At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for loading a secure firmware update on an adapter
device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
Biometric identification network security
Systems and methods for regulating user access in the context of a biometric security system are disclosed. One method disclosed includes receiving a remotely...
Systems, devices, and methods for securely transmitting a security
parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
Secure virtual tape management system with early read support options
A secure virtual tape management system with early read support options. The system includes at least two mainframe hosts having a catalog storing tape related...
Small table: multitenancy for lots of small tables on a cloud database
Methods and apparatus are described for partitioning native tables in a database cluster into logical tables. Each logical table is mapped into a unique portion...
System and method for identifying data streams associated with medical
A system and method for uniquely identifying data streams associated with medical equipment are described. The system may be implemented in a variety of ways,...
Method and apparatus for providing multiservice testing
An approach is provided for a multiservice tester. A connection over an access link providing a customer premise with connectivity to a plurality of...
Product update via voice call in mobile security
Methods and apparatus for updating security software products on mobile telephones are described. When an update is available for a security software product...
Frame indexing technique to improve personal video recording functionality
and security of transmitted video
One or more methods and systems of efficiently indexing a digitized video stream is presented. In one embodiment, the method comprises receiving a coded video...
Secure software download
Software can be downloaded securely using a multi-encryption method, where the decryption is completed when the software is executed. In one aspect, a...
Method for securely extending key stream to encrypt high-entropy data
A stream stretcher is provided for securely expanding a key stream to match the length of a data block to be encrypted and/or decrypted. A key stream is...
Font level encryption method and apparatus
This invention improves upon the existing art by implementing encryption at the "font level," thereby, in affect, protecting each independent small portion of a...
Data security seeding system
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The...
Real-time packet processing system and method
In some embodiments, the invention may include a combination of real-time packet detection, processing and routing. When implemented in a distributed...
Method and apparatus for the classification of ports on a data
communication network node
A method and apparatus for classifying a port on a node in a data communications network, such as a router. The node, itself or in some embodiments though...
Secure data storage
A hard disk drive includes a chassis which supports a "sealed" housing containing a data storage magnetic disk, and read/write heads and actuator. The housing...
Secure computer screen entry system and method
A method for entering secure data at an input device includes displaying a graphical input region having input elements, such as a number keypad, and receiving...
Double layer UV variable data text
A method and system are provided for including a double layer security mark in digital document data defining an image of a document to be printed and in the...
Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
Approach for printing locked print data using user and print data
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and...
Security incident manager
A security incident manger includes events and network flows in the analysis of an attack to better identify the magnitude of the attack and how to handle the...
Encryption of voice and data in a single data stream in a deployable,
secure communication system
Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit,...
Method and system for presenting structured information in an interactive
The present invention provides an interactive multimedia system for providing structured information systems, for example help systems for desktop and network...
Security for RAID systems
Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into...
Method and apparatus for protecting SIMLock information in an electronic
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
Data-securing method of program tool
A program tool with a data-securing function includes a flow control center and a plurality of processing units for performing respective processing steps. The...
Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
Incremental secure backup and restore of user settings and data
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to...
System and method for implementing security of multi-party-communication
A system and method for implementing security of multi-party communication is disclosed in the disclosure. The system mainly includes a group key management...
System for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
Method and system for providing a healthcare expense donation network
A method and system for providing a healthcare expense donation network whereby a third party provided healthcare management system, such as a computing system...
Voice-over-IP (VoIP) systems, components and methods for providing
enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
System for mobile broadband networking using dynamic quality of service
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service...
Portable wireless terminal and its security system
The present invention relates to a portable wireless terminal, and in particular, a portable wireless terminal such as a cellular phone, etc., and its security...
Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
Method and system for securing communications in a metering device
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via...
Video monitoring system with video signal encrypted and the method for the
Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring...
Systems and methods for key generation in wireless communication systems
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless...
Routing method and wireless network system
A routing method of a wireless network system is provided. Paths of the wireless network system are divided into down-stream and up-stream paths. The up-stream...
Integrated circuit embedded with non-volatile programmable memory having
variable coupling and separate...
A multi-programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and...
Method and apparatus for the production of polarization holograms
The present invention relates to a method for the production of polarization holograms, an apparatus for the production of polarization holograms and the use of...
Wireless video surveillance system and method with external removable
A surveillance system and method with wireless communication between components for providing an external removable data storage device capable of recording...
Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
Kit and system for providing security access to a door using power over
ethernet with data persistence and fire...
The present disclosure describes embodiments of a power-over-ethernet ("POE") controller and an access control system comprising the same. In an embodiment, the...
Method for carrying out a secure electronic transaction using a portable
A method for effecting a secure electronic transaction on a terminal using a portable data carrier is proposed. According to the method a user (30) first...
System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
Platform posture and policy information exchange method and apparatus
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy...
System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
Method for the authenticated transmission of a personalized data set or
program to a hardware security module...
In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking...