At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and network for securely delivering streaming data
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a...
Setting a preliminary time on a network appliance using a digital
A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a server using a...
Security architecture for peer-to-peer storage system
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing...
Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
Storing resource information
In an illustrative embodiment, a data processing system for resource data management is provided. The data process system comprises a set of data structures...
Method, system, and computer program product for managing controlled
residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
Security module for encrypting a telephone conversation
A telephone conversation between one or several first telecommunication terminals in a packet oriented data network and telecommunication terminals in an analog...
System and method of facilitating the identification of a computer on a
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
Secure and seamless wireless public domain wide area network and method of
using the same
A wireless public domain Wide Area Network (WPDWAN) is a system and method of providing high throughput data services to public domain customers through the use...
Network security authentication method
An authentication method for network security includes: configuring a Media Gateway (MG) with an authentication key and setting a security data package on a...
Remote virtual medical diagnostic imaging viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
Authentication and encryption for secure data transmission
A system and method for authenticating and encrypting messages for secure transmission is disclosed. A frame to be transmitted between devices comprises a frame...
Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
Data backup, storage, transfer and retrieval system, method and computer
A file storage and retrieval system, method and computer program product connects an account user's computer to a remote, secure, redundant system computer via...
Secure method of synchronizing cache contents of a mobile browser with a
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
Providing a virtual binding for a worm storage system on rewritable media
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM...
E-bazaar featuring personal information security
Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational...
Web-based issuer support services
A web-based process, residing on a server, provides issuer support services to a financial market. This web-based process includes an issue and issuer process...
Method for the administration of medical patient data
In a method for the administration of medical patient data with a centralized or decentralized patient medical file having secured access enabled by the patient...
Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
Method and system for utilizing a high frequency PHY layer for high speed
data transmission between wireless...
A single communication stack may be utilized to setup a data transmission session between wireless devices. A primary physical layer corresponding to the single...
Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
Secure voice transaction method and system
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing...
Transmitting and receiving method and apparatus in real-time system
A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a...
Method for transmitting content with copy control information, content
identification information and content...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
Image processing device, method and program product processing barcodes
with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
Image pickup apparatus for performing a desirable self timer shooting and
an automatic shooting method using...
An image pickup apparatus includes a system controller and a face detector, and can register face data of a photographer for a self-timer shooting mode in...
System for secure transfer of online privileges
Methods and apparatus for transferring privileges in a computer system. In one implementation, a system for transferring online privileges includes: a game...
Secure system and method for processing data between a first device and at
least one second device provided...
A secure system (1) for processing data includes a first device (2), and at least one second device (3) is characterized in that--each second device (3)...
System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may...
Methods systems and articles of manufacture for generating and displaying
video related to financial application
Systems, methods and articles of manufacture for generating a video such that when another person views the video, the other person can view non-private...
Intrusion detection report correlator and analyzer
A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion...
Secured web based access of failed flows in an integration server
A method for accessing failed events in an integrated server environment is disclosed. The method comprises providing a thin client in an application server...
Lockless distributed IPsec processing
According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of...
Systems and methods for controlling access to a public data network from a
visited access provider
To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an...
Trusted network connect system based on tri-element peer authentication
A trusted network connect (TNC) system based on tri-element peer authentication (TePA) is provided. An network access requestor (NAR) of an access requestor...
A device that is configured for wireless communication and for execution of at least one client application is disclosed. The device comprises an integrated...
Data transfer across a network
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations...
Methodology for vaulting data encryption keys with encrypted storage
A method is provided to allow for encryption keys to be safely vaulted and for restarts after system failures, even when an external key server is not...
System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
Information processing apparatus, information recording medium
manufacturing apparatus, and information...
A configuration is provided for enabling a process in which appropriate content code corresponding to apparatuses and applications of various model types and...
Secure data verification via biometric input
An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with...
Method and apparatus for verifying authenticity of digital data using
A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The...
Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
Portable electronic entity and communication method
The pocket portable electronic entity (400) with connection element (420) for removable connection to a host station (300), having first members (460, 470, 471)...
Method and system for secure exchange of data in a network
A first network device implements a method for the secure exchange of data in a network. The network also includes a second network device and a remote device....