At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Printing device and printing method
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The...
Thin film transistor substrate and method for fabricating the same
The present invention relates to a thin film transistor substrate and method for fabricating the same which can secure an alignment margin and reduce the number...
Battery management for a breathing assistance system
A method for providing battery security in a breathing assistance system configured to provide breathing assistance to a patient is provided. A battery security...
Security and licensing with application aware storage
Described are techniques for processing a data storage configuration request for an application. The data storage configuration request is received from a...
Identifying data associated with security issue attributes
A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or...
Combining assessment models and client targeting to identify network
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks...
Methods, devices, systems, and computer program products for edge driven
communications network security monitoring
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim...
System and method for privilege delegation and control
This invention provides a privilege delegation mechanism, which allows a privilege and associated control attributes to be delegated from a security token to...
Method for enhancing network application security
A method for securing communications between a server and an application downloaded over a network onto a client of the server is disclosed. A first request is...
Key storage administration
The present invention relates to a method and a system for allowing multiple applications to manage their respective data in a device (100, 200) having a secure...
Data security in an information processing device
A device and method for data protection of inputted and stored publicly encrypted data. Publicly encrypted data can be received by a data receiver module and...
Identity based network policy enablement
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between...
System and method for generating secured authentication image files for
use in device authentication
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure...
Restricting memory areas for an instruction read in dependence upon a
hardware mode and a security flag
An apparatus for processing data 2 includes a processor 8, a memory 6 and memory control circuitry 12. The processor 8 operates in a plurality of hardware modes...
System for determining allocation of tape drive resources for a secure
data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance...
Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic...
Method and system for data security in an IMS network
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed....
Methods and systems related to securities trading
One exemplary aspect comprises: (a) receiving data describing an executed trading order in a market traded security and related trade execution data; (b)...
Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance...
Method and system for managing inventory and promotions campaign based on
Provided is a method and system for the management of inventory and/or promotional campaigns associated with electronic distribution of secure money saving or...
Classification and web-based presentation of oil and gas SCADA data
Disclosed are techniques for acquiring, processing and presenting data produced by one or more devices and meters in the field. One or more servers, such as...
System and method for smart card personalization
A smart card personalization system maintains a database containing card issuer data format templates, card applications, card operating system commands, and...
Wide field-of-view amplified fiber-retro for secure high data rate
communications and remote data transfer
An optical system for remotely optical communications at a high data rate between a base station and a remote station under atmospheric turbulence conditions is...
Person/object image and screening
A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the...
System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
System for secure packet communication
A system for processing a communication data item. The communication data item is divided into at least two unencrypted packets to be encrypted. Each encrypted...
Communication control method, communication system and communication
The same number is redundantly set as the extension number associated to a fourth telephone number in different data tables associated to different second...
Two terminal programmable hot channel electron non-volatile memory
A programmable two terminal non-volatile device uses a floating gate that can be programed by a hot electron injection induced by a potential between a source...
Method and system for providing tracking services to locate an asset
In a method of asset location data is received from a cellular transmitter associated with a selected asset, which location data includes data representative of...
A graphically represented, machine-readable code having a first abstract part and a second part comprises a contrived code having pre-associated data, wherein...
The invention relates to a cartridge (1) for insertion into a receptacle of a motor vehicle handling facility having an interior chamber (2) which receives a...
System and method for ensuring security of data stored on electronic
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
Apparatus and method for associating categorization information with
network traffic to facilitate application...
An apparatus is described that associates categorization information with network traffic to facilitate application level processing through processing of...
Secure single-sign-on portal system
A computer-implemented portal system facilitates access to secure data and multiple secure-access internet sites. The system authenticates a user based on a...
Transforming claim based identities to credential based identities
Claim based identities are transformed to a set of credentials and securely stored in a secure data store using a number of encryption schemes. The credentials...
Copy protection of software and/or data
Autorun functionality is incorporated into a portable device such as a flash drive, a wireless adapter, a communication adapter, or any USB peripheral device....
Storage and retrieval of encrypted data blocks with in-line message
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is...
Flexible method of user authentication
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of...
Storing secure mode page table data in secure and non-secure regions of
Apparatus for data processing 2 is provided with processing circuitry 8 which operates in one or more secure modes 40 and one or more non-secure modes 42. When...
Secure data transfer using legitimate QR codes wherein a warning message
is given to the user if data transfer...
User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer...
Header-based network API
A method and apparatus for communicating with entities outside of a secure network by intercepting and modifying messages is provided. Techniques for...
Personal data subscriber systems and methods
Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment ("PDP environment") that facilitates the...
Systems and methods for probabilistic data classification
A system for performing data classification operations. In one embodiment, the system comprises a filesystem configured to store a plurality of computer files...
Apparatus and method for read consistency in a log mining system
A computer readable storage medium includes executable instructions to receive a specification for requested data in a log based replication system where data...
Method and system for standards guidance
A method and system for guiding end-users with respect to payment card data security standards. The system uses guidance questions that are worded simply and...
Methods and systems related to securities trading
At least one exemplary aspect comprises a method comprising: (a) receiving electronic data describing a trading order for a market-traded security; (b) checking...
Realtime, interactive and geographically defined computerized personal
matching systems and methods
A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless...
Secure remote subscription module access
Disclosed is a method of granting a client communications terminal access to a subscription module of a server communications terminal, the method comprising...
Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...