At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Financial transaction system with integrated electronic messaging, control
of marketing data, and user defined...
A method of performing financial transactions between users of Summa accounts, each Summa account including an electronic messaging system that provides for...
Method and system for maintaining trading accounts
Orders relating to a sale or purchase of securities are staged into an execution management system that includes a processor programmed to perform securities...
Investment classification and tracking system using diamond ratings
The present invention is directed to an asset classification system based on investment strategy. The system determines a number for performance measures and...
Stealth message transmission in a network
Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves...
System and method for securely authenticating and lawfully intercepting
data in telecommunication networks...
A system and method for securely authenticating and lawfully intercepting data in a telecommunication network using biometrics is disclosed. In one embodiment,...
Network interface systems and methods for offloading segmentation and/or
checksumming with security processing
Network interface systems are disclosed comprising a bus interface system, a media access control system, a memory system, a security system for selectively...
Mobile communication terminal, incoming data detecting method and incoming
data detecting program
Included are a system information receiving unit for receiving, from a first base station or a second base station, system information including a PI within a...
Electronic system with secured data accessing
A first electronic device includes an electromagnetic component embedded in its connecting port and controlled to be activated during data transmission between...
Method retaining a moveable head assembly with an anti-rotation guide for
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
Secure collector diagnostic portal activation
Disclosed are methodology and apparatus for providing communications with an Automatic Meter Reading/Advanced Metering Infrastructure (AMR/AMI) collector...
Plug security structure for electrical connector
A plug security structure includes a plug, a cable, a jacket, a movable cap and a key. By means of a middle block, the movable cap is slidably insertable into...
Water use monitoring apparatus
A water use and/or a water energy use monitoring apparatus that is affixed to the hot and cold main water supply piping for continuously (or on demand)...
Asynchronous java script and XML (AJAX) form-based authentication using
java 2 platform enterprise edition (J2EE)
An apparatus, system, and method are disclosed for Asynchronous Java Script and XML (AJAX) form-based authentication using Java 2 Platform Enterprise Edition...
Method, system, and data server for checking revocation of content device
and transmitting data
A method of checking revocation of a device and software, and transmitting data to a secure device and secure software whose keys have not been leaked is...
Selected text obfuscation and encryption in a local, network and cloud
A keyboarded a mix of private and public text composing a source-text document is submitted through an encryption adapter intersituated in a data signal link...
Addressing security in writes to memory
A computer includes a processor. When an instruction to be executed by the processor involves writing to memory, the write can be redirected to a temporary area...
System and method for transparent disk encryption
A data storage system providing transparent encryption. The data storage system has a hardware encryption/decryption engine and a register coupled to the...
Data processing apparatus
A data processing apparatus comprises a monolithic integrated circuit having a data processor, a non-volatile memory storing at least one security code, and at...
Method and system for obtaining a PIN validation signal in a data
The present invention relates to a method for obtaining a PIN validation signal in a data processing unit, the method including the steps of receiving a PIN in...
Security interface for a mobile device
A method and device are described which provide a security interface, preferably for a mobile device. The security interface provides user-selectable non-secure...
Securing wireless body sensor networks using physiological data
A password protocol for establishing secure communications between sensor nodes in a network using secure environmental values (SEV). A first sensor sends a...
Security systems and methods for use with structured and unstructured data
Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure...
Integrating security protection tools with computer device integrity and
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
Inspection and rewriting of cryptographically protected data from group
Systems, methods, and other embodiments associated with processing secure network traffic are described. One example method includes determining whether a...
Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
Scalable network apparatus for content based switching or validation
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
Apparatus for providing security over untrusted networks
A network security apparatus adapted to provide for secure communications across data networks, including untrusted networks. In one embodiment, the security...
Apparatus and method for biased and weighted sampling of network traffic
to facilitate network monitoring
An apparatus is described that performs biased and weighted sampling of network traffic to facilitate network monitoring. One embodiment of the apparatus...
Security and support for flexible conferencing topologies spanning
proxies, firewalls and gateways
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and...
Financial market replicator and simulator
A financial market replicator, simulator, and trainer/annotator (FMRS) intermixes and records data streams of real time financial market data from a variety of...
Integrated investment management system with network datafeed and
incremental database refresh
An investment management computer system is configured to communicate with data vendors or electronic accounting systems. The system may include an electronic...
Processing system for acquiring and reporting compliance with data
Methods, systems, and machine-readable media are disclosed for tracking and reporting information related to compliance with a set of security requirements by...
Retrospective implementation of SIM capabilities in a security module
The invention relates to a method for subsequently implementing a SIM functionality, with the help of which a mobile telephone (1) is enabled to use a mobile...
Method and apparatus for dynamic configuration of multiprocessor system
A multiprocessor system used in a car, home, or office environment includes multiple processors that run different real-time applications. A dynamic...
Graphical bookmarking of video data with user inputs in video surveillance
A method and apparatus are provided for processing video. The method includes the steps of a security system providing video of a secured area, a security...
Electronic coding system for security of identification
A multi-level data encoding system is provided that is operable on a computer. The encoding system includes a data input device adapted to input a data set and...
System for automated screening of security cameras
The present invention involves a system for automatically screening closed circuit television (CCTV) cameras for large and small scale security systems, as used...
Securing wireless body sensor networks using physiological data
A computer implemented method, apparatus, and computer program product for securing wireless body sensor networks with a three party password protocol. The...
Secure data transfer on a handheld communications device
A handheld communications device comprises a display device, and a data processor that is in communication with the display device. The data processor is...
Virtual switching overlay for cloud computing
In one embodiment, a method includes receiving data at a virtual switch located at a network device in a cloud network. The data is received from an external...
Effectuating establishment of internet protocol security tunnels for
utilization in a wireless communication...
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec...
Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
Secure printing-out using color toner and particular toner
An image processing apparatus forming an image with color toners used for full color printing and a particular toner is provided. The apparatus comprises a...
Secured document with a contactless chip with protection of date against
The invention relates to a secured document in the form of a booklet of at least one sheet which may be folded about a folding axis, the document having a...
Secure RFID system and method
The present invention relates to a system and method for providing security in an RFID system and provides a secure active RFID architecture that uses a...
Method and apparatus for vehicle service system optical target assembly
A method and apparatus for determining the alignment of a vehicle wheel using an optical target assembly secured to the vehicle wheel in a non-determined...
Method and apparatus for securing digital assets
Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is...
Secure device and method for preventing side channel attack
Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from...
Securing data in a networked environment
Apparatus for securing data, comprising: an isolated processing environment having a boundary across which data cannot cross and a channel for allowing data to...
Filtering kernel-mode network communications
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is...