At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Transportation security system and associated methods
A security system for monitoring at least one shipping container being transported by at least one cargo transport vehicle has a Container Security Device (CSD)...
Power over data cable system and method
A power over data cable system has a power controller. The power controller receives alarm signals from alarm systems such as fire alarms and security alarms....
Electronic lock box with time-related data encryption based on
An electronic lock box contains a secure compartment for storing keys to a structure. A linear actuator moves in one direction opening the door to the secure...
Interference management for an electronic device security and tracking
system and method
This disclosure relates to interference management for a security and tracking system of an electronic device. In one embodiment, during a startup process, an...
Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
IPSec network adapter verifier
A data processing system that supports verifiable IPSec network communication. The data processing system comprises an IPSec network adapter that connects the...
Forensic toolkit and method for accessing data stored on electronic smart
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card,...
Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
High-assurance architecture for routing of information between networks of
differing security level
The present invention is directed to routing information between networks of differing security level. Communication to/from each network is handled by a...
Security Enhanced Data Platform
The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document...
Method and portable storage device for allocating secure area in insecure
A method for extending a secure area in a portable storage device and the portable storage device therefore are provided. The method includes allocating a...
Method for secure data entry in an application
A method and device for entering data in an application is disclosed. The method may comprise displaying a graphical user interface (GUI) keyboard within the...
Secure user access subsystem for use in a computer information database
A user access security subsystem of a computer information database system utilizes computer grouping criteria and user type criteria to control user access to...
Method and system for memory protection and security using credentials
A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections,...
System and method for requesting and issuing an authorization document
A device and method for supporting the issuing of an authorization document (6) to an applicant; the said device comprising: a computer (10(i)) comprising a...
JMS provider with plug-able business logic
The invention provides plug-in framework, enabling embedding of content-based processes to in a messaging paradigm provider service. In the preferred...
Certified electronic messaging
A system whereby a first user can post messages securely to a central data server, which date stamps the messages and permanently records their content and...
Method and apparatus for trading assets
Method and apparatus for trading financial assets, such as foreign exchange and money market instruments, commodities and securities. The invention, which may...
Distributed access control and authentication
Presented are apparatus and method for distributed authentication and control of an electronic security device. The method includes prompting an authority for...
Wireless portable device for sharing digital content items
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
Methods and apparatus for use in switching user account data and
operations between two different mobile...
Methods and apparatus for use in switching communications associated with a user account from a first ("source") mobile communication device to a second...
Recoverable biometric identity system and method
A method for identifying persons based on biometric data achieves enhanced security and increased accuracy compared with other systems by distorting one or more...
Tape failover across a cluster
A security appliance that encrypts and decrypts information is installed in each of redundant multi-paths between a host system and a back up tape storage...
System and method for encrypted group network communication with
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network...
Monitoring usage of encrypted broadcast services
Embodiments include a method and system for monitoring usage of an encrypted broadcast service, such as an encrypted television program, in a secure client...
Utilizing data reduction in steganographic and cryptographic system
The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data...
Stateless hardware security module
Stateless hardware security modules facilitate securing data transfers between devices in a data communication system. The stateless hardware security module...
System, apparatus, and method for the secure storing of bulk data using
one-time pad encryption
A present novel and non-trivial decryption system and methods are disclosed for the secure storing of bulk data using one-time pad ("OTP") encryption. A storage...
Pet restraint system
A pet restraint system includes a collar having first and second ends and a fastener to selectively secure the first and second collar ends about a pet. A radio...
Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
Identification and authentication system and method
An identification system 1 used for authenticating a user at a user station 30 requesting access to secure information at a base station 20, wherein the system...
System for object-oriented data management of securities trends
A system for processing electronic data which is transmitted from a host computer to a client computer is provided. The system converts the electronic data into...
Securing printed output
A notary processor can be dedicated to performing the security-based variable information printing. A method resolves the availability of resources required by...
Keyboard-input information-security apparatus and method
A keyboard-input information-security apparatus and method are provided. The apparatus includes an interrupt-descriptor table for storing a list of addresses of...
Method and system for memory attack protection to achieve a secure
A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device...
Pattern recognition method and apparatus for data protection
Provided a secure pattern recognition method. The method includes: receiving data and generating a probe by converting the received data into a template for...
System and method for securing system content by automated device
A system is provided for securely downloading content to a mobile telecommunications device. The system includes a mobile application to enable the mobile...
Systems and methods for authenticating communications in a network medium
Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key...
Peer-to-peer security authentication protocol
A salt transmitted by a second node is received at a first node. The received salt is used to decrypt encrypted data. Optionally, authorization to access a...
Critical security parameter generation and exchange system and method for
smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
Storing a device management encryption key in a network interface
A device management system for securely storing an encryption key associated with a device management session. The device management system includes an...
Virtualization-based security apparatuses, methods, and systems
Apparatuses, devices, and methods for protecting content on a computer are disclosed that employ a novel hypervisor configured to segregate, or partition,...
Portable mass storage device with virtual machine activation
A portable mass storage device is used to store large files such as digital pictures, movies and music. The mass storage device has firmware with security...
Method and system for data security
A method, system and apparatus that advantageously provide a security protocol for data security. The apparatus includes a random number generator for...
Method and system for enhanced distribution of financial instruments
An issuer models financial instruments (e.g., proposed securities) with initial financial parameters to facilitate defining a financial instrument with final...
Fair-value pricing of a financial asset
An exemplary embodiment comprises a method for determining at an effective valuation time a fair value of an exchange traded fund comprising securities, at...
Charge managing system, image forming apparatus, charge managing server,
and image forming method
A charge managing system including an image forming apparatus and a charge managing server is provided. The image forming apparatus includes plural applications...
Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...