At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure transmitting method, a system, a firewall, and a router using the
Data packets are transmitted in a secure manner from an external network to a secure network. The secure network and the external network are interconnected via...
Security token and method for authentication of a user with the security
A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance...
Device, system and method of performing an administrative operation on a
Some demonstrative embodiments of the invention include a method, device and/or system of performing an administrative operation on a user token. The method may...
Enterprise-wide security system for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
Information processing apparatus, information processing method, program
and information processing system
An IC chip in which secure information is recorded is mounted on an information processing apparatus. The information processing apparatus is connected to a...
Microprocessor comprising signature means for detecting an attack by error
A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing...
Machine, machine management apparatus, system, and method, and recording
A machine management method includes installing software in a machine including a security device that holds a secret key unextractable from the security device...
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
Method and system for protecting electronic data in enterprise
Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the...
System and method for intelligence based security
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user...
Security system for handheld wireless devices using-time variable
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
Device, systems, and method for securely starting up a computer
A device for the secured start-up of a computer installation comprising a first connection interface to the computer installation and a second connection...
Protected cache architecture and secure programming paradigm to protect
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
Access and control system for network-enabled devices
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple...
Method for implementing and application of a secure processor stick (SPS)
Systems and methods for implementing a secure processor stick are described. In one aspect, the system for implementing a secure processor stick with a...
End-to-end secure payment processes
Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system...
Dynamic prepayment risk management
A system and method are disclosed for monitoring, managing and reporting credit card prepayment risk for an issuing bank. Sales data, corresponding payment data...
Key management system and method
Methods and systems are disclosed for providing secured data transmission and for managing cryptographic keys. One embodiment of the invention provides secure...
Key management and user authentication for quantum cryptography networks
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional...
Systems and processes of automatic verification and protection of paper
documents against falsification,...
Protection of documents printed in paper is provided by processes for detection, immediately and clearly, of different types of falsification, adulteration,...
Information processing apparatus
A high-security cryptanalysis-resistant cryptographic processing apparatus and a cryptographic processing method are provided. A Feistel common key block cipher...
Online reporting tool for conferencing customers
Embodiments consistent with the present invention provide an integrated system for conferencing services reporting to support customer billing needs. Systems...
System and method for creating a secure tunnel for communications over a
A system and method for establishing a virtual local area network (LAN) between a local device and a remote device are provided. The local device and the remote...
A fiscal printer reliably stores and holds, using a simple configuration, the date and time that a fiscal control circuit board is removed from the printer, and...
System for monitoring persons by using cameras
According to one embodiment, a monitoring system is provided, which has a personal authentication unit and a camera. The personal authentication unit is...
A vehicle detection system for detecting the presence of at least part of a vehicle in image data, the system comprising: an interface configured to receive...
Asset tag power optimization
A technique for saving power in a tag that is operationally connected to an asset involves using telemetry data to enter an appropriate power state. An asset...
Banking system controlled responsive to data read from data bearing
An automated banking machine is part of a banking system that operates to cause financial transfers responsive to data read from data bearing records. The...
Data accessing device
Communication device and method for securing data
A communication device and method for securing data include connecting a processor and at least one storage device via active pins of a switch in the...
Delivering malformed data for fuzz testing to software applications
Systems and methods to deliver malformed data for software application fuzzing are described. In one aspect, a fuzzing engine receives well-formed valid input...
Systems and methods for using reputation data to detect packed malware
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining...
Methods, hardware products, and computer program products for implementing
introspection data comparison...
Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more...
Abnormal IPSec packet control system using IPSec configuration and session
data, and method thereof
An abnormal Internet Protocol Security (IPSec) packet control system and method utilizes IPSec configuration and session data to detect whether or not packets...
Communication control device and communication control system
The present invention provides a technique for improving the security of access to contents. A virus/phishing site list contains a list of URLs of phishing...
Tuning product policy using observed evidence of customer behavior
A computer adapted for pay-as-you go or other metered use has a policy for determined what measurements to take to detect fraud as well as steps to take when...
System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
Two-party storage of encrypted sensitive information
A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure...
Local trusted services manager for a contactless smart card
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless...
Interconnectable personal computer architectures that provide secure,
portable, and persistent computing...
Disclosed are interconnectable personal computer architectures comprising secure, portable and persistent computing environments that provide secure computing...
Method and arrangement for secure authentication
A method and arrangement for utilising a generally available personal data terminal as a secure and reliable authentication factor for user authentication is...
Writing application data to a secure element
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and...
Recovery of data access for a locked secure storage device
A system for recovery of data access of a locked secure storage device can comprise a keystore module and an authorization module. The keystore module may be...
MAC frame provision method and apparatus capable of establishing security
in IEEE 802.15.4 network
A medium access control (MAC) frame provision method establishes security in an IEEE 802.15.4 network. A MAC frame is generated, which includes a MAC header, a...
Secure request handling using a kernel level cache
The present invention discloses a system, method, apparatus, and computer usable product code for handling requests. The invention can include a kernel level...
Encryption based security system for network storage
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access...
Clients may subscribe to resources for the purpose of receiving notifications of changes in the resource (e.g., a file is added to a shared folder). Storing...
Adaptive and secure modular connection
A method and system to increase the security of messages transmitted over an otherwise unsecured network. A secure channel is established in a normal manner...
Operation of control protocol data units in packet data convergence
A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security...
Receiving policy data from a server to address theft and unauthorized
access of a client
Techniques for securing a client. When a client, such as a portable computer, undergoes a change in operational state, an operating system agent sends a state...