apparatus for transmitting/receiving a reference signal in a
wireless communication system
A method and apparatus for transmitting/receiving reference signals in Long Term Evolution (LTE) and LTE-Advanced (LTE-A) systems includes determining whether a...
Banking system controlled responsive to data bearing recordings and user
input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
Method and system for providing secure digital music duplication
A system and method are provided wherein digital data representing content and associated license rights may copied to a storage medium, such as a removable...
System for providing fault tolerant data warehousing environment by
temporary transmitting data to alternate...
A method and system utilizing one or more data generating computing devices as default data warehouses in the event of a primary data warehouse failure are...
Bilateral communication using multiple one-way data links
A bilateral data transfer system comprising a first node, a second node, a first one-way link for unidirectional transfer of first data from the first node to...
Authorized application services via an XML message protocol
Disclosed are systems and methods to provide a persistent authorized server address space (ASAS). The ASAS can host components from product suites that are not...
Method for managing data in a shared computing environment
A method of storing secret data in a shared computing environment includes defining secret data, such as a password and administration policies according to a...
System, method and computer program product for performing a security or
maintenance operation in association...
A system, method and computer program product are provided for performing a security or maintenance operation in association with virtual disk data accessed...
Checking method and electronic circuit for the secure serial transmission
A checking method in which serial data protected by check data are transmitted via a serial data bus from a transmitter to a receiver, the receiver then...
Semiconductor memory device, host device and semiconductor memory system
A host device 200A includes a data buffer 250. When data has been already written to a part of a physical block and data is additionally written to the physical...
Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
Secure decentralized storage system
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of...
Protection of data delivered out-of-order
A basic idea of this system is to separate ordered delivery data and unordered delivery data in a security protocol running on top of a reliable transport...
Selectively securing data and/or erasing secure data caches responsive to
security compromising conditions
Techniques are generally described for methods, systems, data processing devices and computer readable media configured to decrypt data to be stored in a data...
Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
Database update through a one-way data link
A database updating application for updating through a one-way data link a remote database in accordance with a change in a reference database is disclosed,...
Securely deleting data in a transactionally consistent manner
A process is disclosed by which data is securely deleted in a transactionally consistent manner. This may be accomplished by committing a preparation...
User-driven menu generation system with dynamic generation of target files
with placeholders for persistent...
Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields...
System, method and program product for management of life sciences data
and related research
A system, method and program product for managing data for researchers. A research data server receives and manages experimental data and research data and...