At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure incremental updates to hierarchicaly structured information
Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the...
Method and apparatus for securing data volumes to a remote computer using
A method and apparatus for securing data volumes to a remote computer using journal volumes is provided. In one embodiment, a method for securing data volumes...
System and method for secure and/or interactive dissemination of
An interactive information dissemination system includes a media server (210) for receiving a plurality of media elements and storing the media elements in a...
Security in a mobile communication system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
Induction triggered transactions using an external NFC device
A method for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication...
Image processing apparatus, image processing method, and storage medium
storing computer program for image area...
An image processing apparatus includes an image area separation device, a compression device, an image storage device, an image area storage device, a data...
Method for guaranteeing security of critical data, terminal and secured
A method for guaranteeing the security of critical data, which is used in a terminal including a secured chip and includes the steps of: activating the secured...
Apparatus and method for hash cryptography
An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash...
System and method for securing data exchanged during a telephone call
A system and method for receiving information from a caller without the information being accessed by an agent handling the call. A call is received and routed...
Secure communication using a non-differentiable waveform
A transmitter system includes a processor that synthesizes a randomly varying, non-differentiable waveform by applying independent, pseudo-random variations to...
Method and system for secure communication between a public network and a
A method for secure communication between a local area network and a wide area network includes integrating a NAT functionality in a firewall associated with...
Mobile security monitoring system and associated method
The portable security monitoring system may include a mechanism for automatically capturing real-time audio and video information of the detected dynamic...
Secure data transfer in a communication system including portable meters
The invention relates to a method of performing measurements with a portable meter and reporting measurement data from the portable meter to a central office...
Information collecting and decision making via tiered information network
Techniques, apparatus and systems for information collecting and decision making based on one or more tiered networks of sensors and communication nodes for...
Dual voltage electrical floor box
An outlet box assembly for separating and insulating higher voltage power conductors from lower voltage data conductors. The assembly includes a housing, a...
Signal transmission device
A signal transmission device is provided. The signal transmission device comprises a linked unit, a data connector, a sliding block, a link and a lock block....
Data managing device equipped with various authentication functions
A data managing device with a single chip that includes: first hardware that authenticates security of communication performed by a data processing apparatus...
Approach for managing access to electronic documents on network devices
using document retention policies and...
An approach for managing access to electronic documents uses document retention and document security policies. In response to detecting a request to access a...
Storage system comprising microprocessor load distribution function
Among a plurality of microprocessors 12, 32, when the load on a microprocessor 12 which performs I/O task processing of received I/O requests is equal to or...
Methods and apparatus for providing a secure buffer
The present invention provides a secure buffer for use in data storage and encryption processing. Blocks or packets of data are passed to a secure buffer within...
Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
Security based on subliminal and supraliminal channels for data objects
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal...
Method and system for securely identifying computer storage devices
In a private network setting in which various computers can be attached, the confidential or sensitive data within the various devices on the private network is...
Method and system for providing secure communications between a first and
a second peer device
A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and...
System and method for accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the...
System and method for monitoring secure data on a network
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in...
Asynchronous hypertext messaging
An asynchronous hypertext messaging system and method are disclosed. The system and method use existing hypertext transfer protocols and is capable of...
Method and an apparatus to convert a light signal emitted by a display
into digital signals
The present invention provides a method and a device to convert a time varying optical pattern emitted by a display into a digital data signal. More...
Method and system for secure data entry
The present invention includes a method of secure data entry that enables complex data entry work to be performed by unskilled workers that results in data...
Method and system for utilizing GPS information to secure digital media
A device such as a set-top-box, digital TV, DVD player, multi-media player, cellular telephone or digital cinema player that may handle data such as multimedia...
Implicit certificate scheme
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity...
Process and device for securing the transmission, recording and viewing of
digital audiovisual packetized streams
A process for secure distribution of original digital audiovisual streams including audio, video components or other data, including packetizing the original...
System and method for transmitting over multiple simultaneous
communication networks by using roaming profiles
There is disclosed a system and method for enabling transmission of data between an application pair, a first one of the applications in a nomadic/mobile...
Using application side truetype or other outline fonts to create specialty
imaging fonts on digital front-end
A document printing method includes receiving a print job of electronic document data representing a document including a security character string with at...
Apparatus and method for manipulating images
An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises:...
Security system and method for lottery tickets
A system and method of printing lottery tickets produces a prize structure with ticket books containing all available prizes. A game generation file is then...
Privacy protection system
Novel system and methodology for protecting privacy of a computer device's user. A privacy protection device interacts with the computer device to enable the...
Cryptographically controlling access to documents
Aspects of the subject matter described herein relate to cryptographically controlling access to documents. In aspects, documents are encrypted to protect them...
Information transmission apparatus, data transmission apparatus,
information transmission destination...
In order to enable utilization of a personal address book by another person while maintaining security, in case display of information on an information...
Method and apparatus for securing sensitive data from misappropriation by
A method and apparatus for securing sensitive data from misappropriation by malicious software is provided. In one embodiment, the method for securing sensitive...
Systems and methods for measuring cyber based risks in an enterprise
A method and system are disclosed for assessing cyber-based risks in an enterprise organization. A database comprising vulnerability data associated with...
A security information management system is described, wherein a database of potential vulnerabilities is maintained, along with data describing remediation...
Bilateral communication using multiple one-way data links
A bilateral data transfer system comprising a first node, a second node, a first one-way link for unidirectional transfer of first data from the first node to...
System and method for VoIP firewall security
Configuration data within a session border controller (SBC) is updated to support a new external node in an automatic fashion by a computer system. A user is...
Information processing apparatus and information processing system
An information processing system is supplied capable of holding a security; and transferring an output authority which is had by a transfer source portability...
UDP communication with a programmer interface over wireless networks
Systems and methods provide for secure communications between local and remote devices or networks in virtual private networks. Data can be communicated between...
Information processor, method for managing the same and computer program
An information processor is provided that can maintain security in the entire network and use recording media resources efficiently. An image forming apparatus...
System and method for dynamic security provisioning of data resources
The present invention facilitates the dynamic provisioning of data assets in a shared storage environment. The invention provides a system and method for...
Storage management device, storage management method, and storage system
A storage system includes data storage devices, spare storage devices used when a failure occurs in a data storage devices, a group management unit that divides...
Data processing device and method for switching states thereof
The present invention provides a data processing device and a method for switching states thereof. The data processing device comprises an operating system and...