At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for determining a data transport unit parameter for the
communication between two stations in a network...
The invention concerns the technical field of a so-called Path MTU (Maximum Transmission Unit) Discovery process between two computing nodes over packet...
Device and method for managing configuration and for managing maintenance
The subject of the invention is a device for managing configuration and for managing maintenance of apparatus. It relates to a device for managing configuration...
Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
Electronic financial transaction cards and methods
An electronic card has a card body with a power source electrically coupled to a general processor which is electrically coupled to a secure processor and a...
Authenticating electronic financial transactions
To improve security and simplify financial transactions in electronic communications environments, a cryptographic Private Key is securely stored in a storage...
Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
Methods and systems to fingerprint textual information using word runs
The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The...
Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
Backup apparatus with higher security and lower network bandwidth
A system for more secure, more efficient, more widely applicable backup, retention, and retrieval of data. An apparatus comprising improved means for...
Verification of identity based signatures
A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system...
Apparatus and method for data packet security in a wireless sensor network
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory...
Proactive information security management
A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling...
Securing data from a shared device
A method for securing the use of data on a first device where the data is sent from a second device, the method including registering at least a first...
A road pricing smart client and method for a road pricing system enabling the removal of information from the positioning data describing the itinerary which...
Method and system for improving client server transmission over fading
channel with wireless location and...
Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification...
Techniques for data encryption and decryption
Techniques for securing data access are presented. A sender encrypts data into a first integer value. A first knot is selected along with first and second keys....
Systems and methods for shared secret data generation
Disclosed examples of secure communications involve generating, by a mobile communication network device, a shared secret data having a length of M units. A...
Method and apparatus for controlling packet flow in a packet-switched
A method and apparatus for controlling data packet flooding in a data-communication network to promote network security and provide for more efficient...
Method of measuring radiation characteristic of antenna
Disclosed is a method of measuring the radiation characteristic of an antenna, where sufficient power is secured within a short period of time and supplied in a...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
In-line decryption device for securely printing documents
A media content printing method that includes storing encrypted media content data representing media content in a computing device, generating a file of print...
System, method, and computer program product for securing data on a server
based on a heuristic analysis
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with...
System for detecting vulnerabilities in web applications using client-side
An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing,...
System and method for performing remote security assessment of firewalled
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
Remotely defining security data for authorization of local application
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing...
Hardware secured portable storage
A portable storage device contains a real time clock, an onboard power source and secure storage. These components enable the device to securely store data and...
Method and apparatus for supporting a virtual private network architecture
on a partitioned platform
A computer system includes a service partition, not directly accessible to a user, having a security agent to inspect data entering and exiting the computer...
Secured IPv6 traffic preemption
In one embodiment, a method includes receiving, by an access router, an Internet Protocol version 6 (IPv6) packet that specifies a request for executing a...
System and method for media transcoding and presentation
A method and apparatus for presenting a media data stream complying with a broadcast encryption standard is disclosed. A dongle is removably coupleable to a...
Data storage medium support member, chucking device, brushless motor, and
disc drive apparatus
A data storage medium support member is produced by resin molding. The data storage medium support member includes an accommodating portion, a guide portion,...
Securely computing a similarity measure
The present invention relates to a method and a system of securely computing a measure of similarity for at least two sets of data. A basic idea of the present...
Notarizable electronic paper
A system and method helps to control "read" and/or "write" access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper...
Techniques for key distribution for use in encrypted communications
Techniques for key distribution used with encrypted communications are provided. A shared secret associated with a principal is maintained securely and...
Method and apparatus for security over multiple interfaces
A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a...
Out of band encryption
Embodiments of the invention relate to systems and methods for securing data transmission in networks. Embodiments of the invention further relate to encryption...
Generation and/or reception, at least in part, of packet including
An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an...
Security method using self-generated encryption key, and security
apparatus using the same
A security method and a security apparatus are disclosed which use a self-generated encryption key. The security method includes the steps of: generating an...
System and method for acceleration of a secure transmission over satellite
A broadband communication system with improved latency is disclosed. The system employs acceleration of secure web-based communications over a satellite...
System and method for providing network support services and premises
gateway support infrastructure
A disclosed, service management system (50) communicates via wide area network (99) with gateway devices (10), located at respective user premises. The service...
Editing lifecycle and deployment of objects in an industrial automation
An editor in an industrial automation environment comprises an input component that receives modification data relating to at least one of lifecycle and...
Four frequency band single GSM antenna
A reach back secure communications terminal capable of GSM network connectivity includes a GSM fixed cellular terminal, and a single whip antenna adapted for...
Method and apparatus for providing security in wireless communication
A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system....
Scrambling and descrambling systems for secure communication
Various embodiments of the present invention are directed to scrambling-descrambling systems for encrypting and decrypting electromagnetic signals transmitted...
Secure presentation of media streams in response to encrypted content
Secure presentation of media streams includes encoding the media streams into digital content, encrypting a portion of that digital content, the portion being...
Method and system for securing data utilizing redundant secure key storage
A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least...
System and method for protecting data in a secure system
A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan...
Chinese remainder theorem-based computation method for cryptosystems
A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod pq), upon a message data value C using a Chinese Remainder...
Advanced aircraft cockpit
An aircraft cockpit that includes comfort and/or security adjustable equipment in which the adjustments are controlled by an adjustment management system so...
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
Systems and methods for securely processing sensitive streams in a mixed
A system and method for securely processing sensitive streams in a mixed infrastructure includes analyzing a stream to determine data sensitivity. A likelihood...