At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Screening using a personal identification code
A system of screening servers, screener client computers, and screening kiosks distribute an applicant screening process among multiple sites and multiple...
Packet-based and pseudo-packet based cryptographic communications systems
The disclosed technology provides a system and method of securely communicating data. An encryptor located at a transmitter can provide encrypted data to the...
Security erase of a delete file and of sectors not currently assigned to a
Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used...
System for tracking digital information over a communications network
A method for tracking digital files transmitted over the Internet by placing certain identifying indicia within a file, and monitoring selected sites through...
Privacy model that grants access rights and provides security to shared
Systems and/or methods that mitigate overexposure of shared content and that facilitate improving security of content in a computing environment are provided....
System and method for parsing, summarizing and reporting log data
A system and method is disclosed which enables network administrators and the like to quickly analyze the data produced by log-producing devices such as network...
Method, system and apparatus for secure data editing
A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data...
Systems and associated methods for implementing electronic property bond
A system, associated methods, computer readable storage medium encoded with programming, and computer program product are disclosed for simultaneously collating...
Secure data write apparatus and methods for use in safety instrumented
process control systems
Secure data write apparatus and methods for use in safety instrumented process control systems select a parameter associated with a process control element...
Methods and apparatus for use in transferring user data between two
different mobile communication devices...
A source device is initially enabled to maintain data synchronization with a host server over a wireless communication network via a first wireless transceiver...
Securing an optical communications network path by suppression of learned
A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in...
Method and apparatus for securing data in a memory device
A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the...
System and method for monitoring individuals using a beacon and
intelligent remote tracking device
A system for monitoring an individual is described where the system includes a fixed beacon at a known location, the fixed beacon periodically emitting a signal...
Method for improving security of the security token and apparatus therefor
A method for improving security of the security token, comprising the steps of: detecting the bioelectrical signal of the host user; and allowing the host to...
Image processing apparatus, image processing method and recording medium
An image processing apparatus, comprises: a document reader that reads images printed in a plurality of areas in a document; a printer that prints on a sheet...
Camera image transmission
A data and image transmission system includes at least one interactive control server system, coupled to a communications network, to which a user may connect...
Selective encryption of data stored on removable media in an automated
data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
Secure data cartridge
An embodiment of a data cartridge for interfacing with a data cartridge authorization system is disclosed. The data cartridge includes a drive and a...
Transmitting security data in multipart communications over a network
Embodiments of the invention provide for efficiently implementing security features over HTTP communications. In some embodiments, a security feature, such as a...
Method and system for secure collaboration using slepian-wolf codes
A method and system provide for secure sharing of arbitrary data between users with limited mutual trust. A user can encode its information by using a...
Storage device with built-in data security system
A fixed disc drive includes a built-in user level security system. The system includes instructions that create an user interface upon a computer allowing...
Method and apparatus for communicating data between two hosts
A method for communicating video data between at least a first host and a second host comprises: identifying, at a server, an address of the first host, to...
Web browser security
A web browser security system including a network detector configured to detect when a computer attempts to connect to a computer network, and a data protector...
Health reporting mechanism for inter-network gateway
A method of monitoring the stability of a network includes polling an inter-network gateway to collect data related to the inter-network gateway. In one...
Secure networked transaction system
A method and system for approving a transaction between a customer and a merchant including the steps of transmitting a transaction request from a customer to a...
Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance...
Combined estimate contest and prediction market
Users participate in an estimate contest and a prediction market for forecasting an outcome of a future event. Data from the estimate contest and the prediction...
Open transaction central billing system
Systems and methods comprise an end-user device, including one or more processors configured to execute a payment component, the payment component configured to...
Transcription data security
A computer program product for use with dictated medical patient information resides on a computer-readable medium and comprises computer-readable instructions...
Sound definition language method with inline modifiers
A method and apparatus is shown to provide a downloadable and user configurable sound generator based on a Sound Definition Language method with inline...
Process and system for the secure broadcasting of protected audiovisual
streams to a dynamic group of receivers
A process for the distribution of digital audiovisual sequences. An analysis is made prior to transmission to a dynamic group of receivers to generate a first...
Security circuit using at least two finite state machine units and methods
using the same
A security circuit using at least two finite state machine units for storing data to and reading data from a multiport memory in a pipelined manner and an...
Method and system for distributed call recording
A distributed call recording method and system. A recording agent performs recording of a phone call, preparing of the recorded phone call for being...
Radio communication device and radio communication system
A radio communication device is provided, including a radio control unit for achieving timing synchronization using frames having a fixed period, assigning a...
Semiconductor device and method for fabricating the same
A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed...
Security control verification and monitoring subsystem for use in a
computer information database system
A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each...
Incident prioritization and adaptive response recommendations
Providing adaptive response recommendations for a network security incident comprising at least one underlying security event is disclosed. A first set of data...
Systems and methods for using reputation data to detect
shared-object-based security threats
Computer-implemented methods and systems for using reputation data to detect shared-object-based security threats are disclosed. In one example, an exemplary...
Systems and methods for detecting child identity theft
Embodiments of the present invention provide systems and methods for detecting an indication of a suspicious event associated with personal information of a...
Method and system to provide physical port security in a digital
A method and system of providing physical port security in a digital data network is disclosed. The system keeps bit maps of allowed physical output ports for...
Authentication system for enhancing network security
A network-based biometric authentication system includes a client computer (10), a third party server (24), and a biometric authentication server (26). A user...
Security technique for controlling access to a network by a wireless
The present invention relates to a method for protecting the security of a computer network which is accessed through the use of wireless devices, among other...
Method and apparatus for creating an information security policy based on
a pre-configured template
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is...
Apparatus for control systems with objects that are associated with live
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
Method and apparatus for generating a compressed and encrypted baseline
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including...
Method and system for mixed symmetric and asymmetric encryption of .ZIP
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
Methods of storing and retrieving data in/from external server
Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from...
Data access security
An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a...
Anchor point-based digital content protection
Digital content protection can be effectively implemented through use of an anchor point and binding records in a user domain. An anchor point domain may...