At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Real-time packet processing system and method
In some embodiments, the invention may include a combination of real-time packet detection, processing and routing. When implemented in a distributed...
Method and apparatus for the classification of ports on a data
communication network node
A method and apparatus for classifying a port on a node in a data communications network, such as a router. The node, itself or in some embodiments though...
Secure data storage
A hard disk drive includes a chassis which supports a "sealed" housing containing a data storage magnetic disk, and read/write heads and actuator. The housing...
Secure computer screen entry system and method
A method for entering secure data at an input device includes displaying a graphical input region having input elements, such as a number keypad, and receiving...
Double layer UV variable data text
A method and system are provided for including a double layer security mark in digital document data defining an image of a document to be printed and in the...
Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
Approach for printing locked print data using user and print data
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and...
Security incident manager
A security incident manger includes events and network flows in the analysis of an attack to better identify the magnitude of the attack and how to handle the...
Encryption of voice and data in a single data stream in a deployable,
secure communication system
Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit,...
Method and system for presenting structured information in an interactive
The present invention provides an interactive multimedia system for providing structured information systems, for example help systems for desktop and network...
Security for RAID systems
Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into...
Method and apparatus for protecting SIMLock information in an electronic
The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit...
Data-securing method of program tool
A program tool with a data-securing function includes a flow control center and a plurality of processing units for performing respective processing steps. The...
Trusted storage systems and methods
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of...
Incremental secure backup and restore of user settings and data
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to...
System and method for implementing security of multi-party-communication
A system and method for implementing security of multi-party communication is disclosed in the disclosure. The system mainly includes a group key management...
System for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
Method and system for providing a healthcare expense donation network
A method and system for providing a healthcare expense donation network whereby a third party provided healthcare management system, such as a computing system...
Voice-over-IP (VoIP) systems, components and methods for providing
enhanced location information to emergency...
Disclosed are systems and techniques for identifying VoIP phone connector locations whereby an emergency call request can be specifically located on a VoIP...
System for mobile broadband networking using dynamic quality of service
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service...
Portable wireless terminal and its security system
The present invention relates to a portable wireless terminal, and in particular, a portable wireless terminal such as a cellular phone, etc., and its security...
Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
Wireless mesh network with secure automatic key loads to wireless devices
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a...
Method and system for securing communications in a metering device
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via...
Video monitoring system with video signal encrypted and the method for the
Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring...
Systems and methods for key generation in wireless communication systems
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless...
Routing method and wireless network system
A routing method of a wireless network system is provided. Paths of the wireless network system are divided into down-stream and up-stream paths. The up-stream...
Integrated circuit embedded with non-volatile programmable memory having
variable coupling and separate...
A multi-programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and...
Method and apparatus for the production of polarization holograms
The present invention relates to a method for the production of polarization holograms, an apparatus for the production of polarization holograms and the use of...
Wireless video surveillance system and method with external removable
A surveillance system and method with wireless communication between components for providing an external removable data storage device capable of recording...
Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
Kit and system for providing security access to a door using power over
ethernet with data persistence and fire...
The present disclosure describes embodiments of a power-over-ethernet ("POE") controller and an access control system comprising the same. In an embodiment, the...
Method for carrying out a secure electronic transaction using a portable
A method for effecting a secure electronic transaction on a terminal using a portable data carrier is proposed. According to the method a user (30) first...
System and method for data mining and security policy management
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a...
Platform posture and policy information exchange method and apparatus
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy...
System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a...
Method for the authenticated transmission of a personalized data set or
program to a hardware security module...
In a method and arrangement for authenticated transmission of a personalized data set or program to a hardware security module in a device such as a franking...
Access point, terminal, encryption key configuration system, encryption
key configuration method, and program
An object of the present invention is to enable the configuration tasks needed to form a wireless LAN to be performed using a simple method while increasing...
Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
Hiding sensitive information
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information...
Abstraction based audit and security log model for increased role and
Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be...
Open end mutual fund securitization process
A computer implemented system is provided for exchanging shares in an exchange traded product. A display is provided for displaying data representing shares of...
Systems and methods for preventing sensitive information from being
communicated into a non-secure environment
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is...
RF-ID tag reading system for using password and method thereof
Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to...
Portable access device
Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing...
Security system to prevent tampering with a server blade
Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises...
Secure data storage system and method
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address...
System and method of managing network security risks
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module....
Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...