At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Storage and retrieval of encrypted data blocks with in-line message
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is...
Flexible method of user authentication
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
Storing secure mode page table data in secure and non-secure regions of
Apparatus for data processing 2 is provided with processing circuitry 8 which operates in one or more secure modes 40 and one or more non-secure modes 42. When...
Secure data transfer using legitimate QR codes wherein a warning message
is given to the user if data transfer...
User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer...
Header-based network API
A method and apparatus for communicating with entities outside of a secure network by intercepting and modifying messages is provided. Techniques for...
Personal data subscriber systems and methods
Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment ("PDP environment") that facilitates the...
Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a filesystem configured to store a plurality of computer files...
Apparatus and method for read consistency in a log mining system
A computer readable storage medium includes executable instructions to receive a specification for requested data in a log based replication system where data...
Method and system for standards guidance
A method and system for guiding end-users with respect to payment card data security standards. The system uses guidance questions that are worded simply and...
Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
Realtime, interactive and geographically defined computerized personal
matching systems and methods
A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless...
Secure remote subscription module access
Disclosed is a method of granting a client communications terminal access to a subscription module of a server communications terminal, the method comprising...
Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
Layer-4 transparent secure transport protocol for end-to-end application
Techniques for providing layer 4 transparent secure transport for end-to-end application protection are described herein. According to one embodiment, a packet...
Standard telephone equipment (STE) based deployable secure communication
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are...
Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to...
Recording medium, method and apparatus for reproducing data on the
recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
Security system using LADAR-based sensors
A security sensor system comprises one or more laser detection and ranging (LADAR) sensors configured for accumulation of three-dimensional image data. In one...
Security device comprising a plurality of interfaces
A security device comprising interfacing means incorporating a speaker (50) and a microphone (49) for interfacing with a person; a mobile network transmitter;...
Apparatus for access control and processing
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located...
System for providing power and data transmission between a door and a
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
Tenant life cycle management for a software as a service platform
Managing user access to application-specific capabilities of a system includes maintaining data correlating application-specific capabilities for each of the...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
Remote network device with security policy failsafe
A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network;...
Secure cross-domain communication for web mashups
A secure cross-domain communication system and method for facilitating secure communication between a website having a web mashup and websites having content...
Methods, systems, and computer program products for modeling a secure
Methods, systems, and computer program products for modeling a secure production network are provided. A method includes generating a test network for emulating...
Real-time adjustments to authentication conditions
Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having...
Information processing apparatus, information management method, and
storage medium therefor
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security...
Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
High availability for network security devices
In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a...
Securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
Methods and apparatuses for secondary conditional access server
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to...
A machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message. The data object is...
Method and apparatus for securely booting from an external storage device
Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a...
Securing wireless body sensor networks using physiological values for
A key establishment protocol for securing wireless body sensor networks using environmental data for nonce values. To establish a secure communication between...
Creating and using secure communications channels for virtual universes
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data...
System and method for compressing secure E-mail for exchange with a mobile
data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
Copy control apparatus
A copy control apparatus for controlling a copy process between disks includes a copy process execution unit, a data capacity measuring unit, and a changing...
Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
Communication mediating device for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
Classification of data in a hierarchical data structure
Embodiments of the invention are generally related to data security, and more specifically to data classification. The nodes of a hierarchical data structure...
Systems and methods for a secure recording environment
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a...
Method and system for securing transactions made through a mobile
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
OCDM-based all optical multi-level security
A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the...
Method and apparatus for cryptographic key storage wherein key servers are
authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
Method and apparatus for secured facsimile transmission
A novel and unique method, program and apparatus for secured facsimile transmission. It converts the image pixels into 8 bit ASCII characters, encrypting the...
Data recovery method, image processing apparatus, controller board, and
data recovery program
A disclosed data recovery method, image processing apparatus, controller board, and data recovery program enable data stored encrypted in a storage unit within...
Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first...