At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for monitoring individuals using a beacon and
intelligent remote tracking device
A system for monitoring an individual is described where the system includes a fixed beacon at a known location, the fixed beacon periodically emitting a signal...
Method for improving security of the security token and apparatus therefor
A method for improving security of the security token, comprising the steps of: detecting the bioelectrical signal of the host user; and allowing the host to...
Image processing apparatus, image processing method and recording medium
An image processing apparatus, comprises: a document reader that reads images printed in a plurality of areas in a document; a printer that prints on a sheet...
Camera image transmission
A data and image transmission system includes at least one interactive control server system, coupled to a communications network, to which a user may connect...
Selective encryption of data stored on removable media in an automated
data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
Secure data cartridge
An embodiment of a data cartridge for interfacing with a data cartridge authorization system is disclosed. The data cartridge includes a drive and a...
Transmitting security data in multipart communications over a network
Embodiments of the invention provide for efficiently implementing security features over HTTP communications. In some embodiments, a security feature, such as a...
Method and system for secure collaboration using slepian-wolf codes
A method and system provide for secure sharing of arbitrary data between users with limited mutual trust. A user can encode its information by using a...
Storage device with built-in data security system
A fixed disc drive includes a built-in user level security system. The system includes instructions that create an user interface upon a computer allowing...
Method and apparatus for communicating data between two hosts
A method for communicating video data between at least a first host and a second host comprises: identifying, at a server, an address of the first host, to...
Web browser security
A web browser security system including a network detector configured to detect when a computer attempts to connect to a computer network, and a data protector...
Health reporting mechanism for inter-network gateway
A method of monitoring the stability of a network includes polling an inter-network gateway to collect data related to the inter-network gateway. In one...
Secure networked transaction system
A method and system for approving a transaction between a customer and a merchant including the steps of transmitting a transaction request from a customer to a...
Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance...
Combined estimate contest and prediction market
Users participate in an estimate contest and a prediction market for forecasting an outcome of a future event. Data from the estimate contest and the prediction...
Open transaction central billing system
Systems and methods comprise an end-user device, including one or more processors configured to execute a payment component, the payment component configured to...
Transcription data security
A computer program product for use with dictated medical patient information resides on a computer-readable medium and comprises computer-readable instructions...
Sound definition language method with inline modifiers
A method and apparatus is shown to provide a downloadable and user configurable sound generator based on a Sound Definition Language method with inline...
Process and system for the secure broadcasting of protected audiovisual
streams to a dynamic group of receivers
A process for the distribution of digital audiovisual sequences. An analysis is made prior to transmission to a dynamic group of receivers to generate a first...
Security circuit using at least two finite state machine units and methods
using the same
A security circuit using at least two finite state machine units for storing data to and reading data from a multiport memory in a pipelined manner and an...
Method and system for distributed call recording
A distributed call recording method and system. A recording agent performs recording of a phone call, preparing of the recorded phone call for being...
Radio communication device and radio communication system
A radio communication device is provided, including a radio control unit for achieving timing synchronization using frames having a fixed period, assigning a...
Semiconductor device and method for fabricating the same
A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed...
Security control verification and monitoring subsystem for use in a
computer information database system
A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each...
Incident prioritization and adaptive response recommendations
Providing adaptive response recommendations for a network security incident comprising at least one underlying security event is disclosed. A first set of data...
Systems and methods for using reputation data to detect
shared-object-based security threats
Computer-implemented methods and systems for using reputation data to detect shared-object-based security threats are disclosed. In one example, an exemplary...
Systems and methods for detecting child identity theft
Embodiments of the present invention provide systems and methods for detecting an indication of a suspicious event associated with personal information of a...
Method and system to provide physical port security in a digital
A method and system of providing physical port security in a digital data network is disclosed. The system keeps bit maps of allowed physical output ports for...
Authentication system for enhancing network security
A network-based biometric authentication system includes a client computer (10), a third party server (24), and a biometric authentication server (26). A user...
Security technique for controlling access to a network by a wireless
The present invention relates to a method for protecting the security of a computer network which is accessed through the use of wireless devices, among other...
Method and apparatus for creating an information security policy based on
a pre-configured template
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is...
Apparatus for control systems with objects that are associated with live
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
Method and apparatus for generating a compressed and encrypted baseline
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including...
Method and system for mixed symmetric and asymmetric encryption of .ZIP
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
Methods of storing and retrieving data in/from external server
Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from...
Data access security
An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a...
Anchor point-based digital content protection
Digital content protection can be effectively implemented through use of an anchor point and binding records in a user domain. An anchor point domain may...
Providing secure inter-application communication for a mobile operating
Providing for secure and efficient communication for mobile applications executed in a mobile operating environment is described herein. As an example, a...
System and method for control of security configurations
Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls...
Secured seeding of data in a distributed environment
Techniques for seeding data among client machines, also referred to as boxes herein, are disclosed. To prevent the data distributed among the boxes from being...
Dynamic address change for slave devices on a shared bus
A master/slave data communication system in which a master device communicates with the slave devices by uniquely addressing each of the slave devices. In order...
System and method for managing welding information
A system and method for managing welding information is provided. The invention includes a remote system, a client system and/or a welder. The invention further...
System and method for interactive correlation rule design in a network
A method for generating correlation rules for events comprises receiving event data for each of a plurality of events, the event data of a particular event...
Methods, software, and systems for over-the-counter trading
Methods, software, and hardware are disclosed for providing verified real time price quotes in an over-the-counter financial market. Systems are described that...
Escrowing digital property in a secure information vault
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow...
Encoded colorgram for mobile device security
A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the...
Data security device
A backup device comprising a secondary user-carried device for backing up data from a primary portable data storage device is described. The backup device...
Method and device for speeding up key use in key management software with
In the key management software having a key database with a tree structure, a high-speed data encryption/decryption process is achieved by changing the tree...
Methods and systems for secure distribution of subscription-based game
A method for secure communications. At least one encryption key can be generated based on a pass-phrase that associates a unique identifier of a client system...
Communications switching architecture
Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,...