At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure and seamless wireless public domain wide area network and method of
using the same
A wireless public domain Wide Area Network (WPDWAN) is a system and method of providing high throughput data services to public domain customers through the use...
Network security authentication method
An authentication method for network security includes: configuring a Media Gateway (MG) with an authentication key and setting a security data package on a...
Remote virtual medical diagnostic imaging viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
Authentication and encryption for secure data transmission
A system and method for authenticating and encrypting messages for secure transmission is disclosed. A frame to be transmitted between devices comprises a frame...
Dynamic network link acceleration
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...
Data backup, storage, transfer and retrieval system, method and computer
A file storage and retrieval system, method and computer program product connects an account user's computer to a remote, secure, redundant system computer via...
Secure method of synchronizing cache contents of a mobile browser with a
A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including...
Providing a virtual binding for a worm storage system on rewritable media
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM...
E-bazaar featuring personal information security
Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational...
Web-based issuer support services
A web-based process, residing on a server, provides issuer support services to a financial market. This web-based process includes an issue and issuer process...
Method for the administration of medical patient data
In a method for the administration of medical patient data with a centralized or decentralized patient medical file having secured access enabled by the patient...
Data backup system including a data protection component
A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The...
Method and system for utilizing a high frequency PHY layer for high speed
data transmission between wireless...
A single communication stack may be utilized to setup a data transmission session between wireless devices. A primary physical layer corresponding to the single...
Chaotic cipher system and method for secure communication
The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of...
Secure voice transaction method and system
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing...
Transmitting and receiving method and apparatus in real-time system
A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a...
Method for transmitting content with copy control information, content
identification information and content...
A content transmitting apparatus and the like which execute copy control of content more securely than conventional, and can count copy number correctly...
Image processing device, method and program product processing barcodes
with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
Image pickup apparatus for performing a desirable self timer shooting and
an automatic shooting method using...
An image pickup apparatus includes a system controller and a face detector, and can register face data of a photographer for a self-timer shooting mode in...
System for secure transfer of online privileges
Methods and apparatus for transferring privileges in a computer system. In one implementation, a system for transferring online privileges includes: a game...
Secure system and method for processing data between a first device and at
least one second device provided...
A secure system (1) for processing data includes a first device (2), and at least one second device (3) is characterized in that--each second device (3)...
System and method for securing and tracking files
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing...
Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may...
Methods systems and articles of manufacture for generating and displaying
video related to financial application
Systems, methods and articles of manufacture for generating a video such that when another person views the video, the other person can view non-private...
Intrusion detection report correlator and analyzer
A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion...
Secured web based access of failed flows in an integration server
A method for accessing failed events in an integrated server environment is disclosed. The method comprises providing a thin client in an application server...
Lockless distributed IPsec processing
According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of...
Systems and methods for controlling access to a public data network from a
visited access provider
To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an...
Trusted network connect system based on tri-element peer authentication
A trusted network connect (TNC) system based on tri-element peer authentication (TePA) is provided. An network access requestor (NAR) of an access requestor...
A device that is configured for wireless communication and for execution of at least one client application is disclosed. The device comprises an integrated...
Data transfer across a network
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations...
Methodology for vaulting data encryption keys with encrypted storage
A method is provided to allow for encryption keys to be safely vaulted and for restarts after system failures, even when an external key server is not...
System and method for content protection on a computing device
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to...
Information processing apparatus, information recording medium
manufacturing apparatus, and information...
A configuration is provided for enabling a process in which appropriate content code corresponding to apparatuses and applications of various model types and...
Secure data verification via biometric input
An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with...
Method and apparatus for verifying authenticity of digital data using
A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The...
Layered security in digital watermarking
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
Portable electronic entity and communication method
The pocket portable electronic entity (400) with connection element (420) for removable connection to a host station (300), having first members (460, 470, 471)...
Method and system for secure exchange of data in a network
A first network device implements a method for the secure exchange of data in a network. The network also includes a second network device and a remote device....
Portable security transaction protocol
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating...
System and methodology providing multi-tier security for network data with
industrial control components
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial...
Cable network system and method for controlling security in cable network
encrypted dynamic multicast session
A security control method in a cable network dynamic multicast session, and more particularly, a method of controlling forward secrecy and backward secrecy in a...
Non-volatile memory sub-system integrated with security for storing near
An architecture is presented that facilitates maintaining a log of near field transactions in a memory module that includes security functionalities and near...
Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
Memory devices with data protection
A memory device comprises a memory array, a status register, a status-register write-protect bit and a security register. The memory array contains a number of...
Data structures and state tracking for network protocol processing
Described are data structures, and methodology for forming same, for network protocol processing. A method for creating data structures for firewalling and...
Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
Method and system for managing bluetooth communication using software or
Aspects of method and system for managing secure Bluetooth communication using software or firmware filtering are provided. In this regard, the IT or system...