At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Adaptive generation of a pseudo random number generator seed
A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a...
Systems and methods for resetting a network device
A network device includes a data store with first and second parameters, the first parameter affecting a communication operation of the network device and the...
Integrated and centralized method and system for managing delivered fax
A method and system for managing facsimile (fax) data in an integrated manner. The system includes an integrated fax server, and a fax terminal configured to...
Apparatus, method and program product that calculates a color blending
ratio so security dots reproduced in a...
The invention provides an image processing apparatus, an image processing method, a recording medium and a program capable of suppressing security dots from...
Image forming apparatus capable of using security code for communication
On receiving FAX image data, an image forming apparatus determines whether or not a security code is superimposed on the image data. If superimposed, the image...
Image processing apparatus, controlling method of image processing
apparatus, program and storage medium
The present invention provides an image processing apparatus, a method of controlling the image processing apparatus, a program and a storage medium that can...
Secure sensor/actuator systems
A chip module including a sensor/actuator, an input/output interface, a data processing circuit connected between the input/output interface and the...
High-assurance file-driven content filtering for secure network server
A server for transferring data between networks. The server is programmed to perform the following steps: (a) creating a receiving process, a filtering process...
Client-server opaque token passing apparatus and method
In the computer client-server context, typically used in the Internet for communicating between a central server and user computers (clients), a method is...
Method and apparatus for dynamic home address assignment by home agent in
multiple network interworking
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
Programmable data protection device, secure programming manager system and
process for controlling access to an...
A data protection device for an interconnect network on chip (NoC) includes a header encoder that receives input requests for generating network packets. The...
Method and system for providing data field encryption and storage
An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual...
Achieving strong cryptographic correlation between higher level semantic
units and lower level components in a...
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage...
Methods and apparatus for facilitating a secure processor functional
A processor and associated local memory are capable of operative connection to a main memory such that data may be read from the main memory for use in the...
Methods of registration for programs using verification processes with
biometrics for fraud management and...
Methods for pre-registering a participant in a program database using a participant smart card and biometric data in a verification process to manage fraud and...
System and method for lost data destruction of electronic data stored on
portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
Security system for external data storage apparatus and control method
A security system for an external data storage apparatus and a control method thereof, in which a data storage is driven by reading an identification (ID),...
Memory module, memory system, and information device
A memory system including ROM and RAM in which reading and writing are enabled. A memory system includes a non-volatile memory (FLASH), DRAM, a control circuit,...
Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
Provided is a method and system of assigning a level of risk presented to an enterprise by a supplier of goods or services. In at least some embodiments, a tier...
System and method of making sales calls
A database navigation system simplifies the navigation and use of sales target information in a database. The salesperson, i.e., the user, begins navigating and...
Handheld portable real-time tracking and communications device
Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh...
Image forming system
An image forming system which realizes reliable output of an original of a finished book, while maintaining security. A sheet-unique information-reading unit...
Method and apparatus relating to secure communication
Data is encrypted onto an electromagnetic beam by providing an electromagnetic beam having a signal component having a modal state, wherein the signal component...
One time password generating method and apparatus
The invention relates to a one-time password generating method and an apparatus. The method includes steps of collecting fingerprint images, extracting...
Method and system for biometric identification or verification
The invention relates to a method for the biometric identification or verification of people. According to said method, biometric characteristics are detected...
Secure device and relay terminal
An IC card includes a tamper resistant module which has one or more applications and a card control unit for controlling an operation of the IC card, a secure...
Chaotic asymmetric encryption process for data security
Disclosed is a method and apparatus for a chaotic asymmetric encryption system that is based on a mathematically proven chaotic dynamical system, the ergodic...
Hash function using a piling-up process
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure....
Managing telemetry bandwidth and security
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of...
Providing quality of service (QOS) using multiple service set identifiers
Quality of Service (QoS) is provided to a secure data tunnel such an IPsec tunnel using information about the tunnel and the underlying data session to...
Self-calibration method of a reading circuit of a nonvolatile memory
A self-calibration circuit of a nonvolatile memory includes a trimming data storage module, a sense amplifier module, a logic judgment module, and a scanning...
Mobile information apparatus for wireless search and data transfer
A mobile information apparatus for wireless digital media transfer and sharing in a wireless digital home or a wireless digital enterprise are disclosed. In a...
Shipping container integrity device and system
Disclosed is a remotely monitorable shipping container security and integrity system and radio frequency identification device. The system permits remote...
Flexible, scalable, service-oriented surveillance system architecture
A surveillance architecture having applications in a wide variety of surveillance-related applications is disclosed. This architecture can be used in various...
Method for customizing customer identifier
The present invention provides a method for customizing customer identifier. To resolve the problems in customizing the identifier in the electronic device by...
Data communication system controlling available addressees for data based
on preselected security level of user...
An LDAP server stores security levels individually assigned to a plurality of destinations and a plurality of users in advance. When a user is authenticated...
System and method for upgrading the functionality of a controlling device
via a secure portable adapter device
Secure access to a database of upgrade data is provided by storing an encryption key value in an adapter device used to interconnect a first device to be...
Distributed network security system and a hardware processor therefor
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
Method for improving security of computer networks
A method of preventing unauthorized user access to a computer network has been developed. The method includes receiving a domain name server resolution request...
Low power mode data preservation in secure ICs
Methods, apparatus and computer program products are provided for reducing power consumption in a device. One method includes identifying a plurality of...
Methods, apparatus and systems to improve security in computer systems
According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security...
Secure data utilization
A system, comprising an external memory operative to store data therein, the data including a plurality of sections, each of the sections being associated with...
Method for secure system shutdown
In one embodiment, a key list entry corresponding to a user's private key is securely deleted from a key list of a user device on shutdown of the user device....
Information processing device and information processing system
An information processing device is provided with a tamper-proof IC chip that includes a storage area and that can process data from the storage area, and with...
iSCSI name forwarding technique
An iSCSI name forwarding technique allows a security appliance to assume iSCSI names of one or more clients and one or more storage systems in a network. The...
The aim of the present invention is to provide a secure system-on-chip for processing data, this system-on-chip having at least a central processing unit, an...
Method and device for securely configuring a terminal by means of a
startup external data storage device
Method of configuring a terminal (10a) by means of a device external to said terminal (50a) able to communicate with said terminal and comprising data storage...
Platform for standardizing vehicle communications with third-party
A business-to-vehicle platform functions as an information technology (IT) integration platform to support secure communication between a vehicle's onboard IT...
Methods and systems for providing data objects on a token
A computer system, method and/or computer-readable medium provide independent data objects to a token in compressed form. The independent data objects are...