At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
Layer-4 transparent secure transport protocol for end-to-end application
Techniques for providing layer 4 transparent secure transport for end-to-end application protection are described herein. According to one embodiment, a packet...
Standard telephone equipment (STE) based deployable secure communication
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are...
Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to...
Recording medium, method and apparatus for reproducing data on the
recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
Security system using LADAR-based sensors
A security sensor system comprises one or more laser detection and ranging (LADAR) sensors configured for accumulation of three-dimensional image data. In one...
Security device comprising a plurality of interfaces
A security device comprising interfacing means incorporating a speaker (50) and a microphone (49) for interfacing with a person; a mobile network transmitter;...
Apparatus for access control and processing
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located...
System for providing power and data transmission between a door and a
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
Tenant life cycle management for a software as a service platform
Managing user access to application-specific capabilities of a system includes maintaining data correlating application-specific capabilities for each of the...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
Remote network device with security policy failsafe
A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network;...
Secure cross-domain communication for web mashups
A secure cross-domain communication system and method for facilitating secure communication between a website having a web mashup and websites having content...
Methods, systems, and computer program products for modeling a secure
Methods, systems, and computer program products for modeling a secure production network are provided. A method includes generating a test network for emulating...
Real-time adjustments to authentication conditions
Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having...
Information processing apparatus, information management method, and
storage medium therefor
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security...
Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
High availability for network security devices
In one example, a backup intrusion detection and prevention (IDP) device includes one or more network interfaces to receive a state update message from a...
Securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
Methods and apparatuses for secondary conditional access server
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to...
A machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message. The data object is...
Method and apparatus for securely booting from an external storage device
Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a...
Securing wireless body sensor networks using physiological values for
A key establishment protocol for securing wireless body sensor networks using environmental data for nonce values. To establish a secure communication between...
Creating and using secure communications channels for virtual universes
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data...
System and method for compressing secure E-mail for exchange with a mobile
data communication device
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile...
Copy control apparatus
A copy control apparatus for controlling a copy process between disks includes a copy process execution unit, a data capacity measuring unit, and a changing...
Method and systems for securing remote access to private networks
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets...
Communication mediating device for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to...
Classification of data in a hierarchical data structure
Embodiments of the invention are generally related to data security, and more specifically to data classification. The nodes of a hierarchical data structure...
Systems and methods for a secure recording environment
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a...
Method and system for securing transactions made through a mobile
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
OCDM-based all optical multi-level security
A high data rate optical signal is inverse multiplexed into a multitude of lower-rate tributaries, each of which is coded by its unique OCDM code, and the...
Method and apparatus for cryptographic key storage wherein key servers are
authenticated by possession and...
A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured...
Method and apparatus for secured facsimile transmission
A novel and unique method, program and apparatus for secured facsimile transmission. It converts the image pixels into 8 bit ASCII characters, encrypting the...
Data recovery method, image processing apparatus, controller board, and
data recovery program
A disclosed data recovery method, image processing apparatus, controller board, and data recovery program enable data stored encrypted in a storage unit within...
Systems and methods for facilitating conference calls using security keys
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first...
Method for determining a data transport unit parameter for the
communication between two stations in a network...
The invention concerns the technical field of a so-called Path MTU (Maximum Transmission Unit) Discovery process between two computing nodes over packet...
Device and method for managing configuration and for managing maintenance
The subject of the invention is a device for managing configuration and for managing maintenance of apparatus. It relates to a device for managing configuration...
Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
Electronic financial transaction cards and methods
An electronic card has a card body with a power source electrically coupled to a general processor which is electrically coupled to a secure processor and a...
Authenticating electronic financial transactions
To improve security and simplify financial transactions in electronic communications environments, a cryptographic Private Key is securely stored in a storage...
Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
Methods and systems to fingerprint textual information using word runs
The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The...
Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
Backup apparatus with higher security and lower network bandwidth
A system for more secure, more efficient, more widely applicable backup, retention, and retrieval of data. An apparatus comprising improved means for...
Verification of identity based signatures
A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system...
Apparatus and method for data packet security in a wireless sensor network
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory...
Proactive information security management
A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling...
Securing data from a shared device
A method for securing the use of data on a first device where the data is sent from a second device, the method including registering at least a first...