At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure framework for invoking server-side APIs using AJAX
Techniques for securely invoking a server-side API from client-side Web application code using AJAX. In one set of embodiments, a request to invoke a...
Secure processing environment
Secure operations and components may be integrated into a conventional processing system executing a standard operating system. A secure processing environment...
Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
Secure policy differentiation by secure kernel design
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate...
Updateable secure kernel extensions
A method, computer program product, and data processing system provide an updateable encrypted operating kernel. Secure initialization hardware decrypts a...
Encryption processing for streaming media
A method of securing transmission of streaming media by encrypting each packet in the stream with a packet key using a fast encryption algorithm. The packet key...
Method for determining allocation of tape drive resources for a secure
data erase process
A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve...
Data communication protocol including negotiation and command compounding
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when...
Information on demand process framework to generate, manage, secure, and
deploy browsers and application...
Disclosure is a method and system for delivering a reusable framework. The disclosure invokes an interface to define an information service within the reusable...
System and method for providing a script-based collection for devices in a
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is...
Computer instructions for positioning a wire using sensor information
Computer instructions for determining coordinates for nodes on a wire secured to tow lines of a floating vessel for analyzing geological formations is provided....
Communications terminal device
A communication terminal device is provided with a communication unit; a memory unit that stores a telephone directory data having at least names, telephone...
Apparatus and a security node for use in determining security attacks
Apparatus including functionality configured to monitor said apparatus for security attacks; and a reporter configured to send data to a security node, wherein...
Fingerprint scanning systems and methods
Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic...
Fast encoding method and system using adaptive intra prediction
Fast encoding method and system are provided which can transmit video data in real time using adaptive intra prediction in accordance with the H.264/AVC...
Method and system for managing information among personalized and shared
resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
Image display device and driving method for same for collective write in
An image display with high brightness where a long time can be secured for light emission of self-luminous elements can be implemented using only line memories....
Sensor suite and signal processing for border surveillance
A land-based smart sensor system and several system architectures for detection, tracking, and classification of people and vehicles automatically and in real...
Enhancements to meterless remote parking monitoring systems
A remote meterless parking monitoring system including a plurality of individual parking spaces, a plurality of vehicle detector/RFID units for monitoring the...
Secure data entry device
A secure data entry device including a housing, a keypad mounted in the housing and including a plurality of selectably depressible keys, tampering alarm...
High utilization universal logic array with variable circuit topology and
logistic map circuit to realize a...
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
Business card package
A package of business cards arranged in a stack. Each card has a main body bearing data and an end tab connected to one end of the main body along a tear line,...
Digital safety deposit box
A system that enables secure data storage into a third party managed electronic storage vault is disclosed. This electronic storage vault provides customers...
System, method and computer program product for identifying functions in
computer code that control a behavior...
A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that...
Securing network traffic by distributing policies in a hierarchy over
A technique for securing message traffic in a data network using a protocol such as IPsec, and more particularly various methods for distributing security...
System and method for efficiently securing enterprise data resources
Some embodiments provide a system and method that secures access to data objects of an enterprise that includes multiple data objects and multiple user...
Secure encrypted email server
A computing system utilizing a local or remote secure email server that intercepts secure message that include an identifying domain extension provides secure...
Efficient and secure data currentness systems
Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time...
Wireless communication using compact certificates
A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a...
System and method for facilitating secure online transactions
A method and system for mutually authenticating a client and a server is provided in accordance with an aspect of the present invention. The method commences...
System and method for securely exchanging sensitive information with an
implantable medical device
A system and method for securely exchanging sensitive information with an implantable medical device is presented. A crypto key stored on an implantable medical...
Secure computer system with service guest environment isolated driver
A virtualized computer system includes at least one guest environment (guest), a service guest environment (SG) and trusted software. The at least one guest...
Storage system including a virtual volume, a plurality of disk drives and
a plurality of flash memory devices
The temporary area capacity required to be secured with respect to the whole permanent area is calculated in accordance with the capacity and access frequency...
Portable handheld memory card and methods for use therewith
In one embodiment, a portable handheld memory card may include a Universal Serial Bus (USB) port, USB controller circuitry, an input/output (I/O) port, a...
Secured system for transferring data between two equipments
A system, apparatus and a method to connect at least two items of equipment, a first item of equipment having a first confidentiality level and a second item of...
Multi-layer hardware-based service acceleration (MHSA)
Methods and apparatus for intelligent sharing and tighter integration between a service engine (SE) for network communication and a high-speed forwarding...
Data storage system
The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data...
Detection of network security breaches based on analysis of network record
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a...
Method and system for obtaining user data from third parties
A user of a data management system agrees to allow the data management system to obtain user data associated with the user from a third party target site...
System for secure mobile healthcare selection
A method, system and device for secure mobile healthcare selection are presented in which a user can, from a mobile device, authorize the comparison of...
Method for providing a broadcast encryption based home security system
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The...
Group key security in a multihop relay wireless network
A security zone key is used to secure data traffic/control messages in a multi-hop wireless relay network. In one embodiment, the security zone key is generated...
System and method for restricting network access to one or more nodes in a
wireless communications network
A system and method for providing security to a wireless network by using a mobile node's location as a parameter for deciding if access is to be given to the...
Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
Apparatus for transceiving point to point moving signal reception high
channel using horizontal blanking...
Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking...